06-01 15:41:12.292 E/audit ( 1091): type=1400 audit(1527882072.279:43873): avc: denied { write } for pid=24942 comm="PhoneStatusBar" path="socket:[6107126]" dev="sockfs" ino=6107126 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:12.293 E/audit ( 1091): type=1300 audit(1527882072.279:43873): arch=c00000b7 syscall=66 success=yes exit=86 a0=3 a1=7f6de82870 a2=4 a3=0 items=0 ppid=1183 pid=24942 auid=4294967295 uid=10005 gid=10005 euid=10005 suid=10005 fsuid=10005 egid=10005 sgid=10005 fsgid=10005 tty=(none) ses=4294967295 comm="PhoneStatusBar" exe="/system/bin/app_process64" subj=u:r:platform_app:s0:c512,c768 key=(null) 06-01 15:41:12.296 E/audit ( 1091): type=1327 audit(1527882072.279:43873): proctitle="com.android.systemui" 06-01 15:41:12.492 E/ANDR-PERF-MPCTL( 1095): Invalid profile no. 0, total profiles 0 only 06-01 15:41:12.553 E/audit ( 1091): type=1400 audit(1527882072.549:43874): avc: denied { write } for pid=7342 comm="Binder:7324_1" path="socket:[99036]" dev="sockfs" ino=99036 scontext=u:r:nfc:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:12.553 E/audit ( 1091): type=1300 audit(1527882072.549:43874): arch=c00000b7 syscall=66 success=yes exit=59 a0=3 a1=7f919f6290 a2=4 a3=0 items=0 ppid=1183 pid=7342 auid=4294967295 uid=1027 gid=1027 euid=1027 suid=1027 fsuid=1027 egid=1027 sgid=1027 fsgid=1027 tty=(none) ses=4294967295 comm="Binder:7324_1" exe="/system/bin/app_process64" subj=u:r:nfc:s0 key=(null) 06-01 15:41:12.555 E/audit ( 1091): type=1327 audit(1527882072.549:43874): proctitle="com.android.nfc" 06-01 15:41:12.658 E/RecyclerView(32109): No adapter attached; skipping layout 06-01 15:41:12.681 E/audit ( 1091): type=1400 audit(1527882072.669:43875): avc: denied { read } for pid=3947 comm=4173796E635461736B202331 name="ViPER4AndroidFX.apk" dev="sda19" ino=128755 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:12.681 E/audit ( 1091): type=1400 audit(1527882072.669:43875): avc: denied { open } for pid=3947 comm=4173796E635461736B202331 path="/system/priv-app/ViPER4AndroidFX/ViPER4AndroidFX.apk" dev="sda19" ino=128755 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:12.681 E/audit ( 1091): type=1300 audit(1527882072.669:43875): arch=c00000b7 syscall=56 success=yes exit=80 a0=ffffff9c a1=7f92df84e8 a2=0 a3=0 items=0 ppid=1183 pid=3947 auid=4294967295 uid=10817 gid=10817 euid=10817 suid=10817 fsuid=10817 egid=10817 sgid=10817 fsgid=10817 tty=(none) ses=4294967295 comm=4173796E635461736B202331 exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c512,c768 key=(null) 06-01 15:41:12.682 E/audit ( 1091): type=1327 audit(1527882072.669:43875): proctitle="com.zeapo.pwdstore" 06-01 15:41:13.603 E/Zygote ( 3948): v2 06-01 15:41:13.605 E/Zygote ( 3948): accessInfo : 0 06-01 15:41:13.757 E/audit ( 1091): type=1400 audit(1527882073.749:43878): avc: denied { write } for pid=8714 comm="Thread-5" path="socket:[110793]" dev="sockfs" ino=110793 scontext=u:r:system_app:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:13.758 E/audit ( 1091): type=1300 audit(1527882073.749:43878): arch=c00000b7 syscall=66 success=yes exit=79 a0=3 a1=7f86ef8df0 a2=4 a3=0 items=0 ppid=1183 pid=8714 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="Thread-5" exe="/system/bin/app_process64" subj=u:r:system_app:s0 key=(null) 06-01 15:41:13.763 E/audit ( 1091): type=1327 audit(1527882073.749:43878): proctitle="com.sec.downloadablekeystore" 06-01 15:41:13.840 E/ConnectivityService( 2194): RemoteException caught trying to send a callback msg for NetworkRequest [ id=1516, legacyType=-1, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED] ] 06-01 15:41:14.261 E/audit ( 1091): type=1400 audit(1527882074.249:43881): avc: denied { write } for pid=13329 comm="Binder:2194_11" path="socket:[32289]" dev="sockfs" ino=32289 scontext=u:r:system_server:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:14.261 E/audit ( 1091): type=1300 audit(1527882074.249:43881): arch=c00000b7 syscall=66 success=yes exit=245 a0=3 a1=7f5bea4250 a2=4 a3=0 items=0 ppid=1183 pid=13329 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="Binder:2194_11" exe="/system/bin/app_process64" subj=u:r:system_server:s0 key=(null) 06-01 15:41:14.262 E/audit ( 1091): type=1327 audit(1527882074.249:43881): proctitle="system_server" 06-01 15:41:14.266 E/audit ( 1091): type=1400 audit(1527882074.259:43882): avc: denied { read } for pid=3947 comm=4173796E635461736B202331 path=2F6465762F6173686D656D2F64616C76696B2D6E6F6E206D6F76696E672073706163655F313138335F31313833202864656C6574656429 dev="tmpfs" ino=30017 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:init_tmpfs:s0 tclass=file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:14.266 E/audit ( 1091): type=1300 audit(1527882074.259:43882): arch=c00000b7 syscall=226 success=yes exit=0 a0=7688c000 a1=1000 a2=3 a3=7f70e583e0 items=0 ppid=1183 pid=3947 auid=4294967295 uid=10817 gid=10817 euid=10817 suid=10817 fsuid=10817 egid=10817 sgid=10817 fsgid=10817 tty=(none) ses=4294967295 comm=4173796E635461736B202331 exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c512,c768 key=(null) 06-01 15:41:14.267 E/audit ( 1091): type=1327 audit(1527882074.259:43882): proctitle="com.zeapo.pwdstore" 06-01 15:41:15.167 E/audit ( 1091): type=1400 audit(1527882075.159:43883): avc: denied { write } for pid=3947 comm=4173796E635461736B202331 path="socket:[6268507]" dev="sockfs" ino=6268507 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:15.168 E/audit ( 1091): type=1300 audit(1527882075.159:43883): arch=c00000b7 syscall=66 success=yes exit=95 a0=3 a1=7f70e58150 a2=4 a3=0 items=0 ppid=1183 pid=3947 auid=4294967295 uid=10817 gid=10817 euid=10817 suid=10817 fsuid=10817 egid=10817 sgid=10817 fsgid=10817 tty=(none) ses=4294967295 comm=4173796E635461736B202331 exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c512,c768 key=(null) 06-01 15:41:15.176 E/audit ( 1091): type=1327 audit(1527882075.159:43883): proctitle="com.zeapo.pwdstore" 06-01 15:41:15.303 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 31 -82 -10 150 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:15.315 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:15.836 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 31 -80 -10 154 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:15.836 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:16.056 E/AndroidRuntime(32109): FATAL EXCEPTION: AsyncTask #1 06-01 15:41:16.056 E/AndroidRuntime(32109): Process: com.zeapo.pwdstore, PID: 32109 06-01 15:41:16.056 E/AndroidRuntime(32109): java.lang.RuntimeException: An error occurred while executing doInBackground() 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.os.AsyncTask$3.done(AsyncTask.java:318) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.FutureTask.finishCompletion(FutureTask.java:354) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.FutureTask.setException(FutureTask.java:223) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.FutureTask.run(FutureTask.java:242) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:243) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1133) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:607) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.lang.Thread.run(Thread.java:762) 06-01 15:41:16.056 E/AndroidRuntime(32109): Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'java.lang.String java.lang.String.toLowerCase()' on a null object reference 06-01 15:41:16.056 E/AndroidRuntime(32109): at com.zeapo.pwdstore.autofill.AutofillRecyclerAdapter$1.compare(AutofillRecyclerAdapter.java:79) 06-01 15:41:16.056 E/AndroidRuntime(32109): at com.zeapo.pwdstore.autofill.AutofillRecyclerAdapter$1.compare(AutofillRecyclerAdapter.java:74) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.TimSort.binarySort(TimSort.java:296) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.TimSort.sort(TimSort.java:239) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.Arrays.sort(Arrays.java:1450) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.support.v7.util.SortedList.sortAndDedup(SortedList.java:358) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.support.v7.util.SortedList.addAllInternal(SortedList.java:256) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.support.v7.util.SortedList.addAll(SortedList.java:168) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.support.v7.util.SortedList.addAll(SortedList.java:194) 06-01 15:41:16.056 E/AndroidRuntime(32109): at com.zeapo.pwdstore.autofill.AutofillRecyclerAdapter.(AutofillRecyclerAdapter.java:93) 06-01 15:41:16.056 E/AndroidRuntime(32109): at com.zeapo.pwdstore.autofill.AutofillPreferenceActivity$populateTask.doInBackground(AutofillPreferenceActivity.java:106) 06-01 15:41:16.056 E/AndroidRuntime(32109): at com.zeapo.pwdstore.autofill.AutofillPreferenceActivity$populateTask.doInBackground(AutofillPreferenceActivity.java:74) 06-01 15:41:16.056 E/AndroidRuntime(32109): at android.os.AsyncTask$2.call(AsyncTask.java:304) 06-01 15:41:16.056 E/AndroidRuntime(32109): at java.util.concurrent.FutureTask.run(FutureTask.java:237) 06-01 15:41:16.056 E/AndroidRuntime(32109): ... 4 more 06-01 15:41:16.142 E/SLPI_FACTORYD( 1411): left = 32 06-01 15:41:16.143 E/SLPI_FACTORYD( 1411): diag : To stop logging 3 06-01 15:41:16.144 E/SLPI_FACTORYD( 1411): sns_set_diag_mode: diag_configure_peripheral_buffering_tx_mode Enter 06-01 15:41:16.147 E/dumpstate( 3977): /data/misc/recovery: No such file or directory 06-01 15:41:16.147 E/dumpstate( 3977): /data/misc/logd: No such file or directory 06-01 15:41:16.166 E/Diag_Lib(31267): diag: Initializing circular logging, reducing number of pre-existing logging files, current: 3, max: 3 06-01 15:41:16.167 E/Diag_Lib(31267): diag: In delete_log, Deleting logfile /data/log/diag_log_slpi_20180601_1535291527881729580.qmdl of size 442 KB 06-01 15:41:16.169 E/Diag_Lib(31267): creating new file /data/log/diag_log_slpi_20180601_1541161527882076168.qmdl 06-01 15:41:16.172 E/audit ( 1091): type=1400 audit(1527882076.159:43884): avc: denied { read } for pid=3977 comm="dumpstate" name="mnt" dev="proc" ino=6325580 scontext=u:r:dumpstate:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.172 E/audit ( 1091): type=1300 audit(1527882076.159:43884): arch=c00000b7 syscall=78 success=yes exit=16 a0=ffffff9c a1=7ff8d7f818 a2=7ff8d7e818 a3=1000 items=0 ppid=1 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dumpstate" exe="/system/bin/dumpstate" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:16.173 E/dumpstate( 3977): Unable to read link for /proc/1124/ns/mnt: No such file or directory 06-01 15:41:16.174 E/audit ( 1091): type=1327 audit(1527882076.159:43884): proctitle=2F73797374656D2F62696E2F64756D707374617465002D61002D64002D7A002D6F002F646174612F6C6F672F64756D7073746174655F6170705F6572726F72 06-01 15:41:16.405 E/audit ( 1091): type=1400 audit(1527882076.399:43885): avc: denied { read } for pid=3980 comm="top" name="task" dev="proc" ino=6329042 scontext=u:r:dumpstate:s0 tcontext=u:r:logd:s0 tclass=dir permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.405 E/audit ( 1091): type=1400 audit(1527882076.399:43885): avc: denied { open } for pid=3980 comm="top" path="/proc/1035/task" dev="proc" ino=6329042 scontext=u:r:dumpstate:s0 tcontext=u:r:logd:s0 tclass=dir permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.405 E/audit ( 1091): type=1300 audit(1527882076.399:43885): arch=c00000b7 syscall=56 success=yes exit=4 a0=ffffff9c a1=7fc96146c8 a2=84000 a3=0 items=0 ppid=3977 pid=3980 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="top" exe="/system/bin/toolbox" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:16.406 E/audit ( 1091): type=1327 audit(1527882076.399:43885): proctitle=746F70002D6E0031002D640031002D6D003330002D48 06-01 15:41:16.598 E/audit ( 1091): type=1400 audit(1527882076.589:43886): avc: denied { write } for pid=11073 comm="RILReceiver0" path="socket:[119522]" dev="sockfs" ino=119522 scontext=u:r:radio:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.598 E/audit ( 1091): type=1300 audit(1527882076.589:43886): arch=c00000b7 syscall=66 success=yes exit=137 a0=3 a1=7f86ef9750 a2=4 a3=0 items=0 ppid=1183 pid=11073 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 comm="RILReceiver0" exe="/system/bin/app_process64" subj=u:r:radio:s0 key=(null) 06-01 15:41:16.601 E/audit ( 1091): type=1327 audit(1527882076.589:43886): proctitle="com.android.phone" 06-01 15:41:16.776 E/audit ( 1091): type=1400 audit(1527882076.769:43887): avc: denied { connectto } for pid=3981 comm="su" path=0065752E636861696E666972652E73757065727375 scontext=u:r:dumpstate:s0 tcontext=u:r:supersu:s0 tclass=unix_stream_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.776 E/audit ( 1091): type=1300 audit(1527882076.769:43887): arch=c00000b7 syscall=203 success=yes exit=0 a0=3 a1=7fd976c568 a2=17 a3=7fb65484ac items=0 ppid=3977 pid=3981 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="su" exe="/system/xbin/su" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:16.778 E/audit ( 1091): type=1327 audit(1527882076.769:43887): proctitle=2F73797374656D2F7862696E2F737500726F6F740070726F6372616E6B 06-01 15:41:16.901 E/audit ( 1091): type=1400 audit(1527882076.889:43888): avc: denied { getattr } for pid=3985 comm="ps" path="/proc/1035" dev="proc" ino=6324905 scontext=u:r:dumpstate:s0 tcontext=u:r:logd:s0 tclass=dir permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.901 E/audit ( 1091): type=1300 audit(1527882076.889:43888): arch=c00000b7 syscall=79 success=yes exit=0 a0=ffffff9c a1=7ffb34a818 a2=7ffb348f68 a3=0 items=0 ppid=3977 pid=3985 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="ps" exe="/system/bin/toolbox" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:16.902 E/audit ( 1091): type=1327 audit(1527882076.889:43888): proctitle=7073002D5A002D74002D70002D50002D78002D2D616269 06-01 15:41:16.902 E/audit ( 1091): type=1400 audit(1527882076.889:43889): avc: denied { getattr } for pid=3985 comm="ps" scontext=u:r:dumpstate:s0 tcontext=u:r:logd:s0 tclass=process permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:16.903 E/audit ( 1091): type=1300 audit(1527882076.889:43889): arch=c00000b7 syscall=63 success=yes exit=12 a0=9 a1=7ffb34a018 a2=3ff a3=400 items=0 ppid=3977 pid=3985 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="ps" exe="/system/bin/toolbox" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:16.904 E/audit ( 1091): type=1327 audit(1527882076.889:43889): proctitle=7073002D5A002D74002D70002D50002D78002D2D616269 06-01 15:41:17.191 E/Diag_Lib(31267): diag: Signal received 06-01 15:41:17.191 E/Diag_Lib(31267): diag: Sending empty mask MSM 06-01 15:41:17.192 E/Diag_Lib( 3988): 06-01 15:41:17.192 E/Diag_Lib( 3988): diag_mdlog: stopping diag_mdlog instance pid: 31267 06-01 15:41:17.209 E/audit ( 1091): type=1400 audit(1527882077.199:43890): avc: denied { write } for pid=7377 comm="Binder:2194_8" path="socket:[32289]" dev="sockfs" ino=32289 scontext=u:r:system_server:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:17.210 E/audit ( 1091): type=1300 audit(1527882077.199:43890): arch=c00000b7 syscall=66 success=yes exit=238 a0=3 a1=7f5e564250 a2=4 a3=0 items=0 ppid=1183 pid=7377 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="Binder:2194_8" exe="/system/bin/app_process64" subj=u:r:system_server:s0 key=(null) 06-01 15:41:17.212 E/audit ( 1091): type=1327 audit(1527882077.199:43890): proctitle="system_server" 06-01 15:41:17.325 E/dumpstate( 3977): command 'lsmod ' failed: No such file or directory 06-01 15:41:17.396 E/Diag_Lib(31267): diag:In diag_kill_qshrink4_threads finished killing qshrink4 threads 06-01 15:41:17.396 E/Diag_Lib(31267): diag: sending signal to unblock read thread 06-01 15:41:17.396 E/Diag_Lib(31267): diag:dummy_handler: pid-tid 31267-31268 06-01 15:41:17.396 E/Diag_Lib(31267): CreateWaitThread exiting ...[1].. 06-01 15:41:17.404 E/Diag_Lib(31267): Exiting....WriteToDisk 06-01 15:41:17.407 E/dumpstate( 3977): command 'showgpumem showgpumem -a' failed: No such file or directory 06-01 15:41:17.446 E/Diag_Lib(31267): diag: Sending cond to CreateWaitThread 06-01 15:41:17.552 E/Watchdog( 2194): !@Sync 1291 [2018-06-01 15:41:17.550] 06-01 15:41:17.634 E/audit ( 1091): type=1400 audit(1527882077.629:43891): avc: denied { read } for pid=32122 comm="HeapTaskDaemon" path=2F6465762F6173686D656D2F64616C76696B2D6D61696E2073706163655F313138335F31313833202864656C6574656429 dev="tmpfs" ino=27927 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:init_tmpfs:s0 tclass=file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:17.634 E/audit ( 1091): type=1300 audit(1527882077.629:43891): arch=c00000b7 syscall=226 success=yes exit=0 a0=132a9000 a1=1d4000 a2=0 a3=940 items=0 ppid=1183 pid=32122 auid=4294967295 uid=10817 gid=10817 euid=10817 suid=10817 fsuid=10817 egid=10817 sgid=10817 fsgid=10817 tty=(none) ses=4294967295 comm="HeapTaskDaemon" exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c512,c768 key=(null) 06-01 15:41:17.642 E/audit ( 1091): type=1327 audit(1527882077.629:43891): proctitle="com.zeapo.pwdstore" 06-01 15:41:17.669 E/Diag_Lib(31267): diag: Exiting program 06-01 15:41:19.204 E/SLPI_FACTORYD( 1411): sns_set_diag_mode: diag_configure_peripheral_buffering_tx_mode Enter 06-01 15:41:20.248 E/Diag_Lib( 3998): diag_mdlog: successfully created pid file, pid: 3998 06-01 15:41:20.248 E/Diag_Lib( 3998): diag_mdlog: Warning output directory already exists: /data/log 06-01 15:41:20.248 E/Diag_Lib( 3998): diag_mdlog: Proceeding... 06-01 15:41:20.259 E/Diag_Lib( 3998): 06-01 15:41:20.259 E/Diag_Lib( 3998): diag_mdlog: Diag_LSM_Init succeeded. 06-01 15:41:20.259 E/Diag_Lib( 3998): 06-01 15:41:20.259 E/Diag_Lib( 3998): REMOTE PROCESSOR MASK 0 06-01 15:41:20.260 E/Diag_Lib( 3998): logging switched 06-01 15:41:20.260 E/Diag_Lib( 3998): Output dirs /data/log --- /data/log 06-01 15:41:20.260 E/Diag_Lib( 3998): 06-01 15:41:20.260 E/Diag_Lib( 3998): diag_mdlog: Reading mask for MSM, proc_type: 0 06-01 15:41:20.261 E/Diag_Lib( 3998): Reading the mask file: /system/etc/Diag_Sensor.cfg 06-01 15:41:20.261 E/Diag_Lib( 3998): diag: Determining contents of directory /data/log for circular logging ... 06-01 15:41:21.041 E/XDK (29670): Failed to send data. 06-01 15:41:21.051 E/BatteryStatsService( 2194): power: Missing API 06-01 15:41:21.144 E/BatteryStatsService( 2194): no controller energy info supplied 06-01 15:41:21.272 E/NetlinkEvent( 1264): NetlinkEvent::FindParam(): Parameter 'LABEL' not found 06-01 15:41:21.389 E/NetlinkEvent( 1264): NetlinkEvent::FindParam(): Parameter 'LABEL' not found 06-01 15:41:21.408 E/QC-NETMGR-LIB( 1457): Processing NETMGR_QOS_FLOW_ENABLED or NETMGR_QOS_FLOW_DISABLED for 0 06-01 15:41:21.608 E/QC-NETMGR-LIB( 1457): Processing NETMGR_QOS_FLOW_ENABLED or NETMGR_QOS_FLOW_DISABLED for 0 06-01 15:41:21.658 E/audit ( 1091): type=1400 audit(1527882081.649:43892): avc: denied { write } for pid=11762 comm="ImsModemReceive" path="socket:[119522]" dev="sockfs" ino=119522 scontext=u:r:radio:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:21.658 E/audit ( 1091): type=1300 audit(1527882081.649:43892): arch=c00000b7 syscall=66 success=yes exit=88 a0=3 a1=7f6dac4930 a2=4 a3=0 items=0 ppid=1183 pid=11762 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 comm="ImsModemReceive" exe="/system/bin/app_process64" subj=u:r:radio:s0 key=(null) 06-01 15:41:21.659 E/audit ( 1091): type=1327 audit(1527882081.649:43892): proctitle="com.android.phone" 06-01 15:41:22.348 D/NetworkController.MobileSignalController(0/1)(24087): onDataActivity: direction=3 06-01 15:41:22.349 E/audit ( 1091): type=1400 audit(1527882082.339:43893): avc: denied { write } for pid=24942 comm="PhoneStatusBar" path="socket:[6107126]" dev="sockfs" ino=6107126 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:22.350 E/audit ( 1091): type=1300 audit(1527882082.339:43893): arch=c00000b7 syscall=66 success=yes exit=86 a0=3 a1=7f6de82870 a2=4 a3=0 items=0 ppid=1183 pid=24942 auid=4294967295 uid=10005 gid=10005 euid=10005 suid=10005 fsuid=10005 egid=10005 sgid=10005 fsgid=10005 tty=(none) ses=4294967295 comm="PhoneStatusBar" exe="/system/bin/app_process64" subj=u:r:platform_app:s0:c512,c768 key=(null) 06-01 15:41:22.353 E/audit ( 1091): type=1327 audit(1527882082.339:43893): proctitle="com.android.systemui" 06-01 15:41:22.399 E/audit ( 1091): type=1400 audit(1527882082.389:43894): avc: denied { write } for pid=14055 comm="ENGINE_CORE" path="socket:[5881223]" dev="sockfs" ino=5881223 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:22.399 E/audit ( 1091): type=1300 audit(1527882082.389:43894): arch=c00000b7 syscall=66 success=yes exit=76 a0=3 a1=7f86ef9370 a2=4 a3=0 items=0 ppid=1183 pid=14055 auid=4294967295 uid=10447 gid=10447 euid=10447 suid=10447 fsuid=10447 egid=10447 sgid=10447 fsgid=10447 tty=(none) ses=4294967295 comm="ENGINE_CORE" exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c512,c768 key=(null) 06-01 15:41:22.402 E/audit ( 1091): type=1327 audit(1527882082.389:43894): proctitle="com.mytwc.common.resource:wefiService" 06-01 15:41:22.534 E/dumpstate( 3977): command 'tima_dump_log ' failed: Permission denied 06-01 15:41:23.354 D/NetworkController.MobileSignalController(0/1)(24087): onDataActivity: direction=0 06-01 15:41:23.355 E/audit ( 1091): type=1400 audit(1527882083.349:43895): avc: denied { write } for pid=24942 comm="PhoneStatusBar" path="socket:[6107126]" dev="sockfs" ino=6107126 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:23.355 E/audit ( 1091): type=1300 audit(1527882083.349:43895): arch=c00000b7 syscall=66 success=yes exit=86 a0=3 a1=7f6de82870 a2=4 a3=0 items=0 ppid=1183 pid=24942 auid=4294967295 uid=10005 gid=10005 euid=10005 suid=10005 fsuid=10005 egid=10005 sgid=10005 fsgid=10005 tty=(none) ses=4294967295 comm="PhoneStatusBar" exe="/system/bin/app_process64" subj=u:r:platform_app:s0:c512,c768 key=(null) 06-01 15:41:23.357 E/audit ( 1091): type=1327 audit(1527882083.349:43895): proctitle="com.android.systemui" 06-01 15:41:23.832 E/audit ( 1091): type=1400 audit(1527882083.829:43896): avc: denied { connectto } for pid=4009 comm="su" path=0065752E636861696E666972652E73757065727375 scontext=u:r:dumpstate:s0 tcontext=u:r:supersu:s0 tclass=unix_stream_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:23.833 E/audit ( 1091): type=1300 audit(1527882083.829:43896): arch=c00000b7 syscall=203 success=yes exit=0 a0=3 a1=7fe9300588 a2=17 a3=7f95bee4ac items=0 ppid=3977 pid=4009 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="su" exe="/system/xbin/su" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:23.834 E/audit ( 1091): type=1327 audit(1527882083.829:43896): proctitle=2F73797374656D2F7862696E2F737500726F6F74006C736F66 06-01 15:41:26.725 E/ANDR-PERF-MPCTL( 1095): Invalid profile no. 0, total profiles 0 only 06-01 15:41:26.745 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 30 -80 -10 148 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:26.745 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:26.748 E/audit ( 1091): type=1400 audit(1527882086.739:43897): avc: denied { write } for pid=10433 comm="c.wfccontroller" path="socket:[117736]" dev="sockfs" ino=117736 scontext=u:r:system_app:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.748 E/audit ( 1091): type=1300 audit(1527882086.739:43897): arch=c00000b7 syscall=66 success=yes exit=93 a0=3 a1=7fdc6e75e0 a2=4 a3=0 items=0 ppid=1183 pid=10433 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="c.wfccontroller" exe="/system/bin/app_process64" subj=u:r:system_app:s0 key=(null) 06-01 15:41:26.748 E/audit ( 1091): type=1327 audit(1527882086.739:43897): proctitle="zygote64" 06-01 15:41:26.753 E/NetdConnector( 2194): NDC event {613 IfaceClass idle 0 57058818401770} processed too late: 5421ms 06-01 15:41:26.777 E/NetdConnector( 2194): NDC event {613 IfaceClass active 0 57058935631301 11095} processed too late: 5363ms 06-01 15:41:26.795 E/audit ( 1091): type=1400 audit(1527882086.789:43898): avc: denied { write } for pid=2194 comm="system_server" path="socket:[32289]" dev="sockfs" ino=32289 scontext=u:r:system_server:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.795 E/audit ( 1091): type=1300 audit(1527882086.789:43898): arch=c00000b7 syscall=66 success=yes exit=149 a0=3 a1=7fdc6e61d0 a2=4 a3=0 items=0 ppid=1183 pid=2194 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="system_server" exe="/system/bin/app_process64" subj=u:r:system_server:s0 key=(null) 06-01 15:41:26.796 E/audit ( 1091): type=1327 audit(1527882086.789:43898): proctitle="zygote64" 06-01 15:41:26.796 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 28 -80 -11 102 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:26.796 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:26.845 E/audit ( 1091): type=1400 audit(1527882086.839:43899): avc: denied { write } for pid=8612 comm="Binder:7324_3" path="socket:[99036]" dev="sockfs" ino=99036 scontext=u:r:nfc:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.845 E/audit ( 1091): type=1300 audit(1527882086.839:43899): arch=c00000b7 syscall=66 success=yes exit=59 a0=3 a1=7f713b3290 a2=4 a3=0 items=0 ppid=1183 pid=8612 auid=4294967295 uid=1027 gid=1027 euid=1027 suid=1027 fsuid=1027 egid=1027 sgid=1027 fsgid=1027 tty=(none) ses=4294967295 comm="Binder:7324_3" exe="/system/bin/app_process64" subj=u:r:nfc:s0 key=(null) 06-01 15:41:26.846 E/audit ( 1091): type=1327 audit(1527882086.839:43899): proctitle="com.android.nfc" 06-01 15:41:26.879 E/audit ( 1091): type=1400 audit(1527882086.869:43900): avc: denied { setpcap } for pid=4509 comm="main" capability=8 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=capability permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.879 E/audit ( 1091): type=1300 audit(1527882086.869:43900): arch=c00000b7 syscall=167 success=yes exit=0 a0=18 a1=0 a2=0 a3=0 items=0 ppid=1183 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:init:s0 key=(null) 06-01 15:41:26.880 E/Zygote ( 4509): v2 06-01 15:41:26.883 E/Zygote ( 4509): accessInfo : 0 06-01 15:41:26.883 E/audit ( 1091): type=1327 audit(1527882086.869:43900): proctitle="zygote64" 06-01 15:41:26.883 E/audit ( 1091): type=1400 audit(1527882086.869:43901): avc: denied { getpgid } for pid=1183 comm="main" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.883 E/audit ( 1091): type=1300 audit(1527882086.869:43901): arch=c00000b7 syscall=155 success=yes exit=1183 a0=892 a1=7fdc6e7ea4 a2=892 a3=0 items=0 ppid=1 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:init:s0 key=(null) 06-01 15:41:26.884 E/audit ( 1091): type=1327 audit(1527882086.869:43901): proctitle=2F73797374656D2F62696E2F6170705F70726F636573733634002D587A79676F7465002F73797374656D2F62696E002D2D7A79676F7465002D2D73746172742D73797374656D2D736572766572002D2D736F636B65742D6E616D653D7A79676F7465 06-01 15:41:26.885 E/audit ( 1091): type=1400 audit(1527882086.879:43902): avc: denied { check_context } for pid=4509 comm="main" scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.885 E/audit ( 1091): type=1300 audit(1527882086.879:43902): arch=c00000b7 syscall=64 success=yes exit=18 a0=3e a1=7f84c7f360 a2=12 a3=ffffffffffffffff items=0 ppid=1183 pid=4509 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:init:s0 key=(null) 06-01 15:41:26.888 E/audit ( 1091): type=1327 audit(1527882086.879:43902): proctitle="zygote64" 06-01 15:41:26.888 E/audit ( 1091): type=1400 audit(1527882086.879:43903): avc: denied { dyntransition } for pid=4509 comm="main" scontext=u:r:init:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.888 E/audit ( 1091): type=1300 audit(1527882086.879:43903): arch=c00000b7 syscall=64 success=yes exit=18 a0=3e a1=7f84c7f360 a2=12 a3=ffffffffffffffff items=0 ppid=1183 pid=4509 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:system_app:s0 key=(null) 06-01 15:41:26.891 E/audit ( 1091): type=1327 audit(1527882086.879:43903): proctitle="zygote64" 06-01 15:41:26.902 E/audit ( 1091): type=1400 audit(1527882086.899:43904): avc: denied { connectto } for pid=4507 comm="su" path=0065752E636861696E666972652E73757065727375 scontext=u:r:dumpstate:s0 tcontext=u:r:supersu:s0 tclass=unix_stream_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.902 E/audit ( 1091): type=1300 audit(1527882086.899:43904): arch=c00000b7 syscall=203 success=yes exit=0 a0=3 a1=7ff03da2e8 a2=17 a3=7fb48624ac items=0 ppid=3977 pid=4507 auid=4294967295 uid=2000 gid=2000 euid=2000 suid=2000 fsuid=2000 egid=2000 sgid=2000 fsgid=2000 tty=(none) ses=4294967295 comm="su" exe="/system/xbin/su" subj=u:r:dumpstate:s0 key=(null) 06-01 15:41:26.907 E/audit ( 1091): type=1327 audit(1527882086.899:43904): proctitle=2F73797374656D2F7862696E2F737500726F6F740073686F776D6170002D7100313738 06-01 15:41:26.997 E/audit ( 1091): type=1400 audit(1527882086.989:43905): avc: denied { read } for pid=4509 comm="re-initialized>" path=2F6465762F6173686D656D2F64616C76696B2D6E6F6E206D6F76696E672073706163655F313138335F31313833202864656C6574656429 dev="tmpfs" ino=30017 scontext=u:r:system_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:26.997 E/audit ( 1091): type=1300 audit(1527882086.989:43905): arch=c00000b7 syscall=226 success=yes exit=0 a0=76887000 a1=1000 a2=3 a3=7fdc6e5ae0 items=0 ppid=1183 pid=4509 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm="re-initialized>" exe="/system/bin/app_process64" subj=u:r:system_app:s0 key=(null) 06-01 15:41:26.999 E/audit ( 1091): type=1327 audit(1527882086.989:43905): proctitle="zygote64" 06-01 15:41:27.034 E/audit ( 1091): type=1400 audit(1527882087.029:43906): avc: denied { write } for pid=11713 comm="RILReceiver" path="socket:[99260]" dev="sockfs" ino=99260 scontext=u:r:radio:s0 tcontext=u:r:init:s0 tclass=unix_dgram_socket permissive=1 SEPF_SECMOBILE_7.0_0009 unfiltered 06-01 15:41:27.034 E/audit ( 1091): type=1300 audit(1527882087.029:43906): arch=c00000b7 syscall=66 success=yes exit=44 a0=3 a1=7f9165c8a0 a2=4 a3=0 items=0 ppid=1183 pid=11713 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 comm="RILReceiver" exe="/system/bin/app_process64" subj=u:r:radio:s0 key=(null) 06-01 15:41:27.535 E/bauth_FPBAuthSensorControl( 1285): BAuthDeviceCpuSpeedUp 1 sys call failed 06-01 15:41:27.744 E/bauth_FPBAuthSensorControl( 1285): BAuthDeviceCpuSpeedUp 0 sys call failed 06-01 15:41:27.747 E/qti_sensorhub_hal( 1165): SS_AUTO_BRIGHTNESS 4 b2 06-01 15:41:27.748 E/qti_sensorhub_hal( 1165): enable: Disabling sensor handle=12 06-01 15:41:27.795 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 28 -81 -11 92 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:27.795 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:27.805 D/NetworkController.MobileSignalController(0/1)(24087): onSignalStrengthsChanged signalStrength=SignalStrength: 99 99 -120 -160 -120 -1 -1 28 -81 -11 92 2147483647 2147483647 0x4000 gsm|lte level=4 06-01 15:41:27.805 D/NetworkController.MobileSignalController(0/1)(24087): getMobileIconGroup(): 13 06-01 15:41:27.976 E/ANDR-PERF-MPCTL( 1095): Invalid profile no. 0, total profiles 0 only 06-01 15:41:27.982 E/ActivityManager( 2194): Found activity ActivityRecord{dbc0490d0 u0 com.zeapo.pwdstore/.PasswordStore t23864 f} in proc activity list using null instead of expected ProcessRecord{4381eed 32109:com.zeapo.pwdstore/u0a817}