' from pid: 157 (/system/bin/servicemanager)
[ 4427.370644] servicemanager: Notifying artd they do (previously: don't) have clients when service is guaranteed to be in use
[ 4427.371770] BpBinder: onLastStrongRef automatically unlinking death recipients: 
[ 4427.513994] type=1400 audit(1730098509.716:87): avc:  denied  { getopt } for  comm="binder:630_3" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=unix_stream_socket permissive=0
[ 4427.527431] type=1400 audit(1730098509.716:88): avc:  denied  { getopt } for  comm="binder:630_3" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=unix_stream_socket permissive=0
[ 4427.531803] type=1400 audit(1730098509.716:89): avc:  denied  { getopt } for  comm="binder:630_3" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=unix_stream_socket permissive=0
[ 4427.935996] type=1400 audit(1730098510.140:90): avc:  denied  { call } for  comm="service" scontext=u:r:shell:s0 tcontext=u:r:hal_authsecret_default:s0 tclass=binder permissive=0
[ 4427.942129] audit: audit_lost=33 audit_rate_limit=5 audit_backlog_limit=64
[ 4427.944198] type=1400 audit(1730098510.144:91): avc:  denied  { call } for  comm="service" scontext=u:r:shell:s0 tcontext=u:r:hal_face_default:s0 tclass=binder permissive=0
[ 4427.946634] audit: rate limit exceeded
[ 4428.037796] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=android.hardware.security.keymint.IKeyMintDevice/default scontext=u:r:shell:s0 tcontext=u:object_r:hal_keymint_service:s0 tclass=service_manager permissive=0
[ 4428.055829] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=android.hardware.security.secureclock.ISecureClock/default scontext=u:r:shell:s0 tcontext=u:object_r:hal_secureclock_service:s0 tclass=service_manager permissive=0
[ 4428.059908] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=android.hardware.security.sharedsecret.ISharedSecret/default scontext=u:r:shell:s0 tcontext=u:object_r:hal_sharedsecret_service:s0 tclass=service_manager permissive=0
[ 4428.081795] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=android.service.gatekeeper.IGateKeeperService scontext=u:r:shell:s0 tcontext=u:object_r:gatekeeper_service:s0 tclass=service_manager permissive=0
[ 4428.240752] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=dnsresolver scontext=u:r:shell:s0 tcontext=u:object_r:dnsresolver_service:s0 tclass=service_manager permissive=0
[ 4428.382578] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=incident scontext=u:r:shell:s0 tcontext=u:object_r:incident_service:s0 tclass=service_manager permissive=0
[ 4428.420270] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=installd scontext=u:r:shell:s0 tcontext=u:object_r:installd_service:s0 tclass=service_manager permissive=0
[ 4428.491523] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=mdns scontext=u:r:shell:s0 tcontext=u:object_r:mdns_service:s0 tclass=service_manager permissive=0
[ 4428.591200] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=netd scontext=u:r:shell:s0 tcontext=u:object_r:netd_service:s0 tclass=service_manager permissive=0
[ 4428.754071] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=suspend_control scontext=u:r:shell:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0
[ 4428.756918] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=suspend_control_internal scontext=u:r:shell:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0
[ 4428.808067] SELinux: avc:  denied  { find } for pid=4256 uid=2000 name=vold scontext=u:r:shell:s0 tcontext=u:object_r:vold_service:s0 tclass=service_manager permissive=0
[ 4428.821985] type=1400 audit(1730098511.024:124): avc:  denied  { call } for  comm="service" scontext=u:r:shell:s0 tcontext=u:r:wificond:s0 tclass=binder permissive=0
[ 4640.004216] healthd: battery l=100 v=5000 t=25.0 h=2 st=4 c=900000 fc=3000000 cc=10 chg=
[ 4669.152111] healthd: battery l=100 v=5000 t=25.0 h=2 st=4 c=900000 fc=3000000 cc=10 chg=
