Settings stop working

Hi all together,

I installed on my OmePlus 7 the newest Rom. Recovery ist the last TWRP.
Every thing ist working well. Then I made a Backup with TWRP. After that: Phone ist working normal but always when I go to the settings, a pop-up aperas to say “Einstellungen wird wiederholt beendet” in english that mean “settings stop working”.
I had wipe chage/Dalvik chage but it´s still the same.

I hope anyone cah help

Regain your privacy! Adopt /e/ the unGoogled mobile OS and online servicesphone

if you can look at “adb logcat” while you tap the Settings you’ll see the reason for the crash

Thanks !
Now I have logged the process several times. Because the log from taping the “settings button” until closing the pop-up window is very long it is hard for me to identify the real reason. But I think it will one of this processes :
*W ActivityTaskManager: Force finishing activity com.android.settings/.homepage.SettingsHomepageActivity
*I DropBoxManagerService: add tag=system_app_crash isTagEnabled=true flags=0x2
*I ActivityManager: Showing crash dialog for package com.android.settings u0

Can you helb me? What I have to do now?

could you add more context, lines prior to the “W” (warning) of com.android.settings being force-closed? “E” lines as in error should precede the Warning line best-case. Anything having “exception” in it some lines before the close too

That´s the whole log from taping the settings-button until closing the pop-up:

12-18 09:58:54.406 6615 32701 I davx5 : PARAMETER #0 = SyncResult: stats []
12-18 09:59:00.006 1963 1963 D KeyguardClockSwitch: Updating clock: 09:59
12-18 09:59:00.056 1233 1839 E LightsService: Light requested not available on this device. 2
12-18 09:59:00.165 1963 1963 V StatusBar: mStatusBarWindow: com.android.systemui.statusbar.phone.StatusBarWindowView{d4891de V.E… … 0,0-1080,2340} canPanelBeCollapsed(): true
12-18 09:58:39.262 1233 1859 I chatty : uid=1000(system) ConnectivitySer identical 1 line
12-18 09:58:56.846 1233 1859 D ConnectivityService: maybeHandleNetworkMonitorMessage: 528386
12-18 09:59:00.171 1233 14607 I ActivityTaskManager: START u0 {act=android.settings.SETTINGS flg=0x14000000 cmp=com.android.settings/.homepage.SettingsHomepageActivity} from uid 10130
12-18 09:59:00.200 1233 1324 E system_server: Invalid ID 0x00000000.
12-18 09:59:00.206 1233 1341 I ActivityManager: Start proc 32392:com.android.settings/1000 for pre-top-activity {com.android.settings/com.android.settings.homepage.SettingsHomepageActivity}
12-18 09:59:00.233 32392 32392 W ndroid.settings: type=1400 audit(0.0:39063): avc: denied { getattr } for path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
12-18 09:59:00.233 32392 32392 W ndroid.settings: type=1400 audit(0.0:39064): avc: denied { search } for name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
12-18 09:59:00.242 32392 32392 W ndroid.setting: JIT profile information will not be recorded: profile file does not exits.
12-18 09:59:00.246 32392 32392 E ContextImpl: Data directory doesn’t exist for package com.android.settings
12-18 09:59:00.246 32392 32392 E ContextImpl: java.lang.Throwable
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ContextImpl.getDataDir(ContextImpl.java:2341)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ContextImpl.getCacheDir(ContextImpl.java:732)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ActivityThread.setupGraphicsSupport(ActivityThread.java:6031)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6350)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.246 32392 32392 E ContextImpl: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.246 32392 32392 E ContextImpl: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.246 32392 32392 E ContextImpl: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.246 32392 32392 E ContextImpl: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.247 1233 32723 I DropBoxManagerService: add tag=system_app_wtf isTagEnabled=true flags=0x2
12-18 09:59:00.248 32392 32392 W ContextImpl: Failed to ensure /data/user_de/0/com.android.settings/cache: mkdir failed: EACCES (Permission denied)
12-18 09:59:00.248 32392 32392 W ContextImpl: Failed to update user.inode_cache: stat failed: EACCES (Permission denied)
12-18 09:59:00.248 32392 32392 E ContextImpl: Data directory doesn’t exist for package com.android.settings
12-18 09:59:00.248 32392 32392 E ContextImpl: java.lang.Throwable
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ContextImpl.getDataDir(ContextImpl.java:2341)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ContextImpl.getCodeCacheDir(ContextImpl.java:742)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ActivityThread.setupGraphicsSupport(ActivityThread.java:6042)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6350)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.248 32392 32392 E ContextImpl: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.248 32392 32392 E ContextImpl: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.248 32392 32392 E ContextImpl: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.248 32392 32392 E ContextImpl: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.250 1233 32724 I DropBoxManagerService: add tag=system_app_wtf isTagEnabled=true flags=0x2
12-18 09:59:00.251 32392 32392 W ContextImpl: Failed to ensure /data/user_de/0/com.android.settings/code_cache: mkdir failed: EACCES (Permission denied)
12-18 09:59:00.251 32392 32392 W ContextImpl: Failed to update user.inode_code_cache: stat failed: EACCES (Permission denied)
12-18 09:59:00.253 32392 32392 E ContextImpl: Data directory doesn’t exist for package com.android.settings
12-18 09:59:00.253 32392 32392 E ContextImpl: java.lang.Throwable
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ContextImpl.getDataDir(ContextImpl.java:2341)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ContextImpl.getCacheDir(ContextImpl.java:732)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.content.ContextWrapper.getCacheDir(ContextWrapper.java:273)
12-18 09:59:00.253 32392 32392 E ContextImpl: at androidx.core.content.FileProvider.parsePathStrategy(FileProvider.java:631)
12-18 09:59:00.253 32392 32392 E ContextImpl: at androidx.core.content.FileProvider.getPathStrategy(FileProvider.java:579)
12-18 09:59:00.253 32392 32392 E ContextImpl: at androidx.core.content.FileProvider.attachInfo(FileProvider.java:392)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread.installProvider(ActivityThread.java:6983)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread.installContentProviders(ActivityThread.java:6528)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6445)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.253 32392 32392 E ContextImpl: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.253 32392 32392 E ContextImpl: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.253 32392 32392 E ContextImpl: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.253 32392 32392 E ContextImpl: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.255 32392 32392 W ContextImpl: Failed to ensure /data/user_de/0/com.android.settings/cache: mkdir failed: EACCES (Permission denied)
12-18 09:59:00.255 32392 32392 W ContextImpl: Failed to update user.inode_cache: stat failed: EACCES (Permission denied)
12-18 09:59:00.255 1233 32725 I DropBoxManagerService: add tag=system_app_wtf isTagEnabled=true flags=0x2
12-18 09:59:00.256 32392 32392 E ContextImpl: Data directory doesn’t exist for package com.android.settings
12-18 09:59:00.256 32392 32392 E ContextImpl: java.lang.Throwable
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ContextImpl.getDataDir(ContextImpl.java:2341)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ContextImpl.getDatabasesDir(ContextImpl.java:872)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ContextImpl.getDatabasePath(ContextImpl.java:854)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.content.ContextWrapper.getDatabasePath(ContextWrapper.java:331)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.database.sqlite.SQLiteOpenHelper.getDatabaseLocked(SQLiteOpenHelper.java:371)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.database.sqlite.SQLiteOpenHelper.getWritableDatabase(SQLiteOpenHelper.java:317)
12-18 09:59:00.256 32392 32392 E ContextImpl: at com.android.settings.development.OTAProvider.onCreate(OTAProvider.java:61)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.content.ContentProvider.attachInfo(ContentProvider.java:2092)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.content.ContentProvider.attachInfo(ContentProvider.java:2066)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread.installProvider(ActivityThread.java:6983)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread.installContentProviders(ActivityThread.java:6528)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6445)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.256 32392 32392 E ContextImpl: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.256 32392 32392 E ContextImpl: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.256 32392 32392 E ContextImpl: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.256 32392 32392 E ContextImpl: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.258 1233 32726 I DropBoxManagerService: add tag=system_app_wtf isTagEnabled=true flags=0x2
12-18 09:59:00.258 32392 32392 W ContextImpl: Failed to ensure /data/user_de/0/com.android.settings/databases: mkdir failed: EACCES (Permission denied)
12-18 09:59:00.260 32392 32392 E SQLiteLog: (14) cannot open file at line 36937 of [68b898381a]
12-18 09:59:00.260 32392 32392 E SQLiteLog: (14) os_unix.c:36937: (13) lstat(/data/user_de/0/com.android.settings/databases/mydb) -
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: Failed to open database ‘/data/user_de/0/com.android.settings/databases/mydb’.
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: android.database.sqlite.SQLiteCantOpenDatabaseException: unknown error (code 14 SQLITE_CANTOPEN): Could not open database
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnection.nativeOpen(Native Method)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnection.open(SQLiteConnection.java:215)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnection.open(SQLiteConnection.java:197)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnectionPool.openConnectionLocked(SQLiteConnectionPool.java:505)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnectionPool.open(SQLiteConnectionPool.java:206)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteConnectionPool.open(SQLiteConnectionPool.java:198)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteDatabase.openInner(SQLiteDatabase.java:915)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteDatabase.open(SQLiteDatabase.java:895)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteDatabase.openDatabase(SQLiteDatabase.java:759)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteDatabase.openDatabase(SQLiteDatabase.java:748)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteOpenHelper.getDatabaseLocked(SQLiteOpenHelper.java:374)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.database.sqlite.SQLiteOpenHelper.getWritableDatabase(SQLiteOpenHelper.java:317)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at com.android.settings.development.OTAProvider.onCreate(OTAProvider.java:61)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.content.ContentProvider.attachInfo(ContentProvider.java:2092)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.content.ContentProvider.attachInfo(ContentProvider.java:2066)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread.installProvider(ActivityThread.java:6983)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread.installContentProviders(ActivityThread.java:6528)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6445)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.260 32392 32392 E SQLiteDatabase: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.260 32392 32392 D AndroidRuntime: Shutting down VM
12-18 09:59:00.261 32392 32392 E AndroidRuntime: FATAL EXCEPTION: main
12-18 09:59:00.261 32392 32392 E AndroidRuntime: Process: com.android.settings, PID: 32392
12-18 09:59:00.261 32392 32392 E AndroidRuntime: java.lang.RuntimeException: Unable to get provider com.android.settings.development.OTAProvider: android.database.sqlite.SQLiteCantOpenDatabaseException: unknown error (code 14 SQLITE_CANTOPEN): Could not open database
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.installProvider(ActivityThread.java:6988)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.installContentProviders(ActivityThread.java:6528)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6445)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.access$1300(ActivityThread.java:219)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1859)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.os.Handler.dispatchMessage(Handler.java:107)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.os.Looper.loop(Looper.java:214)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.main(ActivityThread.java:7356)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at java.lang.reflect.Method.invoke(Native Method)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: Caused by: android.database.sqlite.SQLiteCantOpenDatabaseException: unknown error (code 14 SQLITE_CANTOPEN): Could not open database
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnection.nativeOpen(Native Method)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnection.open(SQLiteConnection.java:215)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnection.open(SQLiteConnection.java:197)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnectionPool.openConnectionLocked(SQLiteConnectionPool.java:505)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnectionPool.open(SQLiteConnectionPool.java:206)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteConnectionPool.open(SQLiteConnectionPool.java:198)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteDatabase.openInner(SQLiteDatabase.java:915)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteDatabase.open(SQLiteDatabase.java:895)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteDatabase.openDatabase(SQLiteDatabase.java:759)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteDatabase.openDatabase(SQLiteDatabase.java:748)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteOpenHelper.getDatabaseLocked(SQLiteOpenHelper.java:374)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.database.sqlite.SQLiteOpenHelper.getWritableDatabase(SQLiteOpenHelper.java:317)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at com.android.settings.development.OTAProvider.onCreate(OTAProvider.java:61)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.content.ContentProvider.attachInfo(ContentProvider.java:2092)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.content.ContentProvider.attachInfo(ContentProvider.java:2066)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: at android.app.ActivityThread.installProvider(ActivityThread.java:6983)
12-18 09:59:00.261 32392 32392 E AndroidRuntime: … 10 more
12-18 09:59:00.264 1233 14607 W ActivityTaskManager: Force finishing activity com.android.settings/.homepage.SettingsHomepageActivity
12-18 09:59:00.264 1233 32727 I DropBoxManagerService: add tag=system_app_crash isTagEnabled=true flags=0x2
12-18 09:59:00.268 1233 1320 I ActivityManager: Showing crash dialog for package com.android.settings u0
12-18 09:59:00.511 1963 1963 D ImageWallpaper: wallpaper visibility changes to: false
12-18 09:59:00.658 1963 1963 D StatusBar: disable disable2
12-18 09:59:00.765 1233 1323 W ActivityTaskManager: Activity top resumed state loss timeout for ActivityRecord{39761db u0 com.android.settings/.homepage.SettingsHomepageActivity t350 f}
12-18 09:59:00.766 1233 1323 W ActivityTaskManager: Activity pause timeout for ActivityRecord{39761db u0 com.android.settings/.homepage.SettingsHomepageActivity t350 f}
12-18 09:59:00.811 1963 1963 D StatusBar: disable disable2
12-18 09:59:00.829 1963 1963 D ImageWallpaper: wallpaper visibility changes to: true
12-18 09:59:02.743 1233 14607 W ActivityTaskManager: Force finishing activity com.android.settings/.homepage.SettingsHomepageActivity
12-18 09:59:02.745 1233 2334 D OpenGLRenderer: endAllActiveAnimators on 0x76efa71800 (RippleDrawable) with handle 0x77bba8cbe0
12-18 09:59:02.753 1233 8069 E InputDispatcher: Window handle Window{b0cdd11 u0 Application Error: com.android.settings} has no registered input channel
12-18 09:59:02.758 1233 14607 I ActivityManager: Killing 32392:com.android.settings/1000 (adj 900): crash
12-18 09:59:02.788 731 731 I Zygote : Process 32392 exited due to signal 9 (Killed)
12-18 09:59:02.806 1233 1342 I libprocessgroup: Successfully killed process cgroup uid 1000 pid 32392 in 46ms
^C

/data/user_de/0/com.android.settings/” seems to not exist anymore or be read/writeable - so nothing can be read and persisted and it crashes. If you have adb root you can have a look if it exists and what permissions the directory tree has

W ContextImpl: Failed to ensure /data/user_de/0/com.android.settings/cache: mkdir failed: EACCES (Permission denied)
E ContextImpl: Data directory doesn’t exist for package com.android.settings
E SQLiteLog: (14) cannot open file at line 36937 of [68b898381a]
E SQLiteLog: (14) os_unix.c:36937: (13) lstat(/data/user_de/0/com.android.settings/databases/mydb) -
E SQLiteDatabase: Failed to open database ‘/data/user_de/0/com.android.settings/databases/mydb’.

Can you speculate how this happened? taking backups should be a read op after all

Recovery? why not try that twrp backup right now? :slight_smile:

You can always format /data but then userdata is gone too

/data/user_de/0/com.android.settings/ ” is available
this folder include 4 subfolders (see screenshots):
cache folder is empty




As I wrote before: system was running without problems. Then I made a TWRP-Backup and rebooted to the system. From this point the problem began. Therefore, Therefore, I do not want to restore the backup, but solve the problem in another way.
Do you have any other idea?

I have no idea. Settings app has lost the ability to read/write at that path. But I can’t read it out of the log why that is. It can happen when a process is misaligned in userid or selinux labels with target directory ownership, but never looked at that with android. Do you use multiple user profiles or anything related?

Does this say something similar?

~$ adb shell ps -efZ | grep -i settings
u:r:system_app:s0              system       ...  com.android.settings
1 Like

Definitively looks like a selinux problem to me.
Maybe a more effective output with dmesg | grep 'avc: ' in adb root mode.
You can try to display files selinux contexts with ls -aZ, exemple:

perseus:/data/user_de/0/com.android.settings # ls -aZ
u:object_r:system_app_data_file:s0 .   u:object_r:system_app_data_file:s0 cache       u:object_r:system_app_data_file:s0 databases
u:object_r:system_data_file:s0     ..  u:object_r:system_app_data_file:s0 code_cache  u:object_r:system_app_data_file:s0 shared_prefs

Also, are files in /system/etc/selinux present and readable?

perseus:/ # ls -al /system/etc/selinux/
total 1756
drwxr-xr-x  3 root root    4096 2009-01-01 01:00 .
drwxr-xr-x 19 root root    4096 2009-01-01 01:00 ..
drwxr-xr-x  2 root root    4096 2009-01-01 01:00 mapping
-rw-r--r--  1 root root   36665 2009-01-01 01:00 plat_file_contexts
-rw-r--r--  1 root root    8752 2009-01-01 01:00 plat_hwservice_contexts
-rw-r--r--  1 root root    8063 2009-01-01 01:00 plat_mac_permissions.xml
-rw-r--r--  1 root root   48232 2009-01-01 01:00 plat_property_contexts
-rw-r--r--  1 root root    2898 2009-01-01 01:00 plat_seapp_contexts
-rw-r--r--  1 root root 1649075 2009-01-01 01:00 plat_sepolicy.cil
-rw-r--r--  1 root root      65 2009-01-01 01:00 plat_sepolicy_and_mapping.sha256
-rw-r--r--  1 root root   18876 2009-01-01 01:00 plat_service_contexts

More readings here: Validating SELinux  |  Android Open Source Project.
Very good HowTo: Working with SELinux on Android – LineageOS – LineageOS Android Distribution

No I do not use different user profiles. I have only fill in the emergency information.

Note: i know the basic adb and fastboot commands but have no idea about shell commands or how that works
Because your comand line does not work as “normal” comando line I tryed only the comand “adb shell ps -efZ”.
In the output I found 3 lines with:
u:r:system_app:s0 system 2910 731 0 14:12:59 ? 00:00:00 org.lineageos.settings.doze
u:r:system_app:s0 system 2937 731 0 14:12:59 ? 00:00:00 .pasr
u:r:system_app:s0 system 15546 731 0 14:48:51 ? 00:00:05 org.lineageos.lineageparts

@smu44:
how can I enter the adb root mode?

Do i have to enter the command lines via windows cmd or in the terminal on the smartphone?

sorry, not very bright of me - as settings app is crashing, there is no point in checking its process label/owner, the process doesn’t exist.

adb root then adb shell (Ctrl-D or exit to end).
Note : your device may prompt with the adb root.

replay for adb root: ADB Root access is disabled by system setting - and I can not get into the settings

Here is the output for dmesg | grep 'avc: ’ (Because “ADB Root access is disabled by system setting” I entered the comand with termux on the phone).
dmesg | grep 'avc: ’
[77121.401980] [20221219_17:50:37.610371]@2 type=1400 audit(1671468620.308:40949): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77121.402027] [20221219_17:50:37.610427]@2 type=1400 audit(1671468637.598:40950): avc: denied { write } for comm=“HwBinder:1093_1” name=“infrared_shut_down_state2” dev=“sysfs” ino=81546 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[77214.780225] [20221219_17:52:10.988618]@1 type=1400 audit(1671468637.748:40951): avc: denied { write } for comm=“HwBinder:1093_1” name=“infrared_shut_down_state2” dev=“sysfs” ino=81546 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[77214.780615] [20221219_17:52:10.989012]@1 type=1400 audit(1671468730.968:40952): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77419.386560] [20221219_17:55:35.594954]@2 type=1400 audit(1671468851.228:40953): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77419.386603] [20221219_17:55:35.595002]@2 type=1400 audit(1671468935.588:40954): avc: denied { syslog_read } for comm=“dmesg” scontext=u:r:shell:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0
[77454.783484] [20221219_17:56:10.991877]@2 type=1400 audit(1671468935.588:40954): avc: denied { syslog_read } for comm=“dmesg” scontext=u:r:shell:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0
[77454.784030] [20221219_17:56:10.992427]@3 type=1400 audit(1671468970.978:40955): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77535.676407] [20221219_17:57:31.884802]@3 type=1400 audit(1671468970.978:40955): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77535.676443] [20221219_17:57:31.884841]@3 type=1400 audit(1671469051.878:40956): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[77536.225647] [20221219_17:57:32.434042]@2 type=1400 audit(1671469051.878:40956): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[77536.226791] [20221219_17:57:32.435185]@2 type=1400 audit(1671469052.418:40957): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77536.238890] [20221219_17:57:32.447284]@2 type=1400 audit(1671469052.418:40957): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77536.245660] [20221219_17:57:32.454054]@0 type=1400 audit(1671469052.418:40958): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77574.792435] [20221219_17:58:11.000828]@2 type=1400 audit(1671469052.418:40958): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77574.792913] [20221219_17:58:11.001310]@2 type=1400 audit(1671469090.988:40959): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[77849.632435] [20221219_18:02:45.840829]@2 type=1400 audit(1671469330.998:40961): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar duplicate messages suppressed
[77849.645169] [20221219_18:02:45.853562]@1 type=1400 audit(1671469365.828:40962): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77850.170826] [20221219_18:02:46.379217]@1 type=1400 audit(1671469365.828:40962): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77850.177770] [20221219_18:02:46.386163]@1 type=1400 audit(1671469366.368:40963): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77850.177958] [20221219_18:02:46.386355]@1 type=1400 audit(1671469366.368:40963): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[77850.182211] [20221219_18:02:46.390608]@1 type=1400 audit(1671469366.368:40964): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
:/data/data/com.termux/files/home #using-e

And here for s -al /system/etc/selinux/

s -al /system/etc/selinux/ <
total 1660
drwxr-xr-x 3 root root 4096 2009-01-01 01:00 .
drwxr-xr-x 19 root root 4096 2009-01-01 01:00 …
drwxr-xr-x 2 root root 4096 2009-01-01 01:00 mapping
-rw-r–r-- 1 root root 32076 2009-01-01 01:00 plat_file_contexts
-rw-r–r-- 1 root root 8428 2009-01-01 01:00 plat_hwservice_contexts
-rw-r–r-- 1 root root 6161 2009-01-01 01:00 plat_mac_permissions.xml
-rw-r–r-- 1 root root 45746 2009-01-01 01:00 plat_property_contexts
-rw-r–r-- 1 root root 2254 2009-01-01 01:00 plat_seapp_contexts
-rw-r–r-- 1 root root 1552999 2009-01-01 01:00 plat_sepolicy.cil
-rw-r–r-- 1 root root 65 2009-01-01 01:00 plat_sepolicy_and_mapping.sha256
-rw-r–r-- 1 root root 18783 2009-01-01 01:00 plat_service_contexts
:/data/data/com.termux/files/home #

You selinux files are readable and have content, I guess it’s OK.
From you dmesg i can’t see any anything related to Settings, did you launch it just before issuing the command?
Also, what gives a ls -aZ /data/user_de/0/com.android.settings?

s -aZ /data/user_de/0/com.android.settings <
u:object_r:system_app_data_file:s0 .
u:object_r:system_data_file:s0:c512,c768 …
u:object_r:system_app_data_file:s0 cache
u:object_r:system_app_data_file:s0 code_cache
u:object_r:system_app_data_file:s0 databases
u:object_r:system_app_data_file:s0 files
u:object_r:system_app_data_file:s0 shared_prefs
:/data/data/com.termux/files/home #

now I have launched “settings” before the dmesg-command (i didn’t know that I have to start it before :slight_smile: )

mesg | grep 'avc: ’ <
[93505.875366] [20221220_07:59:14.215655]@2 type=1400 audit(1671519530.273:41341): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar duplicate messages suppressed
[93505.877528] [20221220_07:59:14.217815]@2 type=1400 audit(1671519554.203:41342): avc: denied { search } for comm=“ndroworks.klara” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c167,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=org.androworks.klara
[93541.198831] [20221220_07:59:49.539127]@0 type=1400 audit(1671519554.203:41342): avc: denied { search } for comm=“ndroworks.klara” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c167,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=org.androworks.klara
[93541.199338] [20221220_07:59:49.539635]@0 type=1400 audit(1671519589.523:41343): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[93541.752009] type=1400 audit(1671519589.523:41343): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[93541.758445] [20221220_07:59:50.098738]@2 type=1400 audit(1671519590.083:41344): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93541.761511] [20221220_07:59:50.101805]@3 type=1400 audit(1671519590.083:41344): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93541.763837] [20221220_07:59:50.104134]@1 type=1400 audit(1671519590.093:41345): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93604.311950] type=1400 audit(1671519590.093:41345): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93604.312296] [20221220_08:00:52.652591]@1 type=1400 audit(1671519652.643:41346): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93614.525921] [20221220_08:01:02.866216]@0 type=1400 audit(1671519652.643:41346): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93614.526357] [20221220_08:01:02.866655]@0 type=1400 audit(1671519662.853:41347): avc: denied { search } for comm=“nextapp.fx” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=nextapp.fx
[93614.559866] [20221220_08:01:02.900161]@2 type=1400 audit(1671519662.853:41347): avc: denied { search } for comm=“nextapp.fx” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=nextapp.fx
[93614.560551] [20221220_08:01:02.900847]@3 type=1400 audit(1671519662.883:41348): avc: denied { search } for comm=“Thread-3” name=“vendor” dev=“tmpfs” ino=20224 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0 app=nextapp.fx
[93614.560721] [20221220_08:01:02.901020]@3 type=1400 audit(1671519662.883:41348): avc: denied { search } for comm=“Thread-3” name=“vendor” dev=“tmpfs” ino=20224 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0 app=nextapp.fx
[93614.561167] [20221220_08:01:02.901464]@3 type=1400 audit(1671519662.883:41349): avc: denied { write } for comm=“Thread-3” name="/" dev=“bpf” ino=1 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:fs_bpf:s0 tclass=dir permissive=0 app=nextapp.fx
[93636.624103] [20221220_08:01:24.964400]@2 type=1400 audit(1671519662.883:41349): avc: denied { write } for comm=“Thread-3” name="/" dev=“bpf” ino=1 scontext=u:r:untrusted_app:s0:c155,c256,c512,c768 tcontext=u:object_r:fs_bpf:s0 tclass=dir permissive=0 app=nextapp.fx
[93636.625348] [20221220_08:01:24.965643]@2 type=1400 audit(1671519684.953:41350): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93637.164240] [20221220_08:01:25.504517]@2 type=1400 audit(1671519684.953:41350): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93637.171879] [20221220_08:01:25.512173]@2 type=1400 audit(1671519685.483:41351): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93637.174840] [20221220_08:01:25.515132]@3 type=1400 audit(1671519685.483:41351): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93637.179546] [20221220_08:01:25.519842]@3 type=1400 audit(1671519685.493:41352): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93642.207918] [20221220_08:01:30.548213]@1 type=1400 audit(1671519685.493:41352): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93642.208680] [20221220_08:01:30.548978]@1 type=1400 audit(1671519690.533:41353): avc: denied { search } for comm=“putmethod.latin” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app_27:s0:c141,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=com.android.inputmethod.latin
[93722.098679] [20221220_08:02:50.438973]@1 type=1400 audit(1671519690.533:41353): avc: denied { search } for comm=“putmethod.latin” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app_27:s0:c141,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=com.android.inputmethod.latin
[93722.099209] [20221220_08:02:50.439507]@2 type=1400 audit(1671519770.423:41354): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93818.962269] [20221220_08:04:27.302565]@0 type=1400 audit(1671519770.423:41354): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93818.962302] [20221220_08:04:27.302602]@0 type=1400 audit(1671519867.293:41355): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[93819.525992] [20221220_08:04:27.866282]@0 type=1400 audit(1671519867.293:41355): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0
[93819.533449] [20221220_08:04:27.873741]@3 type=1400 audit(1671519867.843:41356): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93819.533802] [20221220_08:04:27.874097]@3 type=1400 audit(1671519867.843:41356): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93819.539970] [20221220_08:04:27.880264]@3 type=1400 audit(1671519867.843:41357): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93852.279399] [20221220_08:05:00.619692]@0 type=1400 audit(1671519867.843:41357): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93852.280066] [20221220_08:05:00.620364]@0 type=1400 audit(1671519900.603:41358): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93913.969625] [20221220_08:06:02.309919]@3 type=1400 audit(1671519900.603:41358): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[93913.972066] [20221220_08:06:02.312361]@3 type=1400 audit(1671519962.293:41359): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93914.516526] [20221220_08:06:02.856823]@1 type=1400 audit(1671519962.293:41359): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93914.517482] [20221220_08:06:02.857778]@1 type=1400 audit(1671519962.833:41360): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93914.517769] [20221220_08:06:02.858066]@1 type=1400 audit(1671519962.833:41360): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93914.520626] [20221220_08:06:02.860920]@1 type=1400 audit(1671519962.843:41361): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93962.071107] [20221220_08:06:50.411400]@3 type=1400 audit(1671519962.843:41361): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[93962.071454] [20221220_08:06:50.411751]@3 type=1400 audit(1671520010.393:41362): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[94008.966559] [20221220_08:07:37.306854]@3 type=1400 audit(1671520010.393:41362): avc: denied { search } for comm=“tion.e.calendar” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:untrusted_app:s0:c139,c256,c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 app=foundation.e.calendar
[94008.967516] [20221220_08:07:37.307808]@1 type=1400 audit(1671520057.293:41363): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94009.543539] [20221220_08:07:37.883833]@2 type=1400 audit(1671520057.293:41363): avc: denied { setattr } for comm=“chmod” name=“libsyncthing.so” dev=“dm-0” ino=5898444 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94009.545116] [20221220_08:07:37.885412]@1 type=1400 audit(1671520057.863:41364): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94009.546086] [20221220_08:07:37.886383]@1 type=1400 audit(1671520057.863:41364): avc: denied { read } for comm=“libsyncthing.so” name=“somaxconn” dev=“proc” ino=1795241 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94009.550295] [20221220_08:07:37.890586]@2 type=1400 audit(1671520057.863:41365): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94116.826506] [20221220_08:09:25.166800]@3 type=1400 audit(1671520057.863:41365): avc: denied { read } for comm=“libsyncthing.so” name=“route” dev=“proc” ino=4026532157 scontext=u:r:untrusted_app:s0:c165,c256,c512,c768 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0 app=com.nutomic.syncthingandroid
[94116.826589] [20221220_08:09:25.166846]@3 type=1400 audit(1671520165.153:41366): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.826908] [20221220_08:09:25.167205]@3 type=1400 audit(1671520165.153:41366): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.826928] [20221220_08:09:25.167226]@3 type=1400 audit(1671520165.153:41367): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.829727] [20221220_08:09:25.170021]@3 type=1400 audit(1671520165.153:41367): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.829762] [20221220_08:09:25.170060]@3 type=1400 audit(1671520165.153:41368): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.829932] [20221220_08:09:25.170229]@3 type=1400 audit(1671520165.153:41368): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.829952] [20221220_08:09:25.170250]@3 type=1400 audit(1671520165.153:41369): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.830289] [20221220_08:09:25.170586]@3 type=1400 audit(1671520165.153:41369): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94116.830348] [20221220_08:09:25.170646]@3 type=1400 audit(1671520165.153:41370): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:system_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0
[94116.834003] [20221220_08:09:25.174296]@3 type=1400 audit(1671520165.153:41370): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:system_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0
[94116.834039] [20221220_08:09:25.174337]@3 type=1400 audit(1671520165.163:41371): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.435772] [20221220_08:09:27.776066]@0 type=1400 audit(1671520165.163:41371): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.435807] [20221220_08:09:27.776104]@0 type=1400 audit(1671520167.763:41390): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.436196] [20221220_08:09:27.776492]@0 type=1400 audit(1671520167.763:41390): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.436221] [20221220_08:09:27.776518]@0 type=1400 audit(1671520167.763:41391): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.439445] [20221220_08:09:27.779732]@1 type=1400 audit(1671520167.763:41391): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.439494] [20221220_08:09:27.779792]@1 type=1400 audit(1671520167.763:41392): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.439896] [20221220_08:09:27.780188]@1 type=1400 audit(1671520167.763:41392): avc: denied { getattr } for comm=“ndroid.settings” path="/data/user_de/0" dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.439935] [20221220_08:09:27.780232]@1 type=1400 audit(1671520167.763:41393): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.440198] [20221220_08:09:27.780493]@2 type=1400 audit(1671520167.763:41393): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=4775938 scontext=u:r:system_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0
[94119.440239] [20221220_08:09:27.780537]@2 type=1400 audit(1671520167.763:41394): avc: denied { search } for comm=“ndroid.settings” name=“0” dev=“dm-0” ino=11518012 scontext=u:r:system_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0
:/data/data/com.termux/files/home #

This line is a bit suspicious, but it may be due to Termux in user mode…

This is better, we got a lots of info here :slight_smile:
But there’s something weird: on all lines the “a” in beginning of “android” is missing!
Also, we have the strange “c512,c768” thing:

At this point, I’d consider 2 possibilities:

  • if your TWRP can decrypt your data partition, investigate the “c512,c768” thing using adb shell from TWRP
  • if you know how, re-apply the same ROM image after deleting the app whole dir from TWRP adb shell (mine is in /system/system_ext/priv-app/Settings/): this way the app may be re-installed

Maybe @tcecyk got a better advice?