Related
Hi guys, im compiling CM for our g900h, and i have advanced proyect... but im stuck on a problem y cant figure out how to set the policys
Here are a part of my last log, can you help me on this?
F/SurfaceFlinger( 3577): eglSwapBuffers(0x1, 0x0) failed with 0x0000300d
Code:
--------- beginning of main
I/cm ( 0): ____ _ _ ____ _ _ ____ ____ ____ _ _ _ _ ____ ___
W/auditd ( 3596): type=1325 audit(0.0:2): table=filter family=2 entries=0
W/auditd ( 3596): type=1325 audit(0.0:3): table=mangle family=2 entries=0
W/auditd ( 3596): type=1325 audit(0.0:4): table=nat family=2 entries=0
W/auditd ( 3596): type=1325 audit(0.0:5): table=raw family=2 entries=0
W/auditd ( 3596): type=1325 audit(0.0:6): table=security family=2 entries=0
W/auditd ( 3596): type=1325 audit(0.0:7): table=filter family=3 entries=0
W/auditd ( 3596): type=1325 audit(0.0:8): table=filter family=10 entries=0
W/auditd ( 3596): type=1325 audit(0.0:9): table=mangle family=10 entries=0
W/auditd ( 3596): type=1325 audit(0.0:10): table=raw family=10 entries=0
I/auditd ( 3596): type=1403 audit(0.0:11): policy loaded auid=4294967295 ses=4294967295
W/auditd ( 3596): type=1404 audit(0.0:12): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295
W/init ( 3537): type=1400 audit(0.0:13): avc: denied { write } for name="etc" dev="mmcblk0p18" ino=357 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir
W/init ( 3537): type=1300 audit(0.0:13): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6d3ba60 a2=20241 a3=1b6 items=1 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/init" subj=u:r:init:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:13): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:13): item=0 name="/etc/" inode=357 dev=103:0a mode=040755 ouid=0 ogid=2000 rdev=00:00 obj=u:object_r:system_file:s0
W/auditd ( 3596): type=1320 audit(0.0:13):
W/init ( 3537): type=1400 audit(0.0:14): avc: denied { write } for name="etc" dev="mmcblk0p18" ino=357 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir
W/init ( 3537): type=1300 audit(0.0:14): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6d3ba60 a2=20241 a3=1b6 items=1 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/init" subj=u:r:init:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:14): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:14): item=0 name="/etc/" inode=357 dev=103:0a mode=040755 ouid=0 ogid=2000 rdev=00:00 obj=u:object_r:system_file:s0
W/auditd ( 3596): type=1320 audit(0.0:14):
W/init ( 3537): type=1400 audit(0.0:15): avc: denied { write } for name="etc" dev="mmcblk0p18" ino=357 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir
W/init ( 3537): type=1300 audit(0.0:15): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6d3ba60 a2=20241 a3=1b6 items=1 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/init" subj=u:r:init:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:15): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:15): item=0 name="/etc/" inode=357 dev=103:0a mode=040755 ouid=0 ogid=2000 rdev=00:00 obj=u:object_r:system_file:s0
W/auditd ( 3596): type=1320 audit(0.0:15):
W/init ( 3537): type=1400 audit(0.0:16): avc: denied { write } for name="etc" dev="mmcblk0p18" ino=357 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir
W/init ( 3537): type=1300 audit(0.0:16): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6d3ba60 a2=20241 a3=1b6 items=1 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/init" subj=u:r:init:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:16): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:16): item=0 name="/etc/" inode=357 dev=103:0a mode=040755 ouid=0 ogid=2000 rdev=00:00 obj=u:object_r:system_file:s0
W/auditd ( 3596): type=1320 audit(0.0:16):
W/init ( 1): type=1400 audit(0.0:17): avc: denied { mounton } for path="/preload" dev="mmcblk0p20" ino=2 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir
W/auditd ( 3596): type=1305 audit(0.0:18): audit_pid=3571 old=0 auid=4294967295 ses=4294967295
W/auditd ( 3596): subj=u:r:logd:s0 res=1
W/auditd ( 3596): type=1305 audit(0.0:19): audit_rate_limit=20 old=0 auid=4294967295 ses=4294967295
W/auditd ( 3596): subj=u:r:logd:s0 res=1
W/init ( 3583): type=1400 audit(0.0:20): avc: denied { entrypoint } for path="/system/bin/auditd" dev="mmcblk0p18" ino=173 scontext=u:r:logd:s0 tcontext=u:object_r:system_file:s0 tclass=file
W/init ( 3583): type=1300 audit(0.0:20): arch=40000028 syscall=11 per=800000 success=no exit=-13 a0=b6d80954 a1=b6d66770 a2=57e64 a3=ff0000 items=1 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/init" subj=u:r:init:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:20): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:20): item=0 name="/system/bin/auditd" inode=173 dev=103:0a mode=0100755 ouid=0 ogid=2000 rdev=00:00 obj=u:object_r:system_file:s0
W/auditd ( 3596): type=1320 audit(0.0:20):
I/cm ( 3578): | \_/ |__| |\ | | | | __ |___ |\ | |\/| | | | \
I/lowmemorykiller( 3573): Using in-kernel low memory killer interface
I/DEBUG ( 3586): debuggerd: Jun 17 2015 15:28:56
--------- beginning of system
I/Vold ( 3576): Vold 2.1 (the revenge) firing up
D/Vold ( 3576): Volume sdcard1 state changing -1 (Initializing) -> 0 (No-Media)
D/Vold ( 3576): Volume usbdisk state changing -1 (Initializing) -> 0 (No-Media)
I/Cryptfs ( 3576): Check if PFE is activated on Boot
I/cm ( 3584): |___ | | | | \| |__| |__] |___ | \| | | |__| |__/
E/sdcard ( 3595): usage: sdcard [OPTIONS] <source_path> <dest_path>
E/sdcard ( 3595): -u: specify UID to run as
E/sdcard ( 3595): -g: specify GID to run as
E/sdcard ( 3595): -w: specify GID required to write (default sdcard_rw, requires -d or -l)
E/sdcard ( 3595): -t: specify number of threads to use (default 2)
E/sdcard ( 3595): -d: derive file permissions based on path
E/sdcard ( 3595): -l: derive file permissions based on legacy internal layout
E/sdcard ( 3595): -s: split derived permissions for pics, av
E/sdcard ( 3595):
E/Cryptfs ( 3576): Bad magic for real block device /dev/block/platform/12200000.dwmmc0/by-name/USERDATA
E/Cryptfs ( 3576): Error getting crypt footer and key
I/installd( 3590): installd firing up
E/sdcard ( 3594): usage: sdcard [OPTIONS] <source_path> <dest_path>
E/sdcard ( 3594): -u: specify UID to run as
E/sdcard ( 3594): -g: specify GID to run as
E/sdcard ( 3594): -w: specify GID required to write (default sdcard_rw, requires -d or -l)
E/sdcard ( 3594): -t: specify number of threads to use (default 2)
E/sdcard ( 3594): -d: derive file permissions based on path
E/sdcard ( 3594): -l: derive file permissions based on legacy internal layout
E/sdcard ( 3594): -s: split derived permissions for pics, av
E/sdcard ( 3594):
I/Netd ( 3585): Netd 1.0 starting
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/default/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/ip6tnl0/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/lo/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/rmnet0/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/rmnet1/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/rmnet2/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/rmnet3/accept_ra_rt_table: No such file or directory
E/Netd ( 3585): Failed to open /proc/sys/net/ipv6/conf/sit0/accept_ra_rt_table: No such file or directory
I/SurfaceFlinger( 3577): SurfaceFlinger is starting
I/SurfaceFlinger( 3577): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
I/cm ( 3626): Welcome to Android 5.0.2 / CyanogenMod-12-20150625-UNOFFICIAL-k3gxx
W/auditd ( 3596): type=1325 audit(0.0:21): table=filter family=2 entries=4
W/iptables( 3672): type=1300 audit(0.0:21): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=0 a2=40 a3=b6c29100 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:21):
W/auditd ( 3596): type=1325 audit(0.0:22): table=filter family=10 entries=4
W/ip6tables( 3673): type=1300 audit(0.0:22): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=29 a2=40 a3=b6c2b400 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:22):
W/auditd ( 3596): type=1325 audit(0.0:23): table=filter family=2 entries=6
W/iptables( 3674): type=1300 audit(0.0:23): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=0 a2=40 a3=b6c23100 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:23):
W/auditd ( 3596): type=1325 audit(0.0:24): table=filter family=10 entries=6
W/ip6tables( 3675): type=1300 audit(0.0:24): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=29 a2=40 a3=b6c36600 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:24):
D/libEGL ( 3577): loaded /vendor/lib/egl/libGLES_mali.so
W/rild ( 3667): type=1400 audit(0.0:25): avc: denied { search } for name="block" dev="tmpfs" ino=3920 scontext=u:r:rild:s0 tcontext=u:object_r:block_device:s0 tclass=dir
W/rild ( 3667): type=1300 audit(0.0:25): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b625f36c a2=20000 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:25): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:25): item=0 name="/dev/mbin0"
W/auditd ( 3596): type=1320 audit(0.0:25):
W/rild ( 3667): type=1400 audit(0.0:26): avc: denied { getattr } for path="/efs/nv_data.bin" dev="mmcblk0p3" ino=30 scontext=u:r:rild:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
W/rild ( 3667): type=1300 audit(0.0:26): arch=40000028 syscall=327 per=800000 success=no exit=-13 a0=ffffff9c a1=b625f28c a2=b64cda78 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:26): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:26): item=0 name="/efs/nv_data.bin" inode=30 dev=b3:03 mode=0100700 ouid=1001 ogid=1001 rdev=00:00 obj=u:object_r:unlabeled:s0
W/auditd ( 3596): type=1320 audit(0.0:26):
W/rild ( 3667): type=1400 audit(0.0:27): avc: denied { getattr } for path="/efs/nv_data.bin" dev="mmcblk0p3" ino=30 scontext=u:r:rild:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
W/rild ( 3667): type=1300 audit(0.0:27): arch=40000028 syscall=327 per=800000 success=no exit=-13 a0=ffffff9c a1=b625f28c a2=b64cd990 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 3596): type=1307 audit(0.0:27): cwd="/"
W/auditd ( 3596): type=1302 audit(0.0:27): item=0 name="/efs/nv_data.bin" inode=30 dev=b3:03 mode=0100700 ouid=1001 ogid=1001 rdev=00:00 obj=u:object_r:unlabeled:s0
W/auditd ( 3596): type=1320 audit(0.0:27):
W/auditd ( 3596): type=1325 audit(0.0:28): table=filter family=2 entries=7
W/iptables( 3694): type=1300 audit(0.0:28): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=0 a2=40 a3=b6c30400 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:28):
I/ ( 3577): PLATFORM VERSION : JB-MR-2
W/auditd ( 3596): type=1325 audit(0.0:29): table=filter family=10 entries=7
W/ip6tables( 3695): type=1300 audit(0.0:29): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=4 a1=29 a2=40 a3=b6c32800 items=0 ppid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 3596): type=1320 audit(0.0:29):
W/rild ( 3667): type=1400 audit(0.0:30): avc: denied { unlink } for name="nv_data.bin" dev="mmcblk0p3" ino=30 scontext=u:r:rild:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
I/mediaserver( 3589): ServiceManager: 0xb60500c0
I/AudioFlinger( 3589): Using default 3000 mSec as standby time.
I/ServiceManager( 3589): Waiting for service batterystats...
I/gralloc ( 3577): using (fd=12)
I/gralloc ( 3577): id =
I/gralloc ( 3577): xres = 1080 px
I/gralloc ( 3577): yres = 1920 px
I/gralloc ( 3577): xres_virtual = 1080 px
I/gralloc ( 3577): yres_virtual = 3840 px
I/gralloc ( 3577): bpp = 32
I/gralloc ( 3577): r = 16:8
I/gralloc ( 3577): g = 8:8
I/gralloc ( 3577): b = 0:8
I/gralloc ( 3577): width = 65 mm (422.030762 dpi)
I/gralloc ( 3577): height = 115 mm (424.069580 dpi)
I/gralloc ( 3577): refresh rate = 60.00 Hz
D/AndroidRuntime( 3593):
D/AndroidRuntime( 3593): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
D/WVMDrmPlugIn( 3588): WVMDrmPlugin::onGetSupportInfo : 0
D/AndroidRuntime( 3593): CheckJNI is OFF
I/art ( 3593): option[0]=-Xzygote
I/art ( 3593): option[1]=-Xstacktracefile:/data/anr/traces.txt
I/art ( 3593): option[2]=exit
I/art ( 3593): option[3]=vfprintf
I/art ( 3593): option[4]=sensitiveThread
I/art ( 3593): option[5]=-verbose:gc
I/art ( 3593): option[6]=-Xms8m
I/art ( 3593): option[7]=-Xmx512m
I/art ( 3593): option[8]=-XX:mainThreadStackSize=24K
I/art ( 3593): option[9]=-XX:HeapGrowthLimit=128m
I/art ( 3593): option[10]=-XX:HeapMinFree=2m
I/art ( 3593): option[11]=-XX:HeapMaxFree=8m
I/art ( 3593): option[12]=-XX:HeapTargetUtilization=0.75
I/art ( 3593): option[13]=-agentlib:jdwp=transport=dt_android_adb,suspend=n,server=y
I/art ( 3593): option[14]=-Xlockprofthreshold:500
I/art ( 3593): option[15]=-Ximage-compiler-option
I/art ( 3593): option[16]=--runtime-arg
I/art ( 3593): option[17]=-Ximage-compiler-option
I/art ( 3593): option[18]=-Xms64m
I/art ( 3593): option[19]=-Ximage-compiler-option
I/art ( 3593): option[20]=--runtime-arg
I/art ( 3593): option[21]=-Ximage-compiler-option
I/art ( 3593): option[22]=-Xmx64m
I/art ( 3593): option[23]=-Ximage-compiler-option
I/art ( 3593): option[24]=--image-classes-zip=/system/framework/framework.jar
I/art ( 3593): option[25]=-Ximage-compiler-option
I/art ( 3593): option[26]=--image-classes=preloaded-classes
I/art ( 3593): option[27]=-Xcompiler-option
I/art ( 3593): option[28]=--runtime-arg
I/art ( 3593): option[29]=-Xcompiler-option
I/art ( 3593): option[30]=-Xms64m
I/art ( 3593): option[31]=-Xcompiler-option
I/art ( 3593): option[32]=--runtime-arg
I/art ( 3593): option[33]=-Xcompiler-option
I/art ( 3593): option[34]=-Xmx512m
I/art ( 3593): option[35]=-Duser.language=es
I/art ( 3593): option[36]=-Duser.region=US
W/art ( 3593): Invalid image header in '/data/dalvik-cache/arm/[email protected]@boot.art'
I/art ( 3593): Pruning dalvik-cache since we are generating an image and will need to recompile
W/art ( 3593): Unexpected file type of
W/art ( 3593): encountered.
D/hwcomposer( 3577): using
D/hwcomposer( 3577): xres = 1080 px
D/hwcomposer( 3577): yres = 1920 px
D/hwcomposer( 3577): width = 65 mm (422.030000 dpi)
D/hwcomposer( 3577): height = 115 mm (424.069000 dpi)
D/hwcomposer( 3577): refresh rate = 60 Hz
D/libexynosv4l2-subdev( 3577): try node: /dev/v4l-subdev0
D/libexynosv4l2-subdev( 3577): try node: /dev/v4l-subdev1
D/libexynosv4l2-subdev( 3577): try node: /dev/v4l-subdev2
I/libexynosv4l2-subdev( 3577): node found for device s5p-mixer0: /dev/v4l-subdev2
I/libexynosv4l2-subdev( 3577): open subdev device /dev/v4l-subdev2
I/hwcomposer( 3577): PSR info devname = /sys/devices/14400000.fimd_fb/psr_info
I/hwcomposer( 3577): PSR mode is 2(0: video mode, 1: DP PSR mode, 2: MIPI-DSI command mode)
I/SurfaceFlinger( 3577): Using composer version 1.3
I/SurfaceFlinger( 3577): EGL information:
I/SurfaceFlinger( 3577): vendor : Android
I/SurfaceFlinger( 3577): version : 1.4 Android META-EGL
I/SurfaceFlinger( 3577): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_KHR_create_context EGL_ANDROID_image_native_buffer EGL_KHR_wait_sync EGL_ANDROID_recordable
I/SurfaceFlinger( 3577): Client API: OpenGL_ES
I/SurfaceFlinger( 3577): EGLSurface: 8-8-8-8, config=0xb69cf2ac
I/SurfaceFlinger( 3577): OpenGL ES informations:
I/SurfaceFlinger( 3577): vendor : ARM
I/SurfaceFlinger( 3577): renderer : Mali-T628
I/SurfaceFlinger( 3577): version : OpenGL ES 3.0
I/SurfaceFlinger( 3577): extensions: GL_EXT_debug_marker GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth24 GL_OES_depth_texture GL_OES_depth_texture_cube_map GL_OES_packed_depth_stencil GL_OES_rgb8_rgba8 GL_EXT_read_format_bgra GL_OES_compressed_paletted_texture GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_EGL_image_external GL_OES_EGL_sync GL_OES_texture_npot GL_OES_vertex_half_float GL_OES_required_internalformat GL_OES_vertex_array_object GL_OES_mapbuffer GL_EXT_texture_format_BGRA8888 GL_EXT_texture_rg GL_EXT_texture_type_2_10_10_10_REV GL_OES_fbo_render_mipmap GL_OES_element_index_uint GL_EXT_shadow_samplers GL_OES_texture_compression_astc GL_KHR_texture_compression_astc_ldr GL_KHR_texture_compression_astc_hdr GL_KHR_debug GL_EXT_occlusion_query_boolean GL_EXT_blend_minmax GL_EXT_discard_framebuffer GL_OES_get_program_binary GL_OES_texture_3D GL_EXT_texture_storage GL_EXT_multisampled_render_to_texture GL_OES_surfaceless_context GL_ARM_mali_program_binary
I/SurfaceFlinger( 3577): GL_MAX_TEXTURE_SIZE = 8192
I/SurfaceFlinger( 3577): GL_MAX_VIEWPORT_DIMS = 8192
E/libEGL ( 3577): eglQuerySurface:607 error 300d (EGL_BAD_SURFACE)
E/libEGL ( 3577): eglQuerySurface:607 error 300d (EGL_BAD_SURFACE)
E/libEGL ( 3577): call to OpenGL ES API with no current context (logged once per thread)
D/SurfaceFlinger( 3577): Set power mode=2, type=0 flinger=0xb6962000
I/hwcomposer( 3577): int exynos5_blank(hwc_composer_device_1*, int, int):: disp(0), blank(0)
I/hwcomposer( 3577): unblank ioctl failed (display already unblanked)
E/libEGL ( 3577): eglSwapBuffers:1071 error 300d (EGL_BAD_SURFACE)
F/SurfaceFlinger( 3577): eglSwapBuffers(0x1, 0x0) failed with 0x0000300d
--------- beginning of crash
F/libc ( 3577): Fatal signal 6 (SIGABRT), code -6 in tid 3577 (surfaceflinger)
I/DEBUG ( 3586): property debug.db.uid not set; NOT waiting for gdb.
I/DEBUG ( 3586): HINT: adb shell setprop debug.db.uid 100000
I/DEBUG ( 3586): HINT: adb forward tcp:5039 tcp:5039
I/art ( 3593): Using an offset of 0xff1fa000 from default art base address of 0x70000000
I/art ( 3593): GenerateImage: /system/bin/dex2oat --image=/data/dalvik-cache/arm/[email protected]@boot.art --dex-file=/system/framework/core-libart.jar --dex-file=/system/framework/conscrypt.jar --dex-file=/system/framework/okhttp.jar --dex-file=/system/framework/core-junit.jar --dex-file=/system/framework/bouncycastle.jar --dex-file=/system/framework/ext.jar --dex-file=/system/framework/framework.jar --dex-file=/system/framework/telephony-common.jar --dex-file=/system/framework/voip-common.jar --dex-file=/system/framework/ims-common.jar --dex-file=/system/framework/mms-common.jar --dex-file=/system/framework/android.policy.jar --dex-file=/system/framework/apache-xml.jar --oat-file=/data/dalvik-cache/arm/[email protected]@boot.oat --instruction-set=arm --instruction-set-features=div --base=0x6f1fa000 --runtime-arg -Xms64m --runtime-arg -Xmx64m --image-classes-zip=/system/framework/framework.jar --image-classes=preloaded-classes
W/art ( 3593): Unexpected file type of
W/art ( 3593): encountered.
W/art ( 3593): Could not create image space with image file '/system/framework/boot.art'. Attempting to fall back to imageless running. Error was: Failed to generate image '/data/dalvik-cache/arm/[email protected]@boot.art': Failed execv(/system/bin/dex2oat --image=/data/dalvik-cache/arm/[email protected]@boot.art --dex-file=/system/framework/core-libart.jar --dex-file=/system/framework/conscrypt.jar --dex-file=/system/framework/okhttp.jar --dex-file=/system/framework/core-junit.jar --dex-file=/system/framework/bouncycastle.jar --dex-file=/system/framework/ext.jar --dex-file=/system/framework/framework.jar --dex-file=/system/framework/telephony-common.jar --dex-file=/system/framework/voip-common.jar --dex-file=/system/framework/ims-common.jar --dex-file=/system/framework/mms-common.jar --dex-file=/system/framework/android.policy.jar --dex-file=/system/framework/apache-xml.jar --oat-file=/data/dalvik-cache/arm/[email protected]@boot.oat --instruction-set=arm --instruction-set-features=div --base=0x6f1fa000 --runtime-arg -Xms64
I/DEBUG ( 3586): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
I/DEBUG ( 3586): Build fingerprint: 'samsung/cm_k3gxx/k3gxx:5.0.2/LRX22G/ca2fb2b51d:userdebug/test-keys'
I/DEBUG ( 3586): Revision: '10'
I/DEBUG ( 3586): ABI: 'arm'
I/DEBUG ( 3586): pid: 3577, tid: 3577, name: surfaceflinger >>> /system/bin/surfaceflinger <<<
I/DEBUG ( 3586): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
I/DEBUG ( 3586): Abort message: 'eglSwapBuffers(0x1, 0x0) failed with 0x0000300d'
I/DEBUG ( 3586): r0 00000000 r1 00000df9 r2 00000006 r3 00000000
I/DEBUG ( 3586): r4 b6f04114 r5 00000006 r6 0000000b r7 0000010c
I/DEBUG ( 3586): r8 00000000 r9 bea32bd0 sl b6954210 fp bea32bd0
I/DEBUG ( 3586): ip 00000df9 sp bea32650 lr b6e8e7b9 pc b6eb24e4 cpsr 600f0010
I/DEBUG ( 3586):
I/DEBUG ( 3586): backtrace:
I/DEBUG ( 3586): #00 pc 000384e4 /system/lib/libc.so (tgkill+12)
I/DEBUG ( 3586): #01 pc 000147b5 /system/lib/libc.so (pthread_kill+52)
I/DEBUG ( 3586): #02 pc 0001550b /system/lib/libc.so (raise+10)
I/DEBUG ( 3586): #03 pc 00011c35 /system/lib/libc.so (__libc_android_abort+36)
I/DEBUG ( 3586): #04 pc 0000fcb8 /system/lib/libc.so (abort+4)
I/DEBUG ( 3586): #05 pc 00007739 /system/lib/libcutils.so (__android_log_assert+88)
I/DEBUG ( 3586): #06 pc 0000f4df /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #07 pc 0001b9fd /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #08 pc 0001abe7 /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #09 pc 00019fc3 /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #10 pc 00019d49 /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #11 pc 00010ed3 /system/lib/libutils.so (android::Looper::pollInner(int)+410)
I/DEBUG ( 3586): #12 pc 00010fc5 /system/lib/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+92)
I/DEBUG ( 3586): #13 pc 000174c5 /system/lib/libsurfaceflinger.so
I/DEBUG ( 3586): #14 pc 0001993d /system/lib/libsurfaceflinger.so (android::SurfaceFlinger::run()+8)
I/DEBUG ( 3586): #15 pc 0000083d /system/bin/surfaceflinger
I/DEBUG ( 3586): #16 pc 0000fb75 /system/lib/libc.so (__libc_init+44)
I/DEBUG ( 3586): #17 pc 000008d8 /system/bin/surfaceflinger
Recommendation
Try to get in touch with @kirmaniarslan the guy ported two versions of cm12 for the pico
Sent from my HTC Explorer A310e using XDA Free mobile app
Hey there!
For security purposes, I'd like to encrypt the data on my Nexus 6P. However, the encryption process fails to start. My phone goes into the boot animation, and it stays there permanently. Interrupting the process does not result in data loss: the phone reboots just fine, all my data is accessible, and it runs good as new. What this tells me is that something is preventing the encryption process from starting in the first place. My problem is that I am not particularly well versed in these matters, and I'm at a loss for how to proceed.
I have made a full Nandroid backup and saved it on my PC, so I'm willing to do some experimenting if there's no easy solution.
I am running the MTC19X build of stock Android. I've made two significant modifications: SuperSU systemless root, and systemless Xposed. In terms of other weird stuff, I have AdAway (from F-Droid) running.
Things I've attempted which did not solve the problem:
Starrted encryption process, left running overnight. No joy. I'm fairly sure it's not just me being impatient, but I'm open to just leaving the thing plugged in for 24 hours to see if that works.
Disabled Xposed Framework and used SuperSU app to disable root. Tried again, nothing changed. Open to trying again by fully uninstalling these and seeing what happens, but would prefer not to re-root and set up from scratch again.
Inspired by a solution that worked for a similar problem on my old Moto G, I reduced the size of the /data partition by a small amount, leaving a small amount of unallocated space on my device. (On the Moto G, this solved a problem where Android had no place to put certain data relating to the encrypted files.) Worked with the Moto, but no such luck this time. Could go in and reverse this change if necessary, or reduce the size of the partition even more.
One interesting idea comes from a Nexus support thread (which I can't link because this is my first post), which suggests that some app or another could be holding files open and preventing the process from starting. I'm not sure what could be doing that, aside from Xposed or other root-related stuff, but I feel I covered that by disabling root on my last attempt. If anyone has any ideas on this front, though, I'm all ears.
I also took the liberty of running ADB's logcat feature, which suggests that the "data is busy" hypothesis is correct:
Code:
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6477): avc: denied { search } for name="1" dev="proc" ino=50414 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6478): avc: denied { search } for name="2" dev="proc" ino=50415 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6479): avc: denied { search } for name="3" dev="proc" ino=50416 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6480): avc: denied { search } for name="4" dev="proc" ino=50417 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6481): avc: denied { search } for name="5" dev="proc" ino=50418 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6482): avc: denied { search } for name="6" dev="proc" ino=50419 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6483): avc: denied { search } for name="7" dev="proc" ino=50420 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6484): avc: denied { search } for name="8" dev="proc" ino=50421 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6485): avc: denied { search } for name="9" dev="proc" ino=50422 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6486): avc: denied { search } for name="10" dev="proc" ino=50423 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6487): avc: denied { search } for name="11" dev="proc" ino=50424 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6488): avc: denied { search } for name="12" dev="proc" ino=50425 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6489): avc: denied { search } for name="13" dev="proc" ino=50426 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6490): avc: denied { search } for name="14" dev="proc" ino=50427 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6491): avc: denied { search } for name="15" dev="proc" ino=50428 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6492): avc: denied { search } for name="16" dev="proc" ino=50429 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6493): avc: denied { search } for name="17" dev="proc" ino=50430 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6494): avc: denied { search } for name="18" dev="proc" ino=50431 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6495): avc: denied { search } for name="19" dev="proc" ino=50432 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6496): avc: denied { search } for name="20" dev="proc" ino=50433 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6497): avc: denied { search } for name="21" dev="proc" ino=50434 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6498): avc: denied { search } for name="22" dev="proc" ino=50435 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6499): avc: denied { search } for name="23" dev="proc" ino=50436 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6500): avc: denied { search } for name="24" dev="proc" ino=50437 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6501): avc: denied { search } for name="25" dev="proc" ino=50438 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6502): avc: denied { search } for name="26" dev="proc" ino=50439 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6503): avc: denied { search } for name="27" dev="proc" ino=50440 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6504): avc: denied { search } for name="28" dev="proc" ino=50441 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.879 7604 7604 W boinc : type=1400 audit(0.0:6808): avc: denied { search } for name="1" dev="proc" ino=50414 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6809): avc: denied { search } for name="2" dev="proc" ino=50415 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6810): avc: denied { search } for name="3" dev="proc" ino=50416 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6811): avc: denied { search } for name="4" dev="proc" ino=50417 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6812): avc: denied { search } for name="5" dev="proc" ino=50418 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6813): avc: denied { search } for name="6" dev="proc" ino=50419 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6814): avc: denied { search } for name="7" dev="proc" ino=50420 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6815): avc: denied { search } for name="8" dev="proc" ino=50421 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6816): avc: denied { search } for name="9" dev="proc" ino=50422 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6817): avc: denied { search } for name="10" dev="proc" ino=50423 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6818): avc: denied { search } for name="11" dev="proc" ino=50424 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6819): avc: denied { search } for name="12" dev="proc" ino=50425 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6820): avc: denied { search } for name="13" dev="proc" ino=50426 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6821): avc: denied { search } for name="14" dev="proc" ino=50427 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6822): avc: denied { search } for name="15" dev="proc" ino=50428 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6823): avc: denied { search } for name="16" dev="proc" ino=50429 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6824): avc: denied { search } for name="17" dev="proc" ino=50430 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6825): avc: denied { search } for name="18" dev="proc" ino=50431 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6826): avc: denied { search } for name="19" dev="proc" ino=50432 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6827): avc: denied { search } for name="20" dev="proc" ino=50433 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:17.629 371 371 W vold : type=1400 audit(0.0:7139): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:17.629 371 371 W vold : type=1400 audit(0.0:7140): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.632 371 371 W vold : type=1400 audit(0.0:7141): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.632 371 371 W vold : type=1400 audit(0.0:7142): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.665 342 371 E ProcessKiller: Process /data/data/edu.berkeley.boinc/client/boinc (7604) has open file /data/data/edu.berkeley.boinc/client/stdoutdae.txt
07-21 23:30:17.671 342 371 E Cryptfs : unmounting /data failed: Device or resource busy
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7143): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7144): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7145): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7146): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.727 342 371 E ProcessKiller: Process /data/data/edu.berkeley.boinc/client/boinc (7604) has open file /data/data/edu.berkeley.boinc/client/stdoutdae.txt
07-21 23:30:17.727 342 371 W ProcessKiller: Sending Killed to process 7604
07-21 23:30:17.736 342 371 D Cryptfs : Just asked init to shut down class main
07-21 23:30:17.736 342 371 W vold : emulated unmount requires state mounted
07-21 23:30:37.799 371 371 W vold : type=1400 audit(0.0:7147): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7148): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7149): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7150): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.836 342 371 E Cryptfs : unmounting /data failed: Device or resource busy
07-21 23:30:37.840 342 371 W SocketClient: write error (Broken pipe)
07-21 23:30:37.840 342 371 W SocketClient: Unable to send msg '200 8 -1'
07-21 23:36:21.690 522 522 I rmt_storage: rmt_storage_connect_cb: clnt_h=0x9 conn_h=0x7f9d77a000
07-21 23:36:21.690 522 522 I rmt_storage: rmt_storage_rw_iovec_cb: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: R/W request received
07-21 23:36:21.690 522 522 I rmt_storage: wakelock acquired: 1, error no: 42
07-21 23:36:21.691 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9 Unblock worker thread (th_id: 548098016320)
07-21 23:36:21.843 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: Bytes written = 1572864
07-21 23:36:21.843 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: Send response: res=0 err=0
07-21 23:36:21.844 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9 About to block rmt_storage client thread (th_id: 548098016320) wakelock released: 1, error no: 0
07-21 23:36:21.844 522 917 I rmt_storage:
07-21 23:36:21.848 522 522 I rmt_storage: rmt_storage_disconnect_cb: clnt_h=0x9 conn_h=0x7f9d77a000
Looking these over makes me think the BOINC app might be the problem, so I figured I'd uninstall it and try again. I'm watching the boot animation right now; wish me luck!
Anyway, if anyone else has any other ideas (especially after reading those logs, I'm not at all an expert on these matters so I definitely don't completely know what I'm looking at), I'm all ears.
Thank you all for your time.
Grine_ said:
Hey there!
For security purposes, I'd like to encrypt the data on my Nexus 6P. However, the encryption process fails to start. My phone goes into the boot animation, and it stays there permanently. Interrupting the process does not result in data loss: the phone reboots just fine, all my data is accessible, and it runs good as new. What this tells me is that something is preventing the encryption process from starting in the first place. My problem is that I am not particularly well versed in these matters, and I'm at a loss for how to proceed.
I have made a full Nandroid backup and saved it on my PC, so I'm willing to do some experimenting if there's no easy solution.
I am running the MTC19X build of stock Android. I've made two significant modifications: SuperSU systemless root, and systemless Xposed. In terms of other weird stuff, I have AdAway (from F-Droid) running.
Things I've attempted which did not solve the problem:
Starrted encryption process, left running overnight. No joy. I'm fairly sure it's not just me being impatient, but I'm open to just leaving the thing plugged in for 24 hours to see if that works.
Disabled Xposed Framework and used SuperSU app to disable root. Tried again, nothing changed. Open to trying again by fully uninstalling these and seeing what happens, but would prefer not to re-root and set up from scratch again.
Inspired by a solution that worked for a similar problem on my old Moto G, I reduced the size of the /data partition by a small amount, leaving a small amount of unallocated space on my device. (On the Moto G, this solved a problem where Android had no place to put certain data relating to the encrypted files.) Worked with the Moto, but no such luck this time. Could go in and reverse this change if necessary, or reduce the size of the partition even more.
One interesting idea comes from a Nexus support thread (which I can't link because this is my first post), which suggests that some app or another could be holding files open and preventing the process from starting. I'm not sure what could be doing that, aside from Xposed or other root-related stuff, but I feel I covered that by disabling root on my last attempt. If anyone has any ideas on this front, though, I'm all ears.
I also took the liberty of running ADB's logcat feature, which suggests that the "data is busy" hypothesis is correct:
Code:
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6477): avc: denied { search } for name="1" dev="proc" ino=50414 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6478): avc: denied { search } for name="2" dev="proc" ino=50415 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6479): avc: denied { search } for name="3" dev="proc" ino=50416 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.845 7604 7604 W boinc : type=1400 audit(0.0:6480): avc: denied { search } for name="4" dev="proc" ino=50417 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6481): avc: denied { search } for name="5" dev="proc" ino=50418 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6482): avc: denied { search } for name="6" dev="proc" ino=50419 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6483): avc: denied { search } for name="7" dev="proc" ino=50420 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6484): avc: denied { search } for name="8" dev="proc" ino=50421 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6485): avc: denied { search } for name="9" dev="proc" ino=50422 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6486): avc: denied { search } for name="10" dev="proc" ino=50423 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6487): avc: denied { search } for name="11" dev="proc" ino=50424 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6488): avc: denied { search } for name="12" dev="proc" ino=50425 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6489): avc: denied { search } for name="13" dev="proc" ino=50426 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6490): avc: denied { search } for name="14" dev="proc" ino=50427 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6491): avc: denied { search } for name="15" dev="proc" ino=50428 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6492): avc: denied { search } for name="16" dev="proc" ino=50429 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6493): avc: denied { search } for name="17" dev="proc" ino=50430 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6494): avc: denied { search } for name="18" dev="proc" ino=50431 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6495): avc: denied { search } for name="19" dev="proc" ino=50432 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6496): avc: denied { search } for name="20" dev="proc" ino=50433 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6497): avc: denied { search } for name="21" dev="proc" ino=50434 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6498): avc: denied { search } for name="22" dev="proc" ino=50435 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6499): avc: denied { search } for name="23" dev="proc" ino=50436 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6500): avc: denied { search } for name="24" dev="proc" ino=50437 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6501): avc: denied { search } for name="25" dev="proc" ino=50438 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6502): avc: denied { search } for name="26" dev="proc" ino=50439 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6503): avc: denied { search } for name="27" dev="proc" ino=50440 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:02.849 7604 7604 W boinc : type=1400 audit(0.0:6504): avc: denied { search } for name="28" dev="proc" ino=50441 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.879 7604 7604 W boinc : type=1400 audit(0.0:6808): avc: denied { search } for name="1" dev="proc" ino=50414 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6809): avc: denied { search } for name="2" dev="proc" ino=50415 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6810): avc: denied { search } for name="3" dev="proc" ino=50416 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6811): avc: denied { search } for name="4" dev="proc" ino=50417 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6812): avc: denied { search } for name="5" dev="proc" ino=50418 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6813): avc: denied { search } for name="6" dev="proc" ino=50419 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6814): avc: denied { search } for name="7" dev="proc" ino=50420 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6815): avc: denied { search } for name="8" dev="proc" ino=50421 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6816): avc: denied { search } for name="9" dev="proc" ino=50422 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6817): avc: denied { search } for name="10" dev="proc" ino=50423 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6818): avc: denied { search } for name="11" dev="proc" ino=50424 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6819): avc: denied { search } for name="12" dev="proc" ino=50425 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6820): avc: denied { search } for name="13" dev="proc" ino=50426 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6821): avc: denied { search } for name="14" dev="proc" ino=50427 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6822): avc: denied { search } for name="15" dev="proc" ino=50428 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6823): avc: denied { search } for name="16" dev="proc" ino=50429 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6824): avc: denied { search } for name="17" dev="proc" ino=50430 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6825): avc: denied { search } for name="18" dev="proc" ino=50431 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6826): avc: denied { search } for name="19" dev="proc" ino=50432 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:12.882 7604 7604 W boinc : type=1400 audit(0.0:6827): avc: denied { search } for name="20" dev="proc" ino=50433 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
07-21 23:30:17.629 371 371 W vold : type=1400 audit(0.0:7139): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:17.629 371 371 W vold : type=1400 audit(0.0:7140): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.632 371 371 W vold : type=1400 audit(0.0:7141): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.632 371 371 W vold : type=1400 audit(0.0:7142): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.665 342 371 E ProcessKiller: Process /data/data/edu.berkeley.boinc/client/boinc (7604) has open file /data/data/edu.berkeley.boinc/client/stdoutdae.txt
07-21 23:30:17.671 342 371 E Cryptfs : unmounting /data failed: Device or resource busy
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7143): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7144): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7145): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.705 371 371 W vold : type=1400 audit(0.0:7146): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:17.727 342 371 E ProcessKiller: Process /data/data/edu.berkeley.boinc/client/boinc (7604) has open file /data/data/edu.berkeley.boinc/client/stdoutdae.txt
07-21 23:30:17.727 342 371 W ProcessKiller: Sending Killed to process 7604
07-21 23:30:17.736 342 371 D Cryptfs : Just asked init to shut down class main
07-21 23:30:17.736 342 371 W vold : emulated unmount requires state mounted
07-21 23:30:37.799 371 371 W vold : type=1400 audit(0.0:7147): avc: denied { read } for name="fd" dev="proc" ino=56498 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7148): avc: denied { getattr } for path="/proc/340/cwd" dev="proc" ino=56500 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7149): avc: denied { getattr } for path="/proc/340/root" dev="proc" ino=56501 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.802 371 371 W vold : type=1400 audit(0.0:7150): avc: denied { getattr } for path="/proc/340/exe" dev="proc" ino=56502 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
07-21 23:30:37.836 342 371 E Cryptfs : unmounting /data failed: Device or resource busy
07-21 23:30:37.840 342 371 W SocketClient: write error (Broken pipe)
07-21 23:30:37.840 342 371 W SocketClient: Unable to send msg '200 8 -1'
07-21 23:36:21.690 522 522 I rmt_storage: rmt_storage_connect_cb: clnt_h=0x9 conn_h=0x7f9d77a000
07-21 23:36:21.690 522 522 I rmt_storage: rmt_storage_rw_iovec_cb: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: R/W request received
07-21 23:36:21.690 522 522 I rmt_storage: wakelock acquired: 1, error no: 42
07-21 23:36:21.691 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9 Unblock worker thread (th_id: 548098016320)
07-21 23:36:21.843 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: Bytes written = 1572864
07-21 23:36:21.843 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9: req_h=0x9 msg_id=3: Send response: res=0 err=0
07-21 23:36:21.844 522 917 I rmt_storage: rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x9 About to block rmt_storage client thread (th_id: 548098016320) wakelock released: 1, error no: 0
07-21 23:36:21.844 522 917 I rmt_storage:
07-21 23:36:21.848 522 522 I rmt_storage: rmt_storage_disconnect_cb: clnt_h=0x9 conn_h=0x7f9d77a000
Looking these over makes me think the BOINC app might be the problem, so I figured I'd uninstall it and try again. I'm watching the boot animation right now; wish me luck!
Anyway, if anyone else has any other ideas (especially after reading those logs, I'm not at all an expert on these matters so I definitely don't completely know what I'm looking at), I'm all ears.
Thank you all for your time.
Click to expand...
Click to collapse
Leaving it longer than overnight won't help, if it didn't encrypt overnight it ain't going to. The only thing I can think of would be to format (must be format, not wipe) the userdata partition. You can do this very easily with fastboot:
Code:
fastboot format userdata
Obviously, this would erase all of your internal storage so make sure everything important is backed up first. After formatting let the phone boot and attempt the encryption process again.
Before doing what @Heisenberg suggests, I would try a shorter solution first. Although you may have uninstalled them, it could be possible that some changes to /system have not been reset back to stock.
Are you familiar with fastboot? Use fastboot to flash the system.img and boot.img that matches your stock rom. The factory image can be downloaded from Google's Nexus factory image site. Xposed and SuperSU each modify system and boot partitions so maybe that has something to do with the issue. Once done, now see if you can encrypt via Settings.
Sent from my Nexus 5X using Tapatalk
I am using LineageOS 14 on my Galaxy S5 and while I do have the directory /system/etc/init.d , its scripts are not executed on startup as one would expect.
Searching different forums didn't lead to much beyond installing some random person's script with root permission or doing hacks.
I've invested sometime to get init.d work on my phone and wanted to share the how to with you:
Prerequisite:
Root access (shell) [ I am using addonsu-14.1-arm if that make a difference ]
LineageOS 14 (not tested on other versions but should work)
Steps:
1. mount your system partition as read/write
Code:
mount -oremount,rw /system
2. go to init directory
Code:
cd /system/etc/init/
3. create file init_d.rc with following content
Code:
service init_d /system/bin/sh /system/bin/sysinit
user root
group root
disabled
oneshot
seclabel u:r:sudaemon:s0
on property:sys.boot_completed=1 && property:sys.logbootcomplete=1
start init_d
That's it.
Explanation:
/system/etc/init/ is android's version of linux's init.d but it have very different syntax and restricted set of commands.
the file init_d define a service called init_d which basically execute sysinit script (the script responsible for running /etc/init.d/ scripts).
the service is set to be disabled so it won't run by default. Finally I say that when the system finish booting start the service. the oneshot keyword is important because without the system will keep executing sysinit each time it exit.
the seclabel define SELinux label for this service, this one should give it full access
I tried this on a lineage 15.1 build and followed all steps , it did not work.
Worked like a charm!
I needed it to run swapon once (to free some unused RAM) without modifying any system files, only adding new ones, so system updates wouldn't overwrite the configuration.
Thank you very much!
Running LineageOS 15.1, 2018-11-30 nightly build on griffin (XT1650-3).
ramast_ said:
I am using LineageOS 14 on my Galaxy S5 and while I do have the directory /system/etc/init.d , its scripts are not executed on startup as one would expect.
Searching different forums didn't lead to much beyond installing some random person's script with root permission or doing hacks.
I've invested sometime to get init.d work on my phone and wanted to share the how to with you:
Prerequisite:
Root access (shell) [ I am using addonsu-14.1-arm if that make a difference ]
LineageOS 14 (not tested on other versions but should work)
Steps:
1. mount your system partition as read/write
Code:
mount -oremount,rw /system
2. go to init directory
Code:
cd /system/etc/init/
3. create file init_d.rc with following content
Code:
service init_d /system/bin/sh /system/bin/sysinit
user root
group root
disabled
oneshot
seclabel u:r:sudaemon:s0
on property:sys.boot_completed=1 && property:sys.logbootcomplete=1
start init_d
That's it.
Explanation:
/system/etc/init/ is android's version of linux's init.d but it have very different syntax and restricted set of commands.
the file init_d define a service called init_d which basically execute sysinit script (the script responsible for running /etc/init.d/ scripts).
the service is set to be disabled so it won't run by default. Finally I say that when the system finish booting start the service. the oneshot keyword is important because without the system will keep executing sysinit each time it exit.
the seclabel define SELinux label for this service, this one should give it full access
Click to expand...
Click to collapse
Thank you so much !
ramast_ said:
I am using LineageOS 14 on my Galaxy S5 and while I do have the directory /system/etc/init.d , its scripts are not executed on startup as one would expect.
Searching different forums didn't lead to much beyond installing some random person's script with root permission or doing hacks.
I've invested sometime to get init.d work on my phone and wanted to share the how to with you:
Prerequisite:
Root access (shell) [ I am using addonsu-14.1-arm if that make a difference ]
LineageOS 14 (not tested on other versions but should work)
Steps:
1. mount your system partition as read/write
Code:
mount -oremount,rw /system
2. go to init directory
Code:
cd /system/etc/init/
3. create file init_d.rc with following content
Code:
service init_d /system/bin/sh /system/bin/sysinit
user root
group root
disabled
oneshot
seclabel u:r:sudaemon:s0
on property:sys.boot_completed=1 && property:sys.logbootcomplete=1
start init_d
That's it.
Explanation:
/system/etc/init/ is android's version of linux's init.d but it have very different syntax and restricted set of commands.
the file init_d define a service called init_d which basically execute sysinit script (the script responsible for running /etc/init.d/ scripts).
the service is set to be disabled so it won't run by default. Finally I say that when the system finish booting start the service. the oneshot keyword is important because without the system will keep executing sysinit each time it exit.
the seclabel define SELinux label for this service, this one should give it full access
Click to expand...
Click to collapse
You are great bro !
I try it on lineage os 14.1 on moto G and it works !
I tried many ways to do this but all of them are not effective, thanks
Lordlight said:
You are great bro !
I try it on lineage os 14.1 on moto G and it works !
I tried many ways to do this but all of them are not effective, thanks
Click to expand...
Click to collapse
I am glad you found it useful.
ramast_ said:
I am glad you found it useful.
Click to expand...
Click to collapse
Hi, i have a prblem with this:
The script run BEFORE the bootanimation finished, i need run AFTER the fully animation is finished. What need i do ?
There is a process responsible for showing bootanimation, I don't remember exact process name but should contain word "animation" in it.
Once you figured out its name, you can make your script check every second - in a while loop - if that process is running or not. Once the process stopped, you can assume that bootanimation has stopped.
There might be a better way but I honestly don't know.
the seclabel define SELinux label for this service, this one should give it full access
Click to expand...
Click to collapse
Hey,
I tried your solution on the following LineageOS version:
Code:
Android 7.1.2
14.1-20190207-NIGHTLY-falcon
Linux version 3.4.113-g22bc4ed ([email protected]) (gcc version 4.9 20150123 (prerelease) (GCC) ) #1 SMP PREEMPT Thu Feb 7 14:09:49 UTC 2019
Scripts in /etc/init.d are being executed, fine, but all them are running with insufficient privileges - under the selinux context of u:r:sysinit:s0
As a result I couldn't start sshd using that script:
Code:
12-27 12:10:58.848 2559 2559 I sysinit : Running /system/etc/init.d/99ssh
12-27 12:10:58.950 2562 2562 W start-ssh: type=1400 audit(0.0:9): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_dsa_key" dev="mmcblk0p36" ino=198109 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:01.100 2564 2564 W ssh-keygen: type=1400 audit(0.0:10): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_dsa_key" dev="mmcblk0p36" ino=198109 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:01.103 2564 2564 W ssh-keygen: type=1400 audit(0.0:11): avc: denied { write } for uid=0 name="ssh_host_dsa_key" dev="mmcblk0p36" ino=198109 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:01.143 2743 2743 W chmod : type=1400 audit(0.0:12): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_dsa_key" dev="mmcblk0p36" ino=198109 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:01.186 2746 2746 W chmod : type=1400 audit(0.0:13): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_dsa_key.pub" dev="mmcblk0p36" ino=197164 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:01.190 2562 2562 W start-ssh: type=1400 audit(0.0:14): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_rsa_key" dev="mmcblk0p36" ino=203831 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:10.896 2749 2749 W ssh-keygen: type=1400 audit(0.0:15): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_rsa_key" dev="mmcblk0p36" ino=203831 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:10.896 2749 2749 W ssh-keygen: type=1400 audit(0.0:16): avc: denied { write } for uid=0 name="ssh_host_rsa_key" dev="mmcblk0p36" ino=203831 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:10.950 2969 2969 W chmod : type=1400 audit(0.0:17): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_rsa_key" dev="mmcblk0p36" ino=203831 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:11.003 2972 2972 W chmod : type=1400 audit(0.0:18): avc: denied { getattr } for uid=0 path="/data/ssh/ssh_host_rsa_key.pub" dev="mmcblk0p36" ino=203640 scontext=u:r:sysinit:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
12-27 12:11:11.103 2979 2979 W sshd : type=1400 audit(0.0:19): avc: denied { setgid } for uid=0 capability=6 scontext=u:r:sysinit:s0 tcontext=u:r:sysinit:s0 tclass=capability permissive=0
12-27 12:11:11.116 2979 2979 W sshd : type=1400 audit(0.0:20): avc: denied { create } for uid=0 scontext=u:r:sysinit:s0 tcontext=u:r:sysinit:s0 tclass=udp_socket permissive=0
12-27 12:11:11.116 2979 2979 W sshd : type=1400 audit(0.0:21): avc: denied { create } for uid=0 scontext=u:r:sysinit:s0 tcontext=u:r:sysinit:s0 tclass=udp_socket permissive=0
12-27 12:11:11.120 2977 2977 I sshd : bad addr or host: <NULL> (No address associated with hostname)
12-27 12:11:11.121 2977 2977 I sshd : sshd terminated by exit(255)
Anyone has an idea, how to force init.d scripts to run as u:r:su:s0 ?
Thanks
Answering my own question, in case someone else would encounter this
It turned out, my LineageOS 14.1 already had init.d scripts working. However, it still was executed under a restricted selinux context u:r:sysinit:s0. To overcome that I had to recompile LineageOS from sources, where I could explicitly modify vendor/cm/prebuilt/common/etc/init.local.rc file and put there only one additional line seclabel u:r:sudaemon:s0 so it finaly looks like this:
Code:
..
.
# sysinit (/system/etc/init.d)
service sysinit /system/bin/sysinit
user root
group root
disabled
oneshot
seclabel u:r:sudaemon:s0
..
.
Now I can run commands in userinit.sh with the highest privileges
Thanks!
I'm not sure how it got frozen because I most definitely didn't freeze it, but it's frozen and won't unfreeze no matter how many times I try to unfreeze it. Ive tried unfreezing with SD-maid, and titanium backup to no avail, and had to uninstall chrome because it won't work with system WebView.
I'm thinking I must have removed some system app that WebView needs to function but I'm unsure which app that would be. I'll try to grab a log kitty when I get off work. Any and all advice would be much apreesh.
(I have the Qualcomm variant btw)
Here's a logcat. Did my best to trim most of the unrelated crap.
I/Icing ( 6703): doRemovePackageData com.google.android.webview
W/orola.sprintwfc( 3649): type=1400 audit(0.0:102798): avc: denied { search } for uid=1000 scontext=u:r:system_app:s0 tcontext=ubject_r:app_data_file:s0:c512,c768 tclass=dir permissive=0
I/Icing ( 6703): IndexChimeraService.getServiceInterface callingPackage=com.google.android.gms componentName=AppsCorpus serviceId=32
I/Icing ( 6703): IndexChimeraService.getServiceInterface callingPackage=com.google.android.gms componentName=AppsCorpus serviceId=36
I/Finsky (12343): [1] com.google.android.finsky.p2p.d.a(2): Wrote row to frosting DB: 213
W/orola.spackage:com.google.android.webview
W/Thread-5(16460): type=1400 audit(0.0:102817): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102818): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102819): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102820): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102821): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102822): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102823): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
W/Thread-5(16460): type=1400 audit(0.0:102824): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
I/System.out(15868): LP - exit.
W/ActivityManager( 1669): Unable to start service Intent { cmp=com.android.printspooler/.model.PrintSpoolerService } U=0: not found
I/Icing ( 6703): Usage reports ok 2, Failed Usage reports 0, indexed 0, rejected 0, imm upload false
I/Icing ( 6703): Usage reports ok 0, Failed Usage reports 0, indexed 0, rejected 0, imm upload false
I/Icing ( 6703): doRemovePackageData com.google.android.webview
I/Icing ( 6703): IndexChimeraService.getServiceInterface callingPackage=com.google.android.gms componentName=AppsCorpus serviceId=32
I/Icing ( 6703): IndexChimeraService.getServiceInterface callingPackage=com.google.android.gms componentName=AppsCorpus serviceId=36
I/Icing ( 6703): Usage reports ok 0, Failed Usage reports 0, indexed 0, rejected 0, imm upload false
I/Icing ( 6703): Usage reports ok 0, Failed Usage reports 0, indexed 0, rejected 0, imm upload false
D/AndroidRuntime(16444): >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<<
D/AndroidRuntime(16444): CheckJNI is OFF
D/APM_AudioPolicyManager( 736): startOutput() output 13, stream 1, session 11873
D/audio_hw_primary( 736): out_set_parameters: enter: usecase(1: low-latency-playback) kvpairs: routing=2
V/msm8974_platform( 736): platform_get_output_snd_device: enter: output devices(0x2)
V/msm8974_platform( 736): platform_get_output_snd_device: exit: snd_device(speaker)
V/msm8974_platform( 736): platform_send_audio_calibration: sending audio calibration for snd_device(2) acdb_id(14)
D/ACDB-LOADER( 736): ACDB -> send_audio_cal, acdb_id = 14, path = 0, app id = 0x11130, sample rate = 48000
D/ACDB-LOADER( 736): ACDB -> send_asm_topology
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_STREAM_TOPOLOGY_ID
D/ACDB-LOADER( 736): ACDB -> send_adm_topology
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_COMMON_TOPOLOGY_ID
D/ACDB-LOADER( 736): ACDB -> send_audtable
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_COMMON_TABLE_SIZE
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_COMMON_TABLE
D/ACDB-LOADER( 736): ACDB -> AUDIO_SET_AUDPROC_CAL
D/ACDB-LOADER( 736): ACDB -> send_audvoltable
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_GAIN_DEP_STEP_TABLE, vol index 0
D/ACDB-LOADER( 736): ACDB -> AUDIO_SET_VOL_CAL cal type = 12
D/ACDB-LOADER( 736): ACDB -> send_audstrmtable
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AUDPROC_STREAM_TABLE_V2
D/ACDB-LOADER( 736): ACDB -> audstrm_cal->cal_type.cal_data.cal_size = 456
D/ACDB-LOADER( 736): ACDB -> send_afe_topology
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AFE_TOPOLOGY_ID
D/ACDB-LOADER( 736): ACDB -> GET_AFE_TOPOLOGY_ID for adcd_id 14, Topology Id 1025e
D/ACDB-LOADER( 736): ACDB -> send_afe_cal
D/ACDB-LOADER( 736): ACDB -> ACDB_CMD_GET_AFE_COMMON_TABLE
D/ACDB-LOADER( 736): ACDB -> AUDIO_SET_AFE_CAL
D/ACDB-LOADER( 736): ACDB -> send_hw_delay : acdb_id = 14 path = 0
D/ACDB-LOADER( 736): ACDB -> ACDB_AVSYNC_INFO: ACDB_CMD_GET_DEVICE_PROPERTY
D/audio_hw_primary( 736): enable_snd_device: snd_device(2: speaker)
D/audio_hw_primary( 736): enable_audio_route: apply and update mixer path: low-latency-playback
I/audio_hw_utils( 736): Set Audio Stream 12 App Type Cfg: app_type 69936 (DEFAULT), acdb_dev_id 14, sample_rate 48000
I/ActivityManager( 1669): START u0 {flg=0x10804000 cmp=com.android.systemui/.recents.RecentsActivity} from uid 10090 on display 0
I/Thermal-Lib( 451): Thermal-Lib-Client: Client request sent
I/ThermalEngine( 728): Thermal-Server: Thermal received msg from override
I/ActivityManager( 1669): moveHomeStack, setupComplete:true
D/APM_AudioPolicyManager( 736): stopOutput() output 13, stream 1, session 11873
W/WindowManager( 1669): Attempted to remove non-existing token: [email protected]
I/LaunchCheckinHandler( 1669): Displayed com.android.systemui/.recents.RecentsActivity,wp,wa,164
I/art ( 1669): Background partial concurrent mark sweep GC freed 85301(5MB) AllocSpace objects, 2(40KB) LOS objects, 33% free, 24MB/36MB, paused 2.593ms total 201.533ms
I/Icing ( 6703): Indexing com.google.android.gms-apps from com.google.android.gms
I/Icing ( 6703): Indexing done com.google.android.gms-apps
I/Icing ( 6703): Indexing com.google.android.gms-apps from com.google.android.gms
I/Icing ( 6703): Indexing done com.google.android.gms-apps
D/KeyguardUpdateMonitor( 1816): received broadcast android.intent.action.TIME_TICK
D/KeyguardUpdateMonitor( 1816): handleTimeUpdate
I/SFPerfTracer( 534): triggers: (rate: 477:25724) (compose: 0:12) (post: 0:74) (render: 0:59) (7:463241 frames) (8:526805)
D/SFPerfTracer( 534): layers: (5:10) (com.android.systemui.ImageWallpaper (0xb0b14400): 8:39587) (StatusBar (0xaeb09400): 8:244185) (Sprite (0xaeb0bc00): 0:126)* (animation background stackId=1 (0xb0b15800): 0:234)* (DimLayerController/Stack=0 (0xb0b16c00): 0:2396)* (NavigationBar (0xaeb08000): 8:9418) (eu.thedarken.sdm/eu.thedarken.sdm.appcontrol.ui.details.AppObjectActivity (0xb0b13000): 0:282)- (Toast (0xaeb0a800): 8:73) (com.android.systemui/com.android.systemui.recents.RecentsActivity (0xb1fc8400): 8:33) (thumbnail anim (0xb1fc9800): 0:22)-
D/APM_AudioPolicyManager( 736): startOutput() output 13, stream 1, session 11873
D/audio_hw_primary( 736): out_set_parameters: enter: usecase(1: low-latency-playback) kvpairs: routing=2
V/msm8974_platform( 736): platform_get_output_snd_device: enter: output devices(0x2)
V/msm8974_platform( 736): platform_get_output_snd_device: exit: snd_device(speaker)
E/ActivityManager( 1669): applyOptionsLocked: Unknown animationType=0
D/APM_AudioPolicyManager( 736): stopOutput() output 13, stream 1, session 11873
D/ICU (16444): No timezone override file found: /data/misc/zoneinfo/current/icu/icu_tzdata.dat
W/System (16444): ClassLoader referenced unknown path: /oem/lib
I/Radio-JNI(16444): register_android_hardware_Radio DONE
D/AndroidRuntime(16444): Calling main entry com.android.commands.am.Am
W/opjohnwu.magisk(15544): type=1400 audit(0.0:102825): avc: denied { read } for uid=10150 name="xposed" dev="dm-0" ino=29641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:system_data_file:s0 tclass=file permissive=0
D/AndroidRuntime(16444): Shutting down VM
I/art (15544): Do partial code cache collection, code=0B, data=23KB
I/art (15544): After code cache collection, code=0B, data=23KB
I/art (15544): Increasing code
Lol @ the emojis. My bad.
Looks like your culprit
W/orola.spackage:com.google.android.webview
W/Thread-5(16460): type=1400 audit(0.0:102817): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641
Something you did with Xposed.
What Xposed modules you got running?
madbat99 said:
Looks like your culprit
W/orola.spackage:com.google.android.webview
W/Thread-5(16460): type=1400 audit(0.0:102817): avc: denied { read } for uid=10165 name="xposed" dev="dm-0" ino=29641
Something you did with Xposed.
What Xposed modules you got running?
Click to expand...
Click to collapse
AdBlocker Reborn, Autoinstall Reloaded, Custom Text, GravityBox, Smooth System Progress Bars, and xPrivacy, but this happened before I installed xPrivacy.
I see this message in logs a couple of times each second...
Access denied finding property "vendor.debug.egl.swapinterval"
Followed by:
type=1400 audit(0.0:58203): avc: denied { read } for name="ubject_r:vendor_default_prop:s0" dev="tmpfs" ino=19023 scontext=u:r:untrusted_app:s0:c169,c256,c512,c768 tcontext=ubject_r:vendor_default_prop:s0 tclass=file permissive=0
Seems OP has removed something, but the system still tries to access it...