0% found this document useful (0 votes)
18 views55 pages

Logcat Prev CSC Log

Uploaded by

agushernan1902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views55 pages

Logcat Prev CSC Log

Uploaded by

agushernan1902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 55

--------- beginning of main

04-06 19:51:30.607 D/lmkd ( 330): fetch chimera enabled flag :[0] from property
04-06 19:51:30.608 I/lmkd ( 330): Using psi monitors for memory pressure
detection
04-06 19:51:30.610 I/lmkd ( 330): set custom_sw_limit : 500
04-06 19:51:30.610 I/lmkd ( 330): set upgrade_pressure : 80
04-06 19:51:30.610 I/lmkd ( 330): set lmkd_freelimit_val : 13
04-06 19:51:30.610 I/lmkd ( 330): enable_upgrade_criadj : 1
04-06 19:51:30.610 I/lmkd ( 330): Process polling is supported
04-06 19:51:30.637 D/ProcessState( 331): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.648 I/SELinux ( 331): SELinux: Loaded service_contexts from:
04-06 19:51:30.648 I/SELinux ( 331): /system/etc/selinux/plat_service_contexts
04-06 19:51:30.648 I/SELinux ( 331):
/system_ext/etc/selinux/system_ext_service_contexts
04-06 19:51:30.648 I/SELinux ( 331):
/vendor/etc/selinux/vendor_service_contexts
04-06 19:51:30.649 I/servicemanager( 331): Adding 'u:r:servicemanager:s0' service
(manager:331)
04-06 19:51:30.651 D/hw-ProcessState( 332): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.659 I/hwservicemanager( 332): getFrameworkHalManifest: Reading
VINTF information.
04-06 19:51:30.662 D/ProcessState( 333): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.664 I/SELinux ( 333): SELinux: Loaded service_contexts from:
04-06 19:51:30.664 I/SELinux ( 333): /vendor/etc/selinux/vndservice_contexts
04-06 19:51:30.665 I/vndservicemanager( 333): Adding 'u:r:vndservicemanager:s0'
service (manager:333)
04-06 19:51:30.669 I/hwservicemanager( 332): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:30.687 I/hwservicemanager( 332): getDeviceHalManifest: Successfully
processed VINTF information
04-06 19:51:30.687 I/hwservicemanager( 332): getFrameworkHalManifest: Successfully
processed VINTF information
04-06 19:51:30.689 I/hwservicemanager( 332): hwservicemanager is ready now.
04-06 19:51:30.762 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 1
04-06 19:51:30.763 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 2
04-06 19:51:30.764 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 3
04-06 19:51:30.765 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 1
04-06 19:51:30.765 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 2
04-06 19:51:30.766 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 3
--------- beginning of system
04-06 19:51:30.942 I/vold ( 342): Vold 3.0 (the awakening) firing up
04-06 19:51:30.943 D/vold ( 342): Detected support for: ext4 f2fs vfat
04-06 19:51:30.952 D/vold ( 342): Tearing down stale mount /mnt/sde
04-06 19:51:30.952 D/voldUtils( 342): /mnt/sde in unmounting procedure: Success
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named product
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named vendor-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named vendor
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named system
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named odm-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named product-
verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named prism-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named optics-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named odm
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named system-verity
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop3 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop2 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop0 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop1 named apex:
04-06 19:51:30.955 D/vold ( 342): VolumeBase::create()++
04-06 19:51:30.955 D/vold ( 342): VolumeBase::create()--
04-06 19:51:30.958 I/epmlogd ( 342): EpmLog::EpmLog
04-06 19:51:30.958 D/epmd ( 342): EPM() - Device supports FBE!
04-06 19:51:30.958 I/vold ( 342): EnterprisePartitionManager created
04-06 19:51:30.960 D/vold ( 342): fstab record: system /system f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: system /system ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: vendor /vendor f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: product/product f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: odm /odm f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/prism /prism
ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/optics
/optics ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/metadata
/metadata ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/cache /cache
ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/userdata
/data f2fs
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/efs
/mnt/vendor/efs ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/cpefs
/mnt/vendor/cpefs ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/misc /misc
emmc
04-06 19:51:30.961 D/vold ( 342): fstab record:
/devices/platform/13500000.dwmmc2/mmc_host* auto auto
04-06 19:51:30.961 D/vold ( 342): fstab record: /devices/platform/13600000.usb*
auto vfat
04-06 19:51:30.961 D/hw-ProcessState( 342): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.961 D/ProcessState( 342): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.962 I/servicemanager( 331): Adding 'u:r:vold:s0' service (vold:342)
04-06 19:51:30.963 D/vold ( 342): VoldNativeService::start() completed OK
04-06 19:51:31.000 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=0 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'MINOR=0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.001 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=8 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0/mmcblk0boot0
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'MINOR=8'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.005 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=16 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/
block/mmcblk0/mmcblk0boot1
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot1'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'MINOR=16'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot1'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.010 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 1
04-06 19:51:31.011 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 2
04-06 19:51:31.012 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 3
04-06 19:51:31.027 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=8 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0/mmcblk0boot0
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'MINOR=8'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.070 E/libc ( 293): Access denied finding property
"persist.vendor.softdog"
04-06 19:51:31.088 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=24 eventPath=/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/
block/mmcblk1
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'MINOR=24'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk1'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.088 D/vold ( 342): Disk::Disk
create(/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1,
sdcarddisk:179:24, flags:5)
04-06 19:51:31.100 I/vold ( 342): Found disk at
/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1 but
delaying scan due to user zero not having started
04-06 19:51:31.100 I/voldUtils( 342): Change Block IO Scheduler to SSG
04-06 19:51:31.100 I/voldUtils( 342): schedPath
/sys/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1/queue/
scheduler, sdcard
04-06 19:51:31.101 I/voldUtils( 342): SSG scheduler is not supported
04-06 19:51:31.112 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=16 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/
block/mmcblk0/mmcblk0boot1
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot1'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'MINOR=16'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot1'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.272 D/io_stats( 366): !@ run in light-weight mode using
/sys/block/*/stat node
04-06 19:51:31.272 D/io_stats( 366): !@ Failed to open pios_enable node
04-06 19:51:31.273 D/io_stats( 366): !@ found device mmcblk0 (179,0) (size 119280
MBs) and set for logging.
04-06 19:51:31.274 D/io_stats( 366): !@ found device mmcblk1 (179,24) (size 30436
MBs) and set for logging.
04-06 19:51:31.386 E/scs ( 369): [main] scs running state INIT
04-06 19:51:31.387 D/scs ( 369): bUseSecPartition : true
04-06 19:51:31.389 D/scs ( 369): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] salesCode : CTI
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] salesCode length : 3
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] mainPath:
/prism/etc/carriers
04-06 19:51:31.391 D/scs ( 369): [initData] SALES_CODE : CTI
04-06 19:51:31.392 D/scs ( 369): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:31.392 D/scs ( 369): [amendOmcNwCode] SALES_CODE is single.
OMCNW_CODE should be the same
04-06 19:51:31.395 D/scs ( 369): [parseOmcData]netbased_code ARO
04-06 19:51:31.396 D/scs ( 369): [initData]SALES_CODE : CTI
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:31.397 D/scs ( 369): [initData]OMCNW_CODE : CTI
04-06 19:51:31.397 D/scs ( 369): [initData]OMCNW_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_RES_PATH : /omr/res
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_ETC_PATH :
/prism/etc/carriers/single/CTI
04-06 19:51:31.397 D/scs ( 369): [initData]TSS_TYPE : NETBASED
04-06 19:51:31.397 E/scs ( 369): [startScsState] start scs running(0)
04-06 19:51:31.398 D/scs ( 369): [setOmcProperties] set sales code : CTI
04-06 19:51:31.398 D/scs ( 369): [setOmcProperties] set network code : CTI
04-06 19:51:31.398 D/scs ( 369): [setPreTssProperties]set Pre TSS Properties
04-06 19:51:31.398 D/scs ( 369): [setPreTssProperties]Support SIM Mobility
Framework Feature
04-06 19:51:31.400 D/scs ( 369): [checkVersionChanged]ro.omc.img_mount : 0
04-06 19:51:31.400 D/scs ( 369): [setCountryCode] setCountryCode from
customer.xml
04-06 19:51:31.400 D/scs ( 369): [setCountryCode] setCountryCode(customer
filepath) : /optics/configs/carriers/single/CTI/conf/customer.xml
04-06 19:51:31.402 D/scs ( 369): [setCountryCode] set country_code = Argentina
04-06 19:51:31.402 D/scs ( 369): [setCountryCode] set countryiso_code = AR
04-06 19:51:31.402 D/scs ( 369): [setScsRunningState] setScsRunningState : 1
04-06 19:51:31.402 E/scs ( 369): [startScsState] start scs running(1)
04-06 19:51:31.403 E/scs ( 369): [setDmRwProperties] persist properties set :
False
04-06 19:51:31.450 I/tzdaemon( 370): [Main] Logger was initialized
04-06 19:51:31.453 I/tzdaemon( 370): [Main] Current fds number: 32768; needed fds
number: 48; max fds number: 32768
04-06 19:51:31.453 D/tzdaemon( 370): [Main] init secure userland
04-06 19:51:31.453 I/tzdaemon( 370): [Main] Probe for TZ: 0
04-06 19:51:31.454 I/tzdaemon( 370): [Main] /vendor/bin/tzdaemon started with pid
370
04-06 19:51:31.454 D/tzdaemon( 370): [Main] create image loader thread: ok
04-06 19:51:31.454 D/tzdaemon( 370): [il] image loader on the go!
04-06 19:51:31.454 I/tzdaemon( 370): [ts] Failed to make directory
'/data/vendor/tee/srt': No such file or directory
04-06 19:51:31.455 D/tzdaemon( 370): [il] enotify_signalize(): val:0x1
04-06 19:51:31.455 D/tzdaemon( 370): [ts] enotify_wait(): waiting event:SWd
readiness
04-06 19:51:31.455 I/tzdaemon( 370): [ts] SWd readiness: got event:0x1
04-06 19:51:31.458 E/tzdaemon( 370): [tzdaemon] failed to open TA (00000005-0005-
0005-0505-050505050505) image: 2 (No such file or directory)
04-06 19:51:31.468 I/tzdaemon( 370): [ts] +++ Session established:
session_id:586ffc1c-0000-0000-0200-00103c73350c ++++
04-06 19:51:31.469 D/tzdaemon( 370): [ts] Root TA notified ACSD Ready
04-06 19:51:31.561 E/tzts_daemon( 373): [tzts_daemon] failed to open TA (00000007-
0007-0007-0707-070707070707) image: 2 (No such file or directory)
04-06 19:51:31.568 I/tzts_daemon( 373): [dl] Logger was initialized
04-06 19:51:31.568 I/tzts_daemon( 373): [dl] driver loader service
initialization...
04-06 19:51:31.571 I/tzts_daemon( 373): [dl] Trying to load: 00000000-0000-0000-
0000-494363447256
04-06 19:51:31.575 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 20
04-06 19:51:31.576 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_OBJ_LIST
04-06 19:51:31.576 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_OBJ_LIST
04-06 19:51:31.576 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.576 D/tzdaemon( 370): [ts] Storage ID : 2147483648
04-06 19:51:31.577 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707-2147483648 success,
size: 115
04-06 19:51:31.579 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 36
04-06 19:51:31.579 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_DATA
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_DATA
04-06 19:51:31.579 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Storage ID : -2147483648
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Object path is :
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Info offset is : 24
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Storage metadata offset is : 24
04-06 19:51:31.580 D/tzdaemon( 370): [ts] Number of data chunks to read = 1 start-
chunk = 0 chunk-size = 16428
04-06 19:51:31.580 D/tzdaemon( 370): [ts] szdata = 24 size = 0
04-06 19:51:31.580 D/tzdaemon( 370): [ts] Calculating size of
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info of type 1
04-06 19:51:31.582 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info success, size: 128
04-06 19:51:31.582 D/tzdaemon( 370): [ts] szdata = 156 size = 0
04-06 19:51:31.582 D/tzdaemon( 370): [ts] szdata = 160 size = 4
04-06 19:51:31.583 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
data_chunk success, size: 16428
04-06 19:51:31.583 D/tzdaemon( 370): [ts] szdata = 16600 size = 4
04-06 19:51:31.585 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.585 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.585 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 36
04-06 19:51:31.586 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.586 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_DATA
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_DATA
04-06 19:51:31.586 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Storage ID : -2147483648
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Object path is :
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Info offset is : 24
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Storage metadata offset is : 24
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Number of data chunks to read = 1 start-
chunk = 0 chunk-size = 16428
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 24 size = 0
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Calculating size of
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info of type 1
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info success, size: 128
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 156 size = 0
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 160 size = 4
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
data_chunk success, size: 16428
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 16600 size = 4
04-06 19:51:31.593 D/tzts_daemon( 373): [dl] driver waiter thread created
04-06 19:51:31.593 I/tzts_daemon( 373): [dl] Trying to load: 00000000-0000-0000-
0000-564c544b4456
04-06 19:51:31.601 D/tzts_daemon( 373): [dl] driver waiter thread created
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] Trying to load: 18d9f073-18a5-4ade-
9def-875e07f7f293_
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] not a TA: wrong filename length
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] 2 driver(s) were loaded
04-06 19:51:31.639 D/hw-ProcessState( 378): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.640 D/ProcessState( 378): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.641 I/servicemanager( 331): Adding 'u:r:system_suspend:s0' service
(suspend_control:378)
04-06 19:51:31.641 I/servicemanager( 331): Adding 'u:r:system_suspend:s0' service
(suspend_control_internal:378)
04-06 19:51:31.645 I/HidlServiceManagement( 378): Registered
[email protected]::ISystemSuspend/default
04-06 19:51:31.646 I/HidlServiceManagement( 378): Removing namespace from process
name [email protected] to [email protected].
04-06 19:51:31.656 I/fsverity_init( 382): LoadKeyFromFile
path=/system/etc/security/fsverity/fsverity-release.x509.der keyname=fsv_system_0
04-06 19:51:31.664 I/fsverity_init( 382): LoadKeyFromFile
path=/product/etc/security/fsverity/gms_fsverity_cert.der keyname=fsv_product_0
04-06 19:51:31.666 I/fsverity_init( 382): LoadKeyFromFile
path=/product/etc/security/fsverity/play_store_fsi_cert.der keyname=fsv_product_1
04-06 19:51:31.681 I/engmode_hidl_service( 381): engmode()
04-06 19:51:31.681 I/engmode_hidl_service( 381): e_server_hal service is started
04-06 19:51:31.684 I/HidlServiceManagement( 381): Registered
[email protected]::ISehEngmode/default
04-06 19:51:31.685 I/HidlServiceManagement( 381): Removing namespace from process
name [email protected] to [email protected].
04-06 19:51:31.694 D/INSTHK ( 385): Version = Ver 1.0
04-06 19:51:31.698 E/INSTHK ( 385): H Fail ...
04-06 19:51:31.714 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IBootControl/default in either framework or device VINTF
manifest.
04-06 19:51:31.728 W/android.hardware.security.keymint-service( 380): Keymint 1.0
service start...
04-06 19:51:31.728 D/ProcessState( 380): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.728 W/android.hardware.security.keymint-service( 380): Add SKeymint
services
04-06 19:51:31.728 I/android.hardware.security.keymint-service( 380): adding
keymint service instance: android.hardware.security.keymint.IKeyMintDevice/default
04-06 19:51:31.729 I/servicemanager( 331): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:31.739 I/servicemanager( 331): getDeviceHalManifest: Successfully
processed VINTF information
04-06 19:51:31.739 I/servicemanager( 331): getFrameworkHalManifest: Reading VINTF
information.
04-06 19:51:31.742 I/servicemanager( 331): getFrameworkHalManifest: Successfully
processed VINTF information
04-06 19:51:31.742 I/servicemanager( 331): Found
android.hardware.security.keymint.IKeyMintDevice/default in device VINTF manifest.
04-06 19:51:31.742 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.keymint.IKeyMintDevice/default:380)
04-06 19:51:31.742 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
android.hardware.security.secureclock.ISecureClock/default
04-06 19:51:31.743 I/servicemanager( 331): Found
android.hardware.security.secureclock.ISecureClock/default in device VINTF
manifest.
04-06 19:51:31.743 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.secureclock.ISecureClock/default:380)
04-06 19:51:31.743 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
android.hardware.security.sharedsecret.ISharedSecret/default
04-06 19:51:31.744 I/servicemanager( 331): Found
android.hardware.security.sharedsecret.ISharedSecret/default in device VINTF
manifest.
04-06 19:51:31.744 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.sharedsecret.ISharedSecret/default:380)
04-06 19:51:31.744 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
vendor.samsung.hardware.keymint.ISehKeyMintExtension/default
04-06 19:51:31.744 I/servicemanager( 331): Found
vendor.samsung.hardware.keymint.ISehKeyMintExtension/default in device VINTF
manifest.
04-06 19:51:31.744 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (vendor.samsung.hardware.keymint.ISehKeyMintExtension/default:380)
04-06 19:51:31.745 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
vendor.samsung.hardware.keymint.ISehKeyMintFactory/default
04-06 19:51:31.745 I/servicemanager( 331): Found
vendor.samsung.hardware.keymint.ISehKeyMintFactory/default in device VINTF
manifest.
04-06 19:51:31.745 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (vendor.samsung.hardware.keymint.ISehKeyMintFactory/default:380)
04-06 19:51:31.745 W/android.hardware.security.keymint-service( 380): Adding
SKeymint services is done
04-06 19:51:31.745 I/android.hardware.security.keymint-service( 380): trying to
open SKeyMint TA
04-06 19:51:31.745 I/keystore2( 379): keystore2_main: Keystore2 is starting.
04-06 19:51:31.745 W/keymint_tee( 380): [WRN]!@Open skeymint version 100.0.50
04-06 19:51:31.752 I/keystore2( 379): keystore2_main: Starting thread pool now.
04-06 19:51:31.753 I/keystore2( 379): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:31.753 D/ProcessState( 379): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.754 D/vold ( 342): fscrypt_mount_metadata_encrypted: /data
encrypt: 0 format: 0 with null
04-06 19:51:31.756 I/MetadataCrypt( 342): read_key
04-06 19:51:31.756 D/vold ( 342): metadata_key_dir/key:
/metadata/vold/metadata_encryption/key
04-06 19:51:31.756 I/MetadataCrypt( 342): read_key ++ dir :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.756 E/KeyStorage( 342): retrieveKey :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.758 I/servicemanager( 331): Since
'android.system.keystore2.IKeystoreService/default' could not be found, trying to
start it as a lazy AIDL service
04-06 19:51:31.759 W/keymint_tee( 380): [WRN]!@tz open success
04-06 19:51:31.760 W/keymint_tee( 380): [WRN]build type : user
04-06 19:51:31.762 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.763 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.763 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.764 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.764 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.764 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.766 I/keystore2( 379): getDeviceHalManifest: Successfully processed
VINTF information
04-06 19:51:31.766 I/keystore2( 379): keystore2::globals: In get_device_name :
"a13"
04-06 19:51:31.766 I/keystore2( 379): keystore2::globals: In set_keymint_version
100
04-06 19:51:31.773 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.773 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.773 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.774 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.774 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.774 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.782 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.783 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.783 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.783 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.783 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.783 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.792 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.792 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.792 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.793 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.793 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.793 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.801 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.801 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.802 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.802 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.802 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.802 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.810 D/android.hardware.security.keymint-service( 380):
nwd_configure: ret 0
04-06 19:51:31.811 W/keymint_tee( 380): [WRN]!@nwd_configure done
04-06 19:51:31.811 W/keymint_tee( 380): [WRN]!@nwd_open_connection done
04-06 19:51:31.811 I/android.hardware.security.keymint-service( 380): successfully
load skeymint
04-06 19:51:31.811 W/android.hardware.security.keymint-service( 380): SKeymint
initialization is completed
04-06 19:51:31.812 D/android.hardware.security.keymint-service( 380):
getSharedSecretParameters: ret 0
04-06 19:51:31.813 D/android.hardware.security.keymint-service( 380):
computeSharedSecret: ret 0
04-06 19:51:31.813 I/keystore2( 379): keystore2::shared_secret_negotiation: Shared
secret negotiation concluded successfully.
04-06 19:51:31.815 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.compat:379)
04-06 19:51:31.817 D/hw-ProcessState( 379): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.819 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:31.820 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:31.822 I/servicemanager( 331): Found
android.system.keystore2.IKeystoreService/default in framework VINTF manifest.
04-06 19:51:31.822 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.system.keystore2.IKeystoreService/default:379)
04-06 19:51:31.822 I/BpBinder( 331): onLastStrongRef automatically unlinking death
recipients: <uncached descriptor>
04-06 19:51:31.823 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.apc:379)
04-06 19:51:31.823 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.authorization:379)
04-06 19:51:31.824 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.maintenance:379)
04-06 19:51:31.824 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.metrics:379)
04-06 19:51:31.825 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.legacykeystore:379)
04-06 19:51:31.826 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.samsungattestation:379)
04-06 19:51:31.826 I/keystore2( 379): samsung_attestation: Successfully started
Samsung Keystore service.
04-06 19:51:31.826 I/keystore2( 379): keystore2_main: Successfully registered
Keystore 2.0 service.
04-06 19:51:31.826 I/keystore2( 379): keystore2_main: Joining thread pool now.
04-06 19:51:31.827 I/SELinux ( 379): SELinux: Loaded keystore2_key_contexts from:
04-06 19:51:31.827 I/SELinux ( 379):
/system/etc/selinux/plat_keystore2_key_contexts
04-06 19:51:31.829 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:31.831 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:31.832 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:31.832 E/KeyStorage( 342): getRotStr rot value :
000100da9d9864cade367a107d144613
04-06 19:51:31.834 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:31.835 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:31.837 E/KeyStorage( 342): retrieveKey success :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.837 I/MetadataCrypt( 342): create_crypto_blk_dev
04-06 19:51:31.837 I/MetadataCrypt( 342): create_crypto_blk_dev ++
04-06 19:51:31.940 I/MetadataCrypt( 342): create_crypto_blk_dev --
04-06 19:51:31.940 D/vold ( 342): Mounting metadata-encrypted filesystem:/data
04-06 19:51:31.940 I/MetadataCrypt( 342): Mounting metadata-encrypted filesystem :
/data
04-06 19:51:31.941 I/MetadataCrypt( 342): fs_mgr_do_mount ++
04-06 19:51:31.942 I/vold ( 342): [libfs_mgr]Running /system/bin/fsck.f2fs -a -
c 10000 --debug-cache -L data /dev/block/dm-10
04-06 19:51:33.275 D/io_stats( 366): !@ 179,0 r 7825 341943 w 651 7408 d 1 4 f 0 0
iot 2252 0 th 0 0 0 pt 0 inp 0 1 7.452
04-06 19:51:35.276 D/io_stats( 366): !@ 179,0 r 12796 384187 w 1271 43964 d 1 4 f
0 0 iot 3924 0 th 0 0 0 pt 0 inp 0 4 9.453
04-06 19:51:35.276 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2981776
avail 3380920 actv(f) 32584 inactv(f) 377600 dirty 5280 wb 0 anonpg 20356 slab
82972
04-06 19:51:37.277 D/io_stats( 366): !@ 179,0 r 17444 433467 w 1722 90364 d 2 8 f
0 0 iot 5716 0 th 0 0 0 pt 0 inp 0 1 11.454
04-06 19:51:39.278 D/io_stats( 366): !@ 179,0 r 21026 500959 w 2055 157028 d 2 8 f
0 0 iot 7440 0 th 0 0 0 pt 0 inp 0 2 13.454
04-06 19:51:41.278 D/io_stats( 366): !@ 179,0 r 24294 591099 w 2380 245648 d 2 8 f
0 0 iot 9108 0 th 0 0 0 pt 0 inp 0 3 15.455
04-06 19:51:41.278 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2593948
avail 3380976 actv(f) 69308 inactv(f) 716628 dirty 19040 wb 736 anonpg 20356 slab
95496
04-06 19:51:41.837 I/keystore2( 379): keystore2::watchdog: Watchdog thread idle ->
terminating. Have a great day.
04-06 19:51:43.279 D/io_stats( 366): !@ 179,0 r 27652 696947 w 2711 346208 d 2 8 f
0 0 iot 10848 0 th 0 0 0 pt 0 inp 0 16 17.456
04-06 19:51:43.279 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:45.280 D/io_stats( 366): !@ 179,0 r 31090 818619 w 3025 457876 d 2 8 f
0 0 iot 12628 0 th 0 0 0 pt 0 inp 0 13 19.457
04-06 19:51:45.280 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:47.280 D/io_stats( 366): !@ 179,0 r 34955 941607 w 3352 570952 d 2 8 f
0 0 iot 14480 0 th 0 0 0 pt 0 inp 0 6 21.457
04-06 19:51:47.281 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:47.281 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 1918936
avail 3380528 actv(f) 106332 inactv(f) 1338248 dirty 52100 wb 1132 anonpg 20364
slab 111772
04-06 19:51:48.196 I/vold ( 342): [libfs_mgr]__mount(source=/dev/block/dm-
10,target=/data,type=f2fs)=0: Success
04-06 19:51:48.196 I/vold ( 342): [libfs_mgr]__mount return 0(source=dm-
10,target=/data,type=f2fs,flags=406,options=discard,usrquota,grpquota,fsync_mode=no
barrier,reserve_root=32768,resgid=5678,whint_mode=fs-
based,inlinecrypt,checkpoint=disable:0%): Success
04-06 19:51:48.197 E/vold ( 342): [libfs_mgr]restorecon_sec_sysfsERROR readlink
:/dev/block/dm-10
04-06 19:51:48.197 I/MetadataCrypt( 342): fs_mgr_do_mount --
04-06 19:51:48.197 D/vold ( 342): Mounted /data
04-06 19:51:48.197 I/MetadataCrypt( 342): Mounted
04-06 19:51:48.198 I/MetadataCrypt( 342): fscrypt_mount_metadata_encrypted ---
04-06 19:51:48.198 D/vold ( 342): Disk at 253:10 changed
04-06 19:51:48.218 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 1
04-06 19:51:48.225 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 2
04-06 19:51:48.226 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 3
04-06 19:51:48.226 I/servicemanager( 331): Tried to start aidl service
android.system.keystore2.IKeystoreService/default as a lazy service, but was unable
to. Usually this happens when a service is not installed, but if the service is
intended to be used as a lazy service, then it may be configured incorrectly.
04-06 19:51:48.248 F/PA_DAEMON( 404): [PrintVersion:437] Version:
PA_Daemon,teegris,version_2.4.10,release,dpi
04-06 19:51:48.270 I/STORK_BIRD( 408): [Server] Storkbird version 1.0.3 start!!!
04-06 19:51:48.280 I/Checkpoint( 342): cp_prepareCheckpoint called
04-06 19:51:48.295 D/hw-ProcessState( 407): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:48.297 I/HidlServiceManagement( 407): Registered
[email protected]::ISehVaultKeeper/default
04-06 19:51:48.298 I/HidlServiceManagement( 407): Removing namespace from process
name [email protected] to [email protected]
service.
04-06 19:51:48.298 I/[email protected]
service( 407): vaultkeeper_hal service is started
04-06 19:51:48.310 I/vaultkeeper( 406): firing up. VaultKeeper.
04-06 19:51:48.330 E/vold ( 342): fbeEnable
04-06 19:51:48.330 D/FsCrypt ( 342): fscrypt_initialize_systemwide_keys
04-06 19:51:48.332 E/KeyStorage( 342): retrieveKey : /data/unencrypted/key
04-06 19:51:48.350 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:48.352 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:48.352 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:48.353 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:48.354 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:48.355 E/KeyStorage( 342): retrieveKey success : /data/unencrypted/key
04-06 19:51:48.355 D/FsCrypt ( 342): fscrypt_initialize_systemwide_keys,
install_storage_key DATA_MNT_POINT
04-06 19:51:48.356 D/vold ( 342): Installed fscrypt key with ref
7c1e5b76978a436048160ef62c48b51d to /data
04-06 19:51:48.356 D/vold ( 342): Added fscrypt-provisioning key for
7c1e5b76978a436048160ef62c48b51d to session keyring
04-06 19:51:48.356 D/FsCrypt ( 342): key mode: aes-256-xts:aes-256-cts:v2, file
name: /data/unencrypted/mode
04-06 19:51:48.357 D/FsCrypt ( 342): ref_filename: /data/unencrypted/ref
04-06 19:51:48.358 D/FsCrypt ( 342): Wrote system DE key reference to:
/data/unencrypted/ref
04-06 19:51:48.358 D/vold ( 342): Generating standard storage key
04-06 19:51:48.358 D/vold ( 342): Installed fscrypt key with ref
ea7e0d1dcd960bb5cb3346e6680f4573 to /data
04-06 19:51:48.358 D/vold ( 342): Added fscrypt-provisioning key for
ea7e0d1dcd960bb5cb3346e6680f4573 to session keyring
04-06 19:51:48.359 D/FsCrypt ( 342): Wrote per boot key reference to:
/data/unencrypted/per_boot_ref
04-06 19:51:48.359 I/voldUtils( 342): PROP : security.fbe.fail_cause : , value
K00R
04-06 19:51:48.394 I/tombstoned( 419): tombstoned successfully initialized
04-06 19:51:48.407 I/incfs ( 342): Initial API level of the device: 31
04-06 19:51:48.407 I/incfs ( 342): ro.incremental.enable: yes
04-06 19:51:48.407 I/incfs ( 342): isFsAvailable: true
04-06 19:51:48.407 I/incfs ( 342): isFsAvailable: true
04-06 19:51:48.408 I/incfs ( 342): IncFs_Features: v2
04-06 19:51:48.409 I/keystore2( 379): keystore2::maintenance: In early_boot_ended.
04-06 19:51:48.494 D/android.hardware.security.keymint-service( 380):
addRngEntropy: ret 0
04-06 19:51:48.495 I/keystore2( 379): keystore2::globals: Touching Keystore 2.0
database for this first time since boot.
04-06 19:51:48.495 I/keystore2( 379): keystore2::globals: Calling cleanup
leftovers.
04-06 19:51:48.545 W/keymint_tee( 380): [WRN]ret OK PARAMS: PP2, D4, NAR1, A128,
KS256, CD2022.11.24,13:09:24.948,
04-06 19:51:48.545 D/android.hardware.security.keymint-service( 380):
getKeyCharacteristics: ret 0
04-06 19:51:48.546 W/keymint_tee( 380): [WRN]begin req PARAMS: D4,
04-06 19:51:48.547 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:48.549 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:48.549 I/keystore2( 379): keystore2::super_key: Starting boot level
watcher.
04-06 19:51:48.549 I/keystore2( 379): keystore2::super_key: Read
keystore.boot_level value 30
04-06 19:51:48.549 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 0), valid: true
04-06 19:51:48.549 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 0), valid: true
04-06 19:51:48.550 I/keystore2( 379): keystore2::super_key: Read
keystore.boot_level value 30
04-06 19:51:48.550 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:48.550 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:48.550 D/android.hardware.security.keymint-service( 380):
earlyBootEnded: ret 0
04-06 19:51:48.550 I/keystore2( 379): keystore2::maintenance: Call to
earlyBootEnded succeeded for security level TRUSTED_ENVIRONMENT.
04-06 19:51:48.552 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:48.553 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:48.553 E/keystore2( 379): keystore2::maintenance: Call to
earlyBootEnded failed for security level STRONGBOX: In call_with_watchdog: getting
keymint device.
04-06 19:51:48.553 E/keystore2( 379): keystore2::error: In call_with_watchdog:
getting keymint device
04-06 19:51:48.553 E/keystore2( 379):
04-06 19:51:48.553 E/keystore2( 379): Caused by:
04-06 19:51:48.553 E/keystore2( 379): 0: In get_keymint_device.
04-06 19:51:48.553 E/keystore2( 379): 1: In connect_keymint: Trying to get
Legacy wrapper.
04-06 19:51:48.553 E/keystore2( 379): 2: Error::Km(ErrorCode(-68))
04-06 19:51:48.553 E/vold ( 342): keystore2 Keystore earlyBootEnded returned
service specific error: -68
04-06 19:51:48.710 D/vold ( 342): Disk at 7:32 changed
04-06 19:51:48.715 D/vold ( 342): Disk at 7:40 changed
04-06 19:51:48.722 D/vold ( 342): Disk at 7:48 changed
04-06 19:51:48.723 D/vold ( 342): Disk at 7:56 changed
04-06 19:51:48.734 D/vold ( 342): Disk at 7:64 changed
04-06 19:51:48.736 D/vold ( 342): Disk at 7:72 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:11 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:12 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:11 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:12 changed
04-06 19:51:48.741 D/vold ( 342): Disk at 7:80 changed
04-06 19:51:48.743 D/vold ( 342): Disk at 253:13 changed
04-06 19:51:48.743 D/vold ( 342): Disk at 253:13 changed
04-06 19:51:48.747 D/vold ( 342): Disk at 253:14 changed
04-06 19:51:48.747 D/vold ( 342): Disk at 253:14 changed
04-06 19:51:48.846 D/vold ( 342): Disk at 7:88 changed
04-06 19:51:48.879 D/vold ( 342): Disk at 7:96 changed
04-06 19:51:48.882 D/vold ( 342): Disk at 7:104 changed
04-06 19:51:48.885 D/vold ( 342): Disk at 253:15 changed
04-06 19:51:48.886 D/vold ( 342): Disk at 253:15 changed
04-06 19:51:48.888 D/vold ( 342): Disk at 253:16 changed
04-06 19:51:48.888 D/vold ( 342): Disk at 253:16 changed
04-06 19:51:48.890 D/vold ( 342): Disk at 7:112 changed
04-06 19:51:48.896 D/vold ( 342): Disk at 253:17 changed
04-06 19:51:48.896 D/vold ( 342): Disk at 253:17 changed
04-06 19:51:48.914 D/vold ( 342): Disk at 7:120 changed
04-06 19:51:48.920 D/vold ( 342): Disk at 253:18 changed
04-06 19:51:48.920 D/vold ( 342): Disk at 253:18 changed
04-06 19:51:48.967 D/vold ( 342): Disk at 7:128 changed
04-06 19:51:48.968 D/vold ( 342): Disk at 7:136 changed
04-06 19:51:48.972 D/vold ( 342): Disk at 253:19 changed
04-06 19:51:48.972 D/vold ( 342): Disk at 253:19 changed
04-06 19:51:48.974 D/vold ( 342): Disk at 253:20 changed
04-06 19:51:48.974 D/vold ( 342): Disk at 253:20 changed
04-06 19:51:48.982 D/vold ( 342): Disk at 7:144 changed
04-06 19:51:48.988 D/vold ( 342): Disk at 253:21 changed
04-06 19:51:48.989 D/vold ( 342): Disk at 253:21 changed
04-06 19:51:49.006 D/vold ( 342): Disk at 7:152 changed
04-06 19:51:49.013 D/vold ( 342): Disk at 253:22 changed
04-06 19:51:49.013 D/vold ( 342): Disk at 253:22 changed
04-06 19:51:49.050 D/vold ( 342): Disk at 7:160 changed
04-06 19:51:49.054 D/vold ( 342): Disk at 7:168 changed
04-06 19:51:49.060 D/vold ( 342): Disk at 253:23 changed
04-06 19:51:49.060 D/vold ( 342): Disk at 253:23 changed
04-06 19:51:49.062 D/vold ( 342): Disk at 7:176 changed
04-06 19:51:49.070 D/vold ( 342): Disk at 7:184 changed
04-06 19:51:49.075 D/vold ( 342): Disk at 7:192 changed
04-06 19:51:49.077 D/vold ( 342): Disk at 253:24 changed
04-06 19:51:49.077 D/vold ( 342): Disk at 253:24 changed
04-06 19:51:49.081 D/vold ( 342): Disk at 253:25 changed
04-06 19:51:49.081 D/vold ( 342): Disk at 253:25 changed
04-06 19:51:49.099 D/vold ( 342): Disk at 7:200 changed
04-06 19:51:49.105 D/vold ( 342): Disk at 253:26 changed
04-06 19:51:49.105 D/vold ( 342): Disk at 253:26 changed
04-06 19:51:49.152 D/vold ( 342): Disk at 7:208 changed
04-06 19:51:49.154 D/vold ( 342): Disk at 7:216 changed
04-06 19:51:49.158 D/vold ( 342): Disk at 253:27 changed
04-06 19:51:49.159 D/vold ( 342): Disk at 253:27 changed
04-06 19:51:49.159 D/vold ( 342): Disk at 253:28 changed
04-06 19:51:49.160 D/vold ( 342): Disk at 253:28 changed
04-06 19:51:49.168 D/vold ( 342): Disk at 7:224 changed
04-06 19:51:49.175 D/vold ( 342): Disk at 7:232 changed
04-06 19:51:49.182 D/vold ( 342): Disk at 7:240 changed
04-06 19:51:49.189 D/vold ( 342): Disk at 253:29 changed
04-06 19:51:49.189 D/vold ( 342): Disk at 253:29 changed
04-06 19:51:49.257 I/servicemanager( 331): Adding 'u:r:apexd:s0' service
(apexservice:424)
04-06 19:51:49.281 D/io_stats( 366): !@ 179,0 r 35902 954987 w 4786 635360 d 130
1142792 f 0 0 iot 15916 0 th 0 0 0 pt 0 inp 0 0 23.458
04-06 19:51:49.311 I/vaultkeeper( 406): There is no
property(ro.factory.factory_binary)
04-06 19:51:49.311 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client]
/vendor/bin/vaultkeeperd. => [Vault] VK. [CMD NO.] 8869
04-06 19:51:49.311 I/VaultKeeper_COMMON( 406): [CMD:INITIALIZE]
04-06 19:51:49.805 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:49.806 I/vaultkeeper( 406): VAULTKEEPER SERVICE READY!
04-06 19:51:49.829 I/derive_sdk( 526): Read version 5 from 7
04-06 19:51:49.830 I/derive_sdk( 526): Read version 5 from 4
04-06 19:51:49.831 I/derive_sdk( 526): Read version 5 from 6
04-06 19:51:49.832 I/derive_sdk( 526): Read version 5 from 3
04-06 19:51:49.833 I/derive_sdk( 526): Read version 4 from 1
04-06 19:51:49.833 I/derive_sdk( 526): Read version 5 from 10
04-06 19:51:49.833 I/derive_sdk( 526): Read version 5 from 2
04-06 19:51:49.834 I/derive_sdk( 526): Read version 5 from 8
04-06 19:51:49.834 I/derive_sdk( 526): Read version 5 from 5
04-06 19:51:49.835 I/derive_sdk( 526): Read version 4 from 9
04-06 19:51:49.835 I/derive_sdk( 526): extension r version is 5
04-06 19:51:49.836 I/derive_sdk( 526): extension s version is 5
04-06 19:51:49.868 D/vold ( 342): initUser0
04-06 19:51:49.868 D/FsCrypt ( 342): fscrypt_init_user0
04-06 19:51:49.868 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys
04-06 19:51:49.869 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/ce
04-06 19:51:49.873 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/de
04-06 19:51:49.877 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/ext
04-06 19:51:49.888 D/FsCrypt ( 342): load_all_de_keys
04-06 19:51:49.888 E/KeyStorage( 342): retrieveKey :
/data/misc/vold/user_keys/de/0
04-06 19:51:49.897 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:49.898 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:49.898 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:49.899 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:49.901 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:49.901 E/KeyStorage( 342): retrieveKey success :
/data/misc/vold/user_keys/de/0
04-06 19:51:49.901 D/vold ( 342): Installed fscrypt key with ref
a31d1acdd84dfdddf74b5028dc12ccd2 to /data
04-06 19:51:49.902 D/vold ( 342): Added fscrypt-provisioning key for
a31d1acdd84dfdddf74b5028dc12ccd2 to session keyring
04-06 19:51:49.902 D/FsCrypt ( 342): Installed de key for user 0
04-06 19:51:49.902 D/FsCrypt ( 342): fscrypt_prepare_user_storage for volume null,
user 0, serial 0, flags 1
04-06 19:51:49.902 E/FsCrypt ( 342): Preparing: /data/system/users/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/misc/profiles/cur/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/system_de/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/misc_de/0
04-06 19:51:49.904 E/FsCrypt ( 342): Preparing: /data/vendor_de/0
04-06 19:51:49.904 E/FsCrypt ( 342): Preparing: /data/user_de/0
04-06 19:51:49.904 D/FsCrypt ( 342): lookup_policy 0
04-06 19:51:49.904 I/vold ( 342): Verified that /data/system_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/misc_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/vendor_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/user_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 D/FsCrypt ( 342): prepare_subdirs
04-06 19:51:49.905 D/voldUtils( 342): /system/bin/vold_prepare_subdirs
04-06 19:51:49.905 D/voldUtils( 342): prepare
04-06 19:51:49.905 D/voldUtils( 342):
04-06 19:51:49.905 D/voldUtils( 342): 0
04-06 19:51:49.905 D/voldUtils( 342): 1
04-06 19:51:49.944 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 1000 gid
1000 context u:object_r:system_data_file:s0:c512,c768 on path: /data/user_de/0
04-06 19:51:49.945 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:vold_data_file:s0 on path: /data/misc_de/0/vold
04-06 19:51:49.947 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:storaged_data_file:s0 on path: /data/misc_de/0/storaged
04-06 19:51:49.953 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:rollback_data_file:s0 on path: /data/misc_de/0/rollback
04-06 19:51:49.957 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:apex_rollback_data_file:s0 on path: /data/misc_de/0/apexrollback
04-06 19:51:49.961 D/vold_prepare_subdirs( 528): Setting up mode 711 uid 0 gid 0
context u:object_r:apex_module_data_file:s0 on path: /data/misc_de/0/apexdata
04-06 19:51:49.964 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_wifi_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.wifi
04-06 19:51:49.968 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.tethering
04-06 19:51:49.971 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_permission_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.permission
04-06 19:51:49.972 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.samsung.android.shell
04-06 19:51:49.976 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.samsung.android.ipm
04-06 19:51:49.979 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.media.swcodec
04-06 19:51:49.981 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.os.statsd
04-06 19:51:49.983 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.resolv
04-06 19:51:49.985 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.mediaprovider
04-06 19:51:49.986 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.appsearch
04-06 19:51:49.988 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.extservices
04-06 19:51:49.990 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.neuralnetworks
04-06 19:51:49.992 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.ipsec
04-06 19:51:49.994 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.adbd
04-06 19:51:49.995 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.cellbroadcast
04-06 19:51:49.997 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.conscrypt
04-06 19:51:49.999 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.media
04-06 19:51:50.001 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.art
04-06 19:51:50.003 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.apex.cts.shim
04-06 19:51:50.004 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.sdkext
04-06 19:51:50.006 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.scheduling
04-06 19:51:50.008 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.tzdata
04-06 19:51:50.009 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.vndk.v31
04-06 19:51:50.011 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.i18n
04-06 19:51:50.013 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.runtime
04-06 19:51:50.015 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/sharedlibs
04-06 19:51:50.016 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 1000 gid
1000 context u:object_r:user_profile_root_file:s0:c512,c768 on path:
/data/misc/profiles/cur/0
04-06 19:51:50.017 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 1000 gid
1000 context u:object_r:fingerprint_vendor_data_file:s0 on path:
/data/vendor_de/0/fpdata
04-06 19:51:50.019 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 1000 gid
1000 context u:object_r:face_vendor_data_file:s0 on path:
/data/vendor_de/0/facedata
04-06 19:51:50.021 D/vold ( 342): Detected support for
FS_IOC_ADD_ENCRYPTION_KEY
04-06 19:51:50.022 I/voldUtils( 342): PROP : security.fbe.fail_cause : , value
K00R
04-06 19:51:50.061 I/derive_classpath( 530): ParseFragments for bootclasspath
04-06 19:51:50.074 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.art/etc/classpaths/bootclasspath.pb
04-06 19:51:50.075 I/derive_classpath( 530): ReadClasspathFragment
/system/etc/classpaths/bootclasspath.pb
04-06 19:51:50.075 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.appsearch/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.conscrypt/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.i18n/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.ipsec/etc/classpaths/bootclasspath.pb
04-06 19:51:50.077 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.media/etc/classpaths/bootclasspath.pb
04-06 19:51:50.078 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.mediaprovider/etc/classpaths/bootclasspath.pb
04-06 19:51:50.079 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.os.statsd/etc/classpaths/bootclasspath.pb
04-06 19:51:50.080 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.permission/etc/classpaths/bootclasspath.pb
04-06 19:51:50.081 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.scheduling/etc/classpaths/bootclasspath.pb
04-06 19:51:50.082 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.sdkext/etc/classpaths/bootclasspath.pb
04-06 19:51:50.083 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.tethering/etc/classpaths/bootclasspath.pb
04-06 19:51:50.084 I/derive_classpath( 530): not installing
/apex/com.android.tethering/javalib/framework-connectivity-t.jar with
min_sdk_version 33
04-06 19:51:50.084 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.wifi/etc/classpaths/bootclasspath.pb
04-06 19:51:50.085 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.ipm/etc/classpaths/bootclasspath.pb
04-06 19:51:50.085 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.shell/etc/classpaths/bootclasspath.pb
04-06 19:51:50.086 I/derive_classpath( 530): ParseFragments for
systemserverclasspath
04-06 19:51:50.088 I/derive_classpath( 530): ReadClasspathFragment
/system/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.089 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.appsearch/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.art/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.media/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.os.statsd/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.091 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.permission/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.091 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.scheduling/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.092 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.tethering/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.092 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.ipm/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.093 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.shell/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.094 I/derive_classpath( 530): WriteClasspathExports
/data/system/environ/classpath
04-06 19:51:50.094 I/derive_classpath( 530): WriteClasspathExports content
04-06 19:51:50.094 I/derive_classpath( 530): export BOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar:/apex/com.android.appsearch/javalib/framework-appsearch.jar:/apex/
com.android.conscrypt/javalib/conscrypt.jar:/apex/com.android.ipsec/javalib/
android.net.ipsec.ike.jar:/apex/com.android.media/javalib/updatable-media.jar:/
apex/com.android.mediaprovider/javalib/framework-mediaprovider.jar:/apex/
com.android.os.statsd/javalib/framework-statsd.jar:/apex/com.android.permission/
javalib/framework-permission.jar:/apex/com.android.permission/javalib/framework-
permission-s.jar:/apex/com.android.scheduling/javalib/framework-scheduling.jar:/
apex/com.android.sdkext/javalib/framework-sdkextensions.jar:/apex/
com.android.tethering/javalib/framework-connectivity.jar:/apex/
com.android.tethering/javalib/framework-tethering.jar:/apex/com.android.wifi/
javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/javalib/framework-samsung-
ipm.jar:/apex/com.samsung.android.shell/javalib/framework-samsung-privilege.jar
04-06 19:51:50.094 I/derive_classpath( 530): export DEX2OATBOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar
04-06 19:51:50.094 I/derive_classpath( 530): export SYSTEMSERVERCLASSPATH
/system/framework/com.android.location.provider.jar:/system/framework/
services.jar:/system/framework/ethernet-service.jar:/system/framework/ssrm.jar:/
system/framework/semwifi-service.jar:/apex/com.android.appsearch/javalib/service-
appsearch.jar:/apex/com.android.art/javalib/service-art.jar:/apex/
com.android.media/javalib/service-media-s.jar:/apex/com.android.permission/
javalib/service-permission.jar:/apex/com.samsung.android.ipm/javalib/service-
samsung-ipm.jar:/apex/com.samsung.android.shell/javalib/service-samsung-
privilege.jar
04-06 19:51:50.094 I/derive_classpath( 530): export
STANDALONE_SYSTEMSERVER_JARS /apex/com.android.os.statsd/javalib/service-
statsd.jar:/apex/com.android.scheduling/javalib/service-scheduling.jar:/apex/
com.android.tethering/javalib/service-connectivity.jar
04-06 19:51:50.174 D/ProcessState( 531): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:50.176 I/odsign ( 531): Trying to retrieve existing HMAC key...
04-06 19:51:50.178 I/odsign ( 531): Trying to retrieve existing keystore key...
04-06 19:51:50.199 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:50.199 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:50.199 W/keymint_tee( 380): [WRN]begin req PARAMS: A128, D4,
04-06 19:51:50.201 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:50.201 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:50.202 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:50.203 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:50.204 I/odsign ( 531): Verified public key signature.
04-06 19:51:50.204 E/odsign ( 531): Initialized Keystore key.
04-06 19:51:50.211 I/odsign ( 531): Found and verified existing public key
certificate: /data/misc/odsign/key.cert
04-06 19:51:50.395 I/odrefresh( 533): ART APEX version 331413030
04-06 19:51:50.509 I/odrefresh( 533): Incomplete system_server artifacts. Missing
file:
'/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex'
04-06 19:51:50.517 I/odrefresh( 531): odrefresh terminated by exit(79)
04-06 19:51:50.519 I/odsign ( 531): /data/misc/odsign/odsign.info.signature
matches.
04-06 19:51:50.519 I/odsign ( 531): Loaded /data/misc/odsign/odsign.info
04-06 19:51:50.574 I/odsign ( 531): All root hashes match.
04-06 19:51:50.615 I/odrefresh( 534): ART APEX version 331413030
04-06 19:51:50.633 I/odrefresh( 534): Incomplete system_server artifacts. Missing
file:
'/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex'
04-06 19:51:50.641 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/cache-info.xml
04-06 19:51:50.642 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.art
04-06 19:51:50.751 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.oat
04-06 19:51:51.040 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.vdex
04-06 19:51:51.095 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.100 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.120 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.130 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.art
04-06 19:51:51.186 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.odex
04-06 19:51:51.282 D/io_stats( 366): !@ 179,0 r 38422 1001983 w 4871 649080 d 378
2580488 f 0 0 iot 17500 0 th 0 0 0 pt 0 inp 0 1 25.459
04-06 19:51:52.566 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.vdex
04-06 19:51:52.593 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.599 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.615 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.621 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.art
04-06 19:51:52.625 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.odex
04-06 19:51:52.639 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.vdex
04-06 19:51:52.643 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.650 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.788 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.793 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.art
04-06 19:51:52.802 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.odex
04-06 19:51:52.894 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.vdex
04-06 19:51:52.898 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.905 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.915 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.922 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.928 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.950 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.952 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art
04-06 19:51:52.959 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex
04-06 19:51:52.995 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex
04-06 19:51:53.002 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art
04-06 19:51:53.014 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex
04-06 19:51:53.042 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex
04-06 19:51:53.044 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.art
04-06 19:51:53.052 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.odex
04-06 19:51:53.062 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.vdex
04-06 19:51:53.067 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.art
04-06 19:51:53.074 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.odex
04-06 19:51:53.086 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.vdex
04-06 19:51:53.094 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art
04-06 19:51:53.099 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex
04-06 19:51:53.135 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex
04-06 19:51:53.204 I/odrefresh( 534): Compiling
/apex/com.android.tethering/javalib/service-connectivity.jar:
/apex/com.android.art/bin/dex2oat32
--dex-file=/apex/com.android.tethering/javalib/service-connectivity.jar --dex-fd=5
--android-root=out/empty --abort-on-hard-verifier-error --no-abort-on-soft-
verifier-error --compilation-reason=boot --image-format=lz4 --force-determinism --
resolve-startup-const-strings=true --avoid-storing-invocation --generate-mini-
debug-info --strip --instruction-set=arm --compiler-filter=speed --app-image-fd=6
--oat-fd=7 --output-vdex-fd=8
--oat-location=/data/misc/apexdata/com.android.art/dalvik-cache/arm/
[email protected]@[email protected]@classes.odex --runtime-
arg
-Xbootclasspath:/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/
javalib/core-libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/
com.android.art/javalib/bouncycastle.jar:/apex/com.android.art/javalib/apache-
xml.jar:/system/framework/framework.jar:/system/framework/framework-graphics.jar:/
system/framework/ext.jar:/system/framework/telephony-common.jar:/system/framework/
voip-common.jar:/system/framework/ims-common.jar:/system/framework/knoxsdk.jar:/
system/framework/knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/
framework/uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/
esecomm.jar:/system/framework/sem-telephony-common.jar:/apex/com.android.i18n/
javalib/core-icu4j.jar:/apex/com.android.appsearch/javalib/framework-
appsearch.jar:/apex/com.android.conscrypt/javalib/conscrypt.jar:/apex/
com.android.ipsec/javalib/android.net.ipsec.ike.jar:/apex/com.android.media/
javalib/updatable-media.jar:/apex/com.android.mediaprovider/javalib/framework-
mediaprovider.jar:/apex/com.android.os.statsd/javalib/framework-statsd.jar:/apex/
com.android.permission/javalib/framework-permission.jar:/apex/
com.android.permission/javalib/framework-permission-s.jar:/apex/
com.android.scheduling/javalib/framework-scheduling.jar:/apex/com.android.sdkext/
javalib/framework-sdkextensions.jar:/apex/com.android.tethering/javalib/framework-
connectivity.jar:/apex/com.android.tethering/javalib/framework-tethering.jar:/
apex/com.android.wifi/javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/
javalib/framework-samsung-ipm.jar:/apex/com.samsung.android.shell/javalib/
framework-samsung-privilege.jar --runtime-arg -Xbootclasspathfds:-1:-1:-1:-1:-
1:9:10:11:12:13:14:15:16:17:18:19:20:21:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1 --runtime-arg -Xbootclasspathimagefds:22:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1 --runtime-arg -
Xbootclasspathoatfds:23:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1 --runtime-arg -Xbootclasspathvdexfds:24:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1
--boot-image=/data/misc/apexdata/com.android.art/dalvik-cache/boot.art --class-
loader-context=PCL[];PCL[/system/framework/com.android.location.provider.jar:/
system/framework/services.jar:/system/framework/ethernet-service.jar:/system/
framework/ssrm.jar:/system/framework/semwifi-service.jar:/apex/
com.android.appsearch/javalib/service-appsearch.jar:/apex/com.android.art/javalib/
service-art.jar:/apex/com.android.media/javalib/service-media-s.jar:/apex/
com.android.permission/javalib/service-permission.jar:/apex/
com.samsung.android.ipm/javalib/service-samsung-ipm.jar:/apex/
com.samsung.android.shell/javalib/service-samsung-privilege.jar] --class-loader-
context-fds=25:26:27:28:29:30:31:32:33:34:35 [timeout 90s]
04-06 19:51:53.282 D/io_stats( 366): !@ 179,0 r 39448 1085991 w 6030 713872 d 546
3561480 f 0 0 iot 19416 0 th 0 0 0 pt 0 inp 0 10 27.459
04-06 19:51:53.283 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2252108
avail 3359740 actv(f) 116324 inactv(f) 970984 dirty 36404 wb 344 anonpg 27200 slab
122144
04-06 19:51:53.433 W/dex2oat32( 542): Using default instruction set features for
ARM CPU variant (default) using conservative defaults
04-06 19:51:53.433 I/dex2oat32( 542): /apex/com.android.art/bin/dex2oat32 --dex-
file=/apex/com.android.tethering/javalib/service-connectivity.jar --dex-fd=5 --
android-root=out/empty --abort-on-hard-verifier-error --no-abort-on-soft-verifier-
error --compilation-reason=boot --force-determinism --resolve-startup-const-
strings=true --avoid-storing-invocation --generate-mini-debug-info --strip --
compiler-filter=speed --app-image-fd=6 --oat-fd=7 --output-vdex-fd=8 --oat-
location=/data/misc/apexdata/com.android.art/dalvik-cache/arm/
[email protected]@[email protected]@classes.odex --class-
loader-context=PCL[];PCL[/system/framework/com.android.location.provider.jar:/
system/framework/services.jar:/system/framework/ethernet-service.jar:/system/
framework/ssrm.jar:/system/framework/semwifi-service.jar:/apex/
com.android.appsearch/javalib/service-appsearch.jar:/apex/com.android.art/javalib/
service-art.jar:/apex/com.android.media/javalib/service-media-s.jar:/apex/
com.android.permission/javalib/service-permission.jar:/apex/
com.samsung.android.ipm/javalib/service-samsung-ipm.jar:/apex/
com.samsung.android.shell/javalib/service-samsung-privilege.jar] --class-loader-
context-fds=25:26:27:28:29:30:31:32:33:34:35
04-06 19:51:53.448 I/dex2oat32( 542): setting boot class path to
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar:/apex/com.android.appsearch/javalib/framework-appsearch.jar:/apex/
com.android.conscrypt/javalib/conscrypt.jar:/apex/com.android.ipsec/javalib/
android.net.ipsec.ike.jar:/apex/com.android.media/javalib/updatable-media.jar:/
apex/com.android.mediaprovider/javalib/framework-mediaprovider.jar:/apex/
com.android.os.statsd/javalib/framework-statsd.jar:/apex/com.android.permission/
javalib/framework-permission.jar:/apex/com.android.permission/javalib/framework-
permission-s.jar:/apex/com.android.scheduling/javalib/framework-scheduling.jar:/
apex/com.android.sdkext/javalib/framework-sdkextensions.jar:/apex/
com.android.tethering/javalib/framework-connectivity.jar:/apex/
com.android.tethering/javalib/framework-tethering.jar:/apex/com.android.wifi/
javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/javalib/framework-samsung-
ipm.jar:/apex/com.samsung.android.shell/javalib/framework-samsung-privilege.jar
04-06 19:51:53.510 I/dex2oat32( 542): Using CollectorTypeCC GC.
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.binderDied()
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0x2] couldn't find
method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0x8] couldn't find
method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0xE] illegal
method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied() failed to verify:
void com.android.server.NsdService$NsdServiceConnector.binderDied(): [0xE] 'this'
argument 'Reference: com.android.server.NsdService$NsdStateMachine' not instance of
'Reference: android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x13] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x13] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x14] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x14] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x14] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x14] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.startDaemon()
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x2] couldn't
find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x8] couldn't
find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xF] illegal
method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x14] illegal
method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon() failed to verify:
void com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x14] 'this'
argument 'Reference: com.android.server.NsdService$NsdStateMachine' not instance of
'Reference: android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x2]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x8]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xF] illegal
method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x14]
illegal method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int) failed to
verify: void com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int):
[0x14] 'this' argument 'Reference: com.android.server.NsdService$NsdStateMachine'
not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.unregisterService(int)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x2]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x8]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xF]
illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x15]
illegal method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int) failed to
verify: void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x15]
'this' argument 'Reference: com.android.server.NsdService$NsdStateMachine' not
instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:54.271 F/dex2oat32( 542): compiler_driver.cc:863] Had a hard failure
verifying all classes, and was asked to abort in such situations. Please check the
log.
04-06 19:51:54.307 E/odrefresh( 534): Compilation of system_server failed:
04-06 19:51:54.312 I/odrefresh( 531): odrefresh terminated by exit(81)
04-06 19:51:54.312 I/odsign ( 531): odrefresh compiled partial artifacts,
returned 81
04-06 19:51:54.312 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/cache-info.xml" to fs-verity...
04-06 19:51:54.313 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.313 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.314 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.330 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.330 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.331 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.348 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.357 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.art" to fs-verity...
04-06 19:51:54.379 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.379 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.380 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.395 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.396 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.397 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.412 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.444 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.oat" to fs-verity...
04-06 19:51:54.493 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.493 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.494 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.510 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.510 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.511 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.526 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.581 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.vdex" to fs-verity...
04-06 19:51:54.584 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.584 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.584 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.600 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.601 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.602 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.617 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.621 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.622 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.622 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.622 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.638 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.639 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.640 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.655 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.680 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.681 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.681 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.681 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.697 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.697 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.698 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.713 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.716 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.717 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.717 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.717 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.733 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.733 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.734 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.749 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.763 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.art" to fs-verity...
04-06 19:51:54.764 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.764 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.764 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.780 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.781 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.781 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.797 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.799 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.odex" to fs-verity...
04-06 19:51:54.969 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.969 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.969 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.985 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.986 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.987 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.002 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.283 D/io_stats( 366): !@ 179,0 r 39685 1099867 w 6538 736564 d 858
4472864 f 0 0 iot 20860 0 th 0 0 0 pt 0 inp 0 15 29.460
04-06 19:51:55.500 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.vdex" to fs-verity...
04-06 19:51:55.502 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.502 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.502 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.518 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.518 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.519 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.535 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.541 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.542 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.542 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.542 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.558 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.558 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.559 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.574 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.577 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.578 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.579 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.579 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.595 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.595 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.596 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.611 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.617 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.618 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.618 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.618 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.634 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.635 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.636 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.651 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.653 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.art" to fs-verity...
04-06 19:51:55.654 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.655 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.655 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.671 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.671 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.672 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.687 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.694 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.odex" to fs-verity...
04-06 19:51:55.696 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.696 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.696 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.712 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.713 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.714 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.729 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.732 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.vdex" to fs-verity...
04-06 19:51:55.733 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.733 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.733 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.749 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.750 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.750 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.766 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.773 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.774 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.774 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.774 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.790 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.791 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.792 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.807 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.809 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.822 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.822 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.823 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.839 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.839 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.840 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.855 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.896 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.897 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.897 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.897 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.913 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.914 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.915 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.930 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.932 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art" to fs-verity...
04-06 19:51:55.933 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.933 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.934 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.950 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.950 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.951 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.969 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.991 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.001 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.001 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.001 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.017 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.017 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.018 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.033 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.043 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.044 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.044 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.044 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.060 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.061 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.062 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.077 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.091 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.092 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.092 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.093 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.109 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.109 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.110 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.125 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.127 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.128 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.128 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.129 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.144 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.145 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.146 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.161 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.169 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.170 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.170 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.171 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.186 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.187 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.188 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.203 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.204 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.205 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.206 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.206 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.222 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.222 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.223 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.238 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.245 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.246 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.246 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.246 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.262 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.262 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.263 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.278 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.281 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.282 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.282 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.282 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.298 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.298 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.301 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.316 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.321 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.322 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.322 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.323 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.338 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.339 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.340 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.355 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.357 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.360 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.360 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.361 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.376 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.377 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.378 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.393 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.401 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.402 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.402 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.402 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.418 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.418 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.419 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.434 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.436 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.437 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.437 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.438 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.454 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.454 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.455 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.470 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.476 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.478 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.479 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.479 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.495 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.495 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.496 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.511 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.514 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.515 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.515 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.516 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.531 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.532 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.533 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.548 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.551 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.art" to fs-verity...
04-06 19:51:56.552 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.552 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.552 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.568 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.568 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.569 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.584 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.586 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.587 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.587 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.588 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.604 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.604 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.605 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.620 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.624 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.625 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.625 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.626 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.641 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.642 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.643 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.658 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.660 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.661 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.661 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.661 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.677 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.677 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.678 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.693 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.695 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.697 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.697 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.697 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.713 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.713 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.714 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.729 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.731 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.732 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.732 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.733 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.749 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.749 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.750 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.765 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.769 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.770 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.770 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.771 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.786 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.787 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.788 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.803 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.805 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.806 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.806 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.806 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.822 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.823 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.824 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.839 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.845 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.847 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.847 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.847 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.863 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.863 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.864 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.879 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.883 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.883 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.884 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.899 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.900 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.901 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.917 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.918 I/odsign ( 531): On-device signing done.
04-06 19:51:56.939 I/keystore2( 379): keystore2::super_key: keystore.boot_level
1000000000 hits maximum 1000000000, finishing.
04-06 19:51:57.005 I/tzdatacheck( 553): timezone distro dir
/data/misc/zoneinfo/current does not exist. No action required.
04-06 19:51:57.026 I/auditd ( 554): Starting up
04-06 19:51:57.027 I/auditd ( 554): Start at vold.decrypt: none,
ro.crypto.state : encrypted, ro.crypto.type : file
04-06 19:51:57.032 E/auditd ( 554): SELinux: [audit_filter] parsing error.
auditfilter fsck dm_device:blk_file ioctl 0x301;
04-06 19:51:57.032 E/auditd ( 554): is skipped.
04-06 19:51:57.032 E/auditd ( 554): SELinux: [audit_filter] audit_filter_table
is created successfully. filter table line count = 1223 / rule count(atomic) = 534
04-06 19:51:57.036 I/audit_log( 554): Previous audit logfile detected, rotating
04-06 19:51:57.044 E/audit ( 554): type=1403 audit(1680821488.187:11):
auid=4294967295 ses=4294967295 lsm=selinux res=1
04-06 19:51:57.044 E/audit ( 554): type=1300 audit(1680821488.187:11):
arch=40000028 syscall=4 per=8 success=yes exit=1141907 a0=5 a1=f68bf8c0 a2=116c93
a3=ffffffff items=0 ppid=0 pid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init" exe="/system/bin/init"
subj=u:r:kernel:s0 key=(null)
04-06 19:51:57.044 E/audit ( 554): type=1327 audit(1680821488.187:11):
proctitle=2F73797374656D2F62696E2F696E69740073656C696E75785F7365747570
04-06 19:51:57.045 E/audit ( 554): type=1404 audit(1680821488.383:12):
enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1
lsm=selinux res=1
04-06 19:51:57.045 E/audit ( 554): type=1300 audit(1680821488.383:12):
arch=40000028 syscall=4 per=8 success=yes exit=1 a0=5 a1=ffa7afa8 a2=1 a3=14
items=0 ppid=0 pid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init" exe="/system/bin/init"
subj=u:r:kernel:s0 key=(null)
04-06 19:51:57.045 E/audit ( 554): type=1327 audit(1680821488.383:12):
proctitle=2F73797374656D2F62696E2F696E69740073656C696E75785F7365747570
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:13): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop16"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:14): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop17"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:15): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop18"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:16): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop19"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:17): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop20"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:18): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop21"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:19): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop22"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.659:20): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop23"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:21): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop24"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:22): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop25"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:23): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop26"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:24): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop27"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:25): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop28"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:26): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop29"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.663:27): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop30"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:28): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop31"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:29): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop32"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:30): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop33"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:31): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop34"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:32): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop35"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:33): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop36"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:34): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop37"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:35): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop38"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:36): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop39"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:37): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop40"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:38): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop41"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:39): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop42"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:40): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop43"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:41): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop44"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821491.063:42): avc:
denied { read } for pid=293 comm="init" name="u:object_r:vendor_softdog_prop:s0"
dev="tmpfs" ino=7791 scontext=u:r:vendor_init:s0
tcontext=u:object_r:vendor_softdog_prop:s0 tclass=file permissive=0 SEPF_SM-
A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1300 audit(1680821491.063:42):
arch=40000028 syscall=322 per=8 success=yes exit=4294967283 a0=ffffff9c a1=ffc181d8
a2=a8000 a3=0 items=1 ppid=1 pid=293 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init"
exe="/system/bin/init" subj=u:r:vendor_init:s0 key=(null)
04-06 19:51:57.046 E/audit ( 554): type=1302 audit(1680821491.063:42): item=0
name="/dev/__properties__/u:object_r:vendor_softdog_prop:s0" inode=7791 dev=00:10
mode=0100444 ouid=0 ogid=0 rdev=00:00 obj=u:object_r:vendor_softdog_prop:s0
nametype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.047 E/audit ( 554): type=1327 audit(1680821491.063:42):
proctitle=2F73797374656D2F62696E2F696E697400737562636F6E7465787400753A723A76656E646
F725F696E69743A7330003135
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821491.831:43): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="dm-10" scontext=u:r:kernel:s0
tcontext=u:object_r:device:s0 tclass=blk_file permissive=0 SEPF_SM-A135M_12_0001
audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:44): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop45"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:45): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop46"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:46): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop47"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:47): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop48"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:48): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop49"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:49): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop50"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:50): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop51"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:51): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop52"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:52): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop53"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:53): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop54"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:54): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop55"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1305 audit(1680821517.031:81):
audit_pid=554 old=0 auid=4294967295 ses=4294967295 subj=u:r:auditd:s0 res=1
04-06 19:51:57.047 E/audit ( 554): type=1305 audit(1680821517.031:82):
audit_rate_limit=20 old=0 auid=4294967295 ses=4294967295 subj=u:r:auditd:s0 res=1
04-06 19:51:57.238 E/audit ( 554): type=1400 audit(1680821517.231:83): avc:
denied { transition } for pid=556 comm="init" path="/system/bin/sh" dev="dm-4"
ino=1200 scontext=u:r:init:s0 tcontext=u:r:su:s0 tclass=process permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.238 E/audit ( 554): type=1300 audit(1680821517.231:83):
arch=40000028 syscall=11 per=8 success=yes exit=4294967283 a0=f776a470 a1=f777e5e0
a2=f7773ff0 a3=10 items=1 ppid=1 pid=556 auid=4294967295 uid=1000 gid=1000
euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none)
ses=4294967295 comm="init" exe="/system/bin/init" subj=u:r:init:s0 key=(null)
04-06 19:51:57.238 E/audit ( 554): type=1302 audit(1680821517.231:83): item=0
name="/system/bin/sh" inode=1200 dev=fd:04 mode=0100755 ouid=0 ogid=2000 rdev=00:00
obj=u:object_r:shell_exec:s0 nametype=NORMAL cap_fp=0000000000000000
cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.238 E/audit ( 554): type=1327 audit(1680821517.231:83):
proctitle=2F73797374656D2F62696E2F696E6974007365636F6E645F7374616765
04-06 19:51:57.264 E/audit ( 554): type=1400 audit(1680821517.259:84): avc:
denied { create } for pid=293 comm="init" name="exynos"
scontext=u:r:vendor_init:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
permissive=0 SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.264 E/audit ( 554): type=1300 audit(1680821517.259:84):
arch=40000028 syscall=323 per=8 success=yes exit=4294967283 a0=ffffff9c a1=f7a844a0
a2=1f9 a3=3 items=2 ppid=1 pid=293 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init"
exe="/system/bin/init" subj=u:r:vendor_init:s0 key=(null)
04-06 19:51:57.264 E/audit ( 554): type=1302 audit(1680821517.259:84): item=0
name="/data/" inode=3 dev=fd:0a mode=040771 ouid=1000 ogid=1000 rdev=00:00
obj=u:object_r:system_data_root_file:s0 nametype=PARENT cap_fp=0000000000000000
cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.264 E/audit ( 554): type=1302 audit(1680821517.259:84): item=1
name="/data/exynos" nametype=CREATE cap_fp=0000000000000000 cap_fi=0000000000000000
cap_fe=0 cap_fver=0
04-06 19:51:57.264 E/audit ( 554): type=1327 audit(1680821517.259:84):
proctitle=2F73797374656D2F62696E2F696E697400737562636F6E7465787400753A723A76656E646
F725F696E69743A7330003135
04-06 19:51:57.284 D/io_stats( 366): !@ 179,0 r 39906 1101567 w 6926 750892 d 2194
4495224 f 0 0 iot 21772 0 th 0 0 0 pt 0 inp 0 1 31.461
04-06 19:51:57.322 I/CASS_DEBUG( 557): Start Service... CASS v1.6.5
04-06 19:51:57.322 I/engmode_binder_server( 558): EngineeringMode version =
30.4.01
04-06 19:51:57.322 I/engmode_binder_server( 558): firing up.
EngineeringModeHandler.
04-06 19:51:57.322 D/ProcessState( 558): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:57.323 I/engmode_binder_server( 558): EngineeringModeHandler Service
instantiate()
04-06 19:51:57.323 I/engmode_binder_server( 558): EngineeringModeHandler created
04-06 19:51:57.325 I/engmode_steady( 558): read from steady(69632)
04-06 19:51:57.325 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.325 I/engmode_tlc( 558): EM C/C : 0000c021/00000000
04-06 19:51:57.326 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.326 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.326 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.327 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.337 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.338 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.338 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.341 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.342 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.342 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0xf02d0010
04-06 19:51:57.342 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.376 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.376 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.376 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.376 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.376 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.376 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.376 E/engmode_world( 558): Failed to init core(0xf02d0010)
04-06 19:51:57.378 I/engmode_steady( 558): read from steady(11264)
04-06 19:51:57.378 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.378 I/engmode_tlc( 558): EM C/C : 0000c019/00000001
04-06 19:51:57.378 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.378 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.378 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.379 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.387 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.387 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.388 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.400 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.400 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.401 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.402 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.402 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.402 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0x00000000
04-06 19:51:57.402 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.417 I/flags_health_check( 563): ServerConfigurableFlagsReset
reset_mode value: 0
04-06 19:51:57.417 I/flags_health_check( 563): ServerConfigurableFlagsReset
attempted boot count is under threshold, skipping reset.
04-06 19:51:57.428 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.428 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.428 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.428 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.428 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.428 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.431 I/engmode_steady( 558): read from steady(11264)
04-06 19:51:57.432 I/engmode_steady( 558): read from steady(69632)
04-06 19:51:57.432 I/engmode_world( 558): No server time
04-06 19:51:57.432 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.432 I/engmode_tlc( 558): EM C/C : 0000c003/00000002
04-06 19:51:57.432 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.432 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.432 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.433 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.441 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.441 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.442 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.445 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.445 E/scs ( 564): [main] scs running state 1
04-06 19:51:57.445 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.445 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0xf02d0010
04-06 19:51:57.445 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.445 D/scs ( 564): bUseSecPartition : true
04-06 19:51:57.447 D/scs ( 564): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] salesCode : CTI
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] salesCode length : 3
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] mainPath:
/prism/etc/carriers
04-06 19:51:57.447 D/scs ( 564): [initData] SALES_CODE : CTI
04-06 19:51:57.448 D/scs ( 564): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:57.448 D/scs ( 564): [amendOmcNwCode] SALES_CODE is single.
OMCNW_CODE should be the same
04-06 19:51:57.449 D/scs ( 564): [parseOmcData]netbased_code ARO
04-06 19:51:57.449 D/scs ( 564): [initData]SALES_CODE : CTI
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:57.449 D/scs ( 564): [initData]OMCNW_CODE : CTI
04-06 19:51:57.449 D/scs ( 564): [initData]OMCNW_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_RES_PATH : /omr/res
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_ETC_PATH :
/prism/etc/carriers/single/CTI
04-06 19:51:57.449 D/scs ( 564): [initData]TSS_TYPE : NETBASED
04-06 19:51:57.449 E/scs ( 564): [startScsState] start scs running(1)
04-06 19:51:57.449 D/scs ( 564): [setDmRwProperties] persist : true
04-06 19:51:57.451 D/scs ( 564): [makeFirstBootCompletedFlag] firstBootCheck
file is created : A135MOWO2AVK2
04-06 19:51:57.452 D/scs ( 564): [setCustomerLocale] customer filepath :
/optics/configs/carriers/single/CTI/conf/customer.xml
04-06 19:51:57.453 D/scs ( 564): [setConvertLocale] pLocation is spanish_latin
04-06 19:51:57.453 D/scs ( 564): [setConvertLocale] convertLocaleFilePath
/system/etc/convert_locale_data.json
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] convertLocaleValue
spanish_latin
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] persist.sys.locale : es-US
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] locale property set
04-06 19:51:57.455 D/scs ( 564): [setCustomerLocale] pLocation:spanish_latin
04-06 19:51:57.463 D/scs ( 564): [setCarrierIdPath]Carrerid etc path : ARO
04-06 19:51:57.464 E/scs ( 564): [setDmRwProperties] persist properties set :
True
04-06 19:51:57.464 D/scs ( 564): [setScsRunningState] setScsRunningState : 2
04-06 19:51:57.465 E/scs ( 564): [startScsState] start scs running(2)
04-06 19:51:57.465 D/scs ( 564): [setTssCheckFlag]setTssCheckedFlag : 0
04-06 19:51:57.465 D/scs ( 564): [setTssCheckFlag]mdc.scs.tss_checked: 0
04-06 19:51:57.465 D/scs ( 564): [setActivatedId]singlesku is true
04-06 19:51:57.466 I/Vaultkeeper_MGR_system( 564): Got instance of
VaultKeeperManager
04-06 19:51:57.466 D/hw-ProcessState( 564): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:57.467 I/Vaultkeeper_MGR_system( 564): Got service of ISehVaultKeeper
04-06 19:51:57.468 I/VaultKeeper_HIDL_Service( 407): System client (//0/564)
04-06 19:51:57.468 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client] /system/bin/scs.
=> [Vault] AID. [CMD NO.] 1295
04-06 19:51:57.468 I/VaultKeeper_COMMON( 406): [CMD:CHECK_CLIENT_REGISTERED]
04-06 19:51:57.469 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:57.469 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client] /system/bin/scs.
=> [Vault] AID. [CMD NO.] 4626
04-06 19:51:57.469 I/VaultKeeper_COMMON( 406): [CMD:READ_UNSHELTERED]
04-06 19:51:57.482 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.482 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.482 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.482 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.483 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.483 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.483 E/engmode_world( 558): Failed emIsTokenInstalled(0xf02d0010)
04-06 19:51:57.483 I/engmode_binder_server( 558): VERSION = 20/0xf02d0010
04-06 19:51:57.483 I/engmode_cache_list( 558): clist created(20)
04-06 19:51:57.483 I/engmode_cp_watcher( 558): Successfully create thread(0)
04-06 19:51:57.484 E/engmode_cp_watcher( 558): Failed to Connect_RILD, ret : 4
04-06 19:51:57.484 I/vndservicemanager( 333): Adding 'u:r:emservice:s0' service
(EngineeringModeService:558)
04-06 19:51:57.484 I/engmode_binder_server( 558): EngineeringModeHandlerService =
0
04-06 19:51:57.484 I/engmode_binder_server( 558): EngineeringModeHandler is now
ready
04-06 19:51:57.504 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]check VaultKeeperManager read
result : 0
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]set Activated ID : CTI
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]set Activated ID
04-06 19:51:57.506 D/scs ( 564): [setActivatedId]sales code to activatedid
04-06 19:51:57.506 D/scs ( 564): [setActivatedId]set mdc.singlesku.activated :
true
04-06 19:51:57.507 D/scs ( 564): [setTssCheckFlag]setTssCheckedFlag : 1
04-06 19:51:57.507 D/scs ( 564): [setTssCheckFlag]mdc.scs.tss_checked: 1
04-06 19:51:57.507 E/scs ( 564): [setTssProperties]mdc.scs.tss_checked : 1
04-06 19:51:57.507 D/scs ( 564): [setScsRunningState] setScsRunningState : 3
04-06 19:51:57.507 E/scs ( 564): [startScsState] start scs running(3)
04-06 19:51:57.507 D/scs ( 564): [setRsProperties]setRsProperties
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): encoded
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): decoding and unzip finish
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): use unCompDataBuff. encoded
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): Free unCompDataBuff
04-06 19:51:57.508 D/scs ( 564): [setGmsProperty]setGmsProperty()
04-06 19:51:57.508 D/scs ( 564): [setGmsProperty]propBootReferenceId is set as
carrierId : ARO
04-06 19:51:57.510 D/scs ( 564): [isConfigEncoded] isConfigEncoded() :
/optics/configs/carriers/single/ARO/conf/system/cscfeature.xml
04-06 19:51:57.510 D/scs ( 564): [isConfigEncoded] isConfigEncoded() : true
04-06 19:51:57.510 D/scs ( 564): [setGmsProperty]Set GMS Client ID based on
ReferenceId ARO
04-06 19:51:57.510 D/scs ( 564): Xml is Encoded? 1
04-06 19:51:57.510 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.am
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.gmm
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.ms
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.yt
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.wal
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.cr
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.vs
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.pg
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.tx
04-06 19:51:57.511 D/scs ( 564): [setStsProperty]setStsProperty()
04-06 19:51:57.511 D/scs ( 564): [isConfigEncoded] isConfigEncoded() :
/optics/configs/carriers/single/CTI/conf/system/cscfeature.xml
04-06 19:51:57.511 D/scs ( 564): [isConfigEncoded] isConfigEncoded() : true
04-06 19:51:57.511 D/scs ( 564): [setStsProperty]Set STS property based on
CarrierId CTI
04-06 19:51:57.511 D/scs ( 564): Xml is Encoded? 1
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.sts.property
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]setFacebookProperty()
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]bSupportTss is true
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]set partnerid from
activatedid
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]Read OMC_B2B_FILE,
Change the path to B2C from B2B
04-06 19:51:57.513 D/scs ( 564): [setFacebookProperty]propCarrierId:CTI szB2C:
04-06 19:51:57.514 D/scs ( 564): [setFacebookProperty]conffilePath
:/prism/etc/carriers/single/CTI/appmanager.conf
04-06 19:51:57.515 D/scs ( 564): [setPropertyFromData]Set
ro.csc.facebook.partnerid : americamovil:5694bbfe-ff8b-4ea6-a106-e3e93b21c647
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]setAmazoneProperty()
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]bSupportTss is true
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]bootCarrierId:CTI
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]Amazon Config:
/system/etc/amzpartnerid.conf
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]Device doesn't have
Amazon conf corresponding to CTI
04-06 19:51:57.515 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]find logic start
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]logic : 1
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]find logic end
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]bSupportTss is true
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
country:AR
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
carrier:CTI
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]bootCarrierId:CTI
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/prism/etc/carriers/CTI/spotify.preload
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/prism/etc/carriers/single/CTI/spotify.preload
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/system/etc/spotify.preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]spotify.conf start
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]Matching Country : AR
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]Matching Exclusion
Carrier : CTI
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]preloadPartner : samsung-
mobile-preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]preloadReferrer :
samsung-mobile-preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]exceptionReferrer :
samsung-mobile-no-promotion
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]NO PRELOAD Spotify !!!
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]spotify.conf end
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]setOathProperty
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]bSupportTss is true
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]set partnerid from
activatedid: CTI
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]bootReferenceId:CTI
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/prism/etc/carriers/CTI/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/prism/etc/carriers/single/CTI/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/system/etc/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]Device doesn't have OATH
conf(OATH config) corresponding to bootReferenceId CTI
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]setNetflixProperty
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]bSupportTss is true
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]set partnerid from
activatedid
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]Read OMC_B2B_FILE, Change
the path to B2C from B2B
04-06 19:51:57.518 D/scs ( 564): [setNetflixProperty]propCarrierId:CTI szB2C:
04-06 19:51:57.518 D/scs ( 564):
[setNetflixProperty]conffilePath:/system/etc/netflixchid.conf
04-06 19:51:57.518 D/scs ( 564): [setNetflixProperty]netflixchid.conf start
04-06 19:51:57.519 D/scs ( 564): [setNetflixProperty]NO netflix channel ID !!!
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]setLinkedinProperty
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]setLinkedinProperty
sales_code : CTI
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]conffilePath :
/system/etc/linkedin.conf
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]linkedin.conf start
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]NOT PRELOADED
Linkedin !!!
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]linkedin.conf end
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]setOfficeProperty
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]setOfficeProperty
sales_code : CTI
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]conffilePath :
/system/etc/Office.conf
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]office.conf start
04-06 19:51:57.521 D/scs ( 564): [setOfficeProperty]PRELOADED Office !!!
04-06 19:51:57.521 D/scs ( 564): [setOfficeProperty]office.conf end
04-06 19:51:57.522 D/scs ( 564):
[setPartnerIdProperties]setPartnerIdProperties : parsing is success
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/1mg.conf
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]1mg.conf,
deviceTrackerId, NONE, ro.trackingId.1mg, NONE
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/bm.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]bm.conf,
deviceTrackerId, NONE, ro.trackingId.com.epi, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/booking.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]booking.conf,
deviceTrackerId, NONE, ro.trackingId.booking, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/foodpanda.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]foodpanda.conf,
deviceTrackerId, NONE, ro.trackingId.com.global.foodpanda.android, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/ivi.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]ivi.conf,
deviceTrackerId, NONE, ro.trackingId.ru.ivi.client, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/kaspersky.com.conf
04-06 19:51:57.523 D/scs ( 564):
[setPropertiesFromConfFile]kaspersky.com.conf, deviceTrackerId, NONE,
ro.trackingId.com.kms.free, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/lazada.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]lazada.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.lazada, ro.channelId.lazada
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/TikTok.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]TikTok.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.com.ss.android.ugc.trill,
ro.channelId.com.ss.android.ugc.trill
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/TikTok.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]TikTok.conf,
deviceTrackerIdeu, deviceChannelIdeu, ro.trackingId.com.zhiliaoapp.musically,
ro.channelId.com.zhiliaoapp.musically
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/twitter.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]twitter.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.com.twitter,
ro.channelId.com.twitter
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/vng-test.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]vng-test.conf,
deviceTrackerId, NONE, ro.trackingId.com.vng.zing.zdice, NONE
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/zalo.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]zalo.conf,
deviceTrackerId, NONE, ro.trackingId.com.zing.zalo, NONE
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/zmp3.conf
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]zmp3.conf,
deviceTrackerId, NONE, ro.trackingId.com.zing.mp3, NONE
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.525 D/scs ( 564): [setScsRunningState] setScsRunningState : 4
04-06 19:51:57.526 E/scs ( 564): [startScsState] start scs running(4)
04-06 19:51:57.526 D/scs ( 564): [startScsState] stopped : done
04-06 19:51:57.569 D/LibBpfLoader( 568): Loading optional ELF object
/apex/com.android.tethering/etc/bpf/test.o with license Apache 2.0
04-06 19:51:57.570 I/LibBpfLoader( 568): Section bpfloader_min_ver value is 2
[0x2]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section bpfloader_max_ver value is 25
[0x19]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section size_of_bpf_map_def value is 120
[0x78]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section size_of_bpf_prog_def value is 92
[0x5c]
04-06 19:51:57.570 I/LibBpfLoader( 568): BpfLoader version 0x00002 processing ELF
object /apex/com.android.tethering/etc/bpf/test.o with ver [0x00002,0x00019)
04-06 19:51:57.571 D/LibBpfLoader( 568): Loaded code section 3
(xdp_drop_ipv4_udp_ether)
04-06 19:51:57.572 D/LibBpfLoader( 568): Adding section 3 to cs list
04-06 19:51:57.573 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream6_map, ret: 7
04-06 19:51:57.573 D/LibBpfLoader( 568): bpf_create_map name bitmap, ret: 8
04-06 19:51:57.573 D/LibBpfLoader( 568): map_fd found at 0 is 7 in
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.573 D/LibBpfLoader( 568): map_fd found at 1 is 8 in
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.574 D/LibBpfLoader( 568): cs[0].name:xdp_drop_ipv4_udp_ether
min_kver:5090000 .max_kver:ffffffff (kvers:41300c6)
04-06 19:51:57.574 I/bpfloader( 568): Loaded object:
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.577 D/LibBpfLoader( 568): Loading critical for Connectivity
(Tethering) ELF object /apex/com.android.tethering/etc/bpf/offload.o with license
Apache 2.0
04-06 19:51:57.577 I/LibBpfLoader( 568): Section bpfloader_min_ver value is 2
[0x2]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section bpfloader_max_ver value is 25
[0x19]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section size_of_bpf_map_def value is 120
[0x78]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section size_of_bpf_prog_def value is 92
[0x5c]
04-06 19:51:57.577 I/LibBpfLoader( 568): BpfLoader version 0x00002 processing ELF
object /apex/com.android.tethering/etc/bpf/offload.o with ver [0x00002,0x00019)
04-06 19:51:57.583 D/LibBpfLoader( 568): Loaded code section 3
(schedcls_tether_downstream6_ether)
04-06 19:51:57.585 D/LibBpfLoader( 568): Loaded relo section 3
(.relschedcls/tether_downstream6_ether)
04-06 19:51:57.585 D/LibBpfLoader( 568): Adding section 3 to cs list
04-06 19:51:57.585 D/LibBpfLoader( 568): Loaded code section 5
(schedcls_tether_upstream6_ether)
04-06 19:51:57.586 D/LibBpfLoader( 568): Loaded relo section 5
(.relschedcls/tether_upstream6_ether)
04-06 19:51:57.586 D/LibBpfLoader( 568): Adding section 5 to cs list
04-06 19:51:57.587 D/LibBpfLoader( 568): Loaded code section 7
(schedcls_tether_downstream6_rawip$4_14)
04-06 19:51:57.588 D/LibBpfLoader( 568): Loaded relo section 7
(.relschedcls/tether_downstream6_rawip$4_14)
04-06 19:51:57.588 D/LibBpfLoader( 568): Adding section 7 to cs list
04-06 19:51:57.588 D/LibBpfLoader( 568): Loaded code section 9
(schedcls_tether_upstream6_rawip$4_14)
04-06 19:51:57.590 D/LibBpfLoader( 568): Loaded relo section 9
(.relschedcls/tether_upstream6_rawip$4_14)
04-06 19:51:57.590 D/LibBpfLoader( 568): Adding section 9 to cs list
04-06 19:51:57.590 D/LibBpfLoader( 568): Loaded code section 11
(schedcls_tether_downstream6_rawip$stub)
04-06 19:51:57.591 D/LibBpfLoader( 568): Adding section 11 to cs list
04-06 19:51:57.591 D/LibBpfLoader( 568): Loaded code section 12
(schedcls_tether_upstream6_rawip$stub)
04-06 19:51:57.592 D/LibBpfLoader( 568): Adding section 12 to cs list
04-06 19:51:57.592 D/LibBpfLoader( 568): Loaded code section 13
(schedcls_tether_downstream4_rawip$5_8)
04-06 19:51:57.595 D/LibBpfLoader( 568): Loaded relo section 13
(.relschedcls/tether_downstream4_rawip$5_8)
04-06 19:51:57.595 D/LibBpfLoader( 568): Adding section 13 to cs list
04-06 19:51:57.595 D/LibBpfLoader( 568): Loaded code section 15
(schedcls_tether_upstream4_rawip$5_8)
04-06 19:51:57.598 D/LibBpfLoader( 568): Loaded relo section 15
(.relschedcls/tether_upstream4_rawip$5_8)
04-06 19:51:57.598 D/LibBpfLoader( 568): Adding section 15 to cs list
04-06 19:51:57.598 D/LibBpfLoader( 568): Loaded code section 17
(schedcls_tether_downstream4_ether$5_8)
04-06 19:51:57.601 D/LibBpfLoader( 568): Loaded relo section 17
(.relschedcls/tether_downstream4_ether$5_8)
04-06 19:51:57.601 D/LibBpfLoader( 568): Adding section 17 to cs list
04-06 19:51:57.601 D/LibBpfLoader( 568): Loaded code section 19
(schedcls_tether_upstream4_ether$5_8)
04-06 19:51:57.603 D/LibBpfLoader( 568): Loaded relo section 19
(.relschedcls/tether_upstream4_ether$5_8)
04-06 19:51:57.603 D/LibBpfLoader( 568): Adding section 19 to cs list
04-06 19:51:57.604 D/LibBpfLoader( 568): Loaded code section 21
(schedcls_tether_downstream4_rawip$opt)
04-06 19:51:57.606 D/LibBpfLoader( 568): Loaded relo section 21
(.relschedcls/tether_downstream4_rawip$opt)
04-06 19:51:57.606 D/LibBpfLoader( 568): Adding section 21 to cs list
04-06 19:51:57.607 D/LibBpfLoader( 568): Loaded code section 23
(schedcls_tether_upstream4_rawip$opt)
04-06 19:51:57.609 D/LibBpfLoader( 568): Loaded relo section 23
(.relschedcls/tether_upstream4_rawip$opt)
04-06 19:51:57.609 D/LibBpfLoader( 568): Adding section 23 to cs list
04-06 19:51:57.610 D/LibBpfLoader( 568): Loaded code section 25
(schedcls_tether_downstream4_ether$opt)
04-06 19:51:57.612 D/LibBpfLoader( 568): Loaded relo section 25
(.relschedcls/tether_downstream4_ether$opt)
04-06 19:51:57.612 D/LibBpfLoader( 568): Adding section 25 to cs list
04-06 19:51:57.613 D/LibBpfLoader( 568): Loaded code section 27
(schedcls_tether_upstream4_ether$opt)
04-06 19:51:57.615 D/LibBpfLoader( 568): Loaded relo section 27
(.relschedcls/tether_upstream4_ether$opt)
04-06 19:51:57.615 D/LibBpfLoader( 568): Adding section 27 to cs list
04-06 19:51:57.616 D/LibBpfLoader( 568): Loaded code section 29
(schedcls_tether_downstream4_rawip$5_4)
04-06 19:51:57.618 D/LibBpfLoader( 568): Loaded relo section 29
(.relschedcls/tether_downstream4_rawip$5_4)
04-06 19:51:57.618 D/LibBpfLoader( 568): Adding section 29 to cs list
04-06 19:51:57.619 D/LibBpfLoader( 568): Loaded code section 31
(schedcls_tether_upstream4_rawip$5_4)
04-06 19:51:57.621 D/LibBpfLoader( 568): Loaded relo section 31
(.relschedcls/tether_upstream4_rawip$5_4)
04-06 19:51:57.621 D/LibBpfLoader( 568): Adding section 31 to cs list
04-06 19:51:57.621 D/LibBpfLoader( 568): Loaded code section 33
(schedcls_tether_downstream4_rawip$4_14)
04-06 19:51:57.624 D/LibBpfLoader( 568): Loaded relo section 33
(.relschedcls/tether_downstream4_rawip$4_14)
04-06 19:51:57.624 D/LibBpfLoader( 568): Adding section 33 to cs list
04-06 19:51:57.624 D/LibBpfLoader( 568): Loaded code section 35
(schedcls_tether_upstream4_rawip$4_14)
04-06 19:51:57.627 D/LibBpfLoader( 568): Loaded relo section 35
(.relschedcls/tether_upstream4_rawip$4_14)
04-06 19:51:57.627 D/LibBpfLoader( 568): Adding section 35 to cs list
04-06 19:51:57.628 D/LibBpfLoader( 568): Loaded code section 37
(schedcls_tether_downstream4_ether$4_14)
04-06 19:51:57.630 D/LibBpfLoader( 568): Loaded relo section 37
(.relschedcls/tether_downstream4_ether$4_14)
04-06 19:51:57.630 D/LibBpfLoader( 568): Adding section 37 to cs list
04-06 19:51:57.631 D/LibBpfLoader( 568): Loaded code section 39
(schedcls_tether_upstream4_ether$4_14)
04-06 19:51:57.635 D/LibBpfLoader( 568): Loaded relo section 39
(.relschedcls/tether_upstream4_ether$4_14)
04-06 19:51:57.635 D/LibBpfLoader( 568): Adding section 39 to cs list
04-06 19:51:57.635 D/LibBpfLoader( 568): Loaded code section 41
(schedcls_tether_downstream4_rawip$stub)
04-06 19:51:57.638 D/LibBpfLoader( 568): Adding section 41 to cs list
04-06 19:51:57.638 D/LibBpfLoader( 568): Loaded code section 42
(schedcls_tether_upstream4_rawip$stub)
04-06 19:51:57.641 D/LibBpfLoader( 568): Adding section 42 to cs list
04-06 19:51:57.641 D/LibBpfLoader( 568): Loaded code section 43
(schedcls_tether_downstream4_ether$stub)
04-06 19:51:57.644 D/LibBpfLoader( 568): Adding section 43 to cs list
04-06 19:51:57.645 D/LibBpfLoader( 568): Loaded code section 44
(schedcls_tether_upstream4_ether$stub)
04-06 19:51:57.648 D/LibBpfLoader( 568): Adding section 44 to cs list
04-06 19:51:57.648 D/LibBpfLoader( 568): Loaded code section 45
(xdp_tether_downstream_ether)
04-06 19:51:57.651 D/LibBpfLoader( 568): Adding section 45 to cs list
04-06 19:51:57.651 D/LibBpfLoader( 568): Loaded code section 46
(xdp_tether_downstream_rawip)
04-06 19:51:57.655 D/LibBpfLoader( 568): Adding section 46 to cs list
04-06 19:51:57.655 D/LibBpfLoader( 568): Loaded code section 47
(xdp_tether_upstream_ether)
04-06 19:51:57.658 D/LibBpfLoader( 568): Adding section 47 to cs list
04-06 19:51:57.658 D/LibBpfLoader( 568): Loaded code section 48
(xdp_tether_upstream_rawip)
04-06 19:51:57.661 D/LibBpfLoader( 568): Adding section 48 to cs list
04-06 19:51:57.666 D/LibBpfLoader( 568): bpf_create_map name tether_error_map,
ret: 7
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name tether_stats_map,
ret: 8
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name tether_limit_map,
ret: 9
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream6_map, ret: 10
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream64_map, ret: 11
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name tether_upstream6_map,
ret: 12
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream4_map, ret: 13
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name tether_upstream4_map,
ret: 14
04-06 19:51:57.669 D/LibBpfLoader( 568): bpf_create_map name tether_dev_map, ret:
15
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 0 is 7 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 1 is 8 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 2 is 9 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 3 is 10 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 4 is 11 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 5 is 12 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 6 is 13 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 7 is 14 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 8 is 15 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.672 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 296, insn offset 37 , insn 118
04-06 19:51:57.672 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 392, insn offset 49 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 528, insn offset 66 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 624, insn offset 78 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 744, insn offset 93 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 848, insn offset 106 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1144, insn offset 143 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1224, insn offset 153 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1296, insn offset 162 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1376, insn offset 172 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1440, insn offset 180 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1528, insn offset 191 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1800, insn offset 225 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 296, insn offset 37 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 392, insn offset 49 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 528, insn offset 66 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 624, insn offset 78 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 752, insn offset 94 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 864, insn offset 108 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 968, insn offset 121 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1184, insn offset 148 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1264, insn offset 158 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1336, insn offset 167 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1416, insn offset 177 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1480, insn offset 185 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1568, insn offset 196 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1840, insn offset 230 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 240, insn offset 30 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 336, insn offset 42 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 472, insn offset 59 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 568, insn offset 71 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 688, insn offset 86 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 792, insn offset 99 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 960, insn offset 120 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1040, insn offset 130 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1112, insn offset 139 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1192, insn offset 149 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1256, insn offset 157 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1344, insn offset 168 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1600, insn offset 200 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1760, insn offset 220 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1904, insn offset 238 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 240, insn offset 30 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 336, insn offset 42 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 472, insn offset 59 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 568, insn offset 71 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 696, insn offset 87 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 808, insn offset 101 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 912, insn offset 114 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1008, insn offset 126 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1088, insn offset 136 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1160, insn offset 145 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1240, insn offset 155 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1304, insn offset 163 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1392, insn offset 174 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1648, insn offset 206 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1808, insn offset 226 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1952, insn offset 244 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 248, insn offset 31 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 632, insn offset 79 , insn 118

You might also like