Advertisement
mateorod

SEAndroid_audit.log

Mar 5th, 2013
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.02 KB | None | 0 0
  1. $ adb shell su 0 cat /data/misc/audit/audit.log
  2. <5>[ 1.074826] type=2000 audit(4.569:1): initialized
  3. <5>[ 5.884896] type=1403 audit(1362497954.980:2): policy loaded auid=4294967295 ses=4294967295
  4. <5>[ 7.025506] type=1400 audit(1362497956.110:3): avc: denied { set_context_mgr } for pid=120 comm="servicemanager" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=binder
  5. audit(1362497956.690:4): avc: denied { read } for pid=236 comm="adbd" name="sh" dev=mmcblk0p3 ino=7251 scontext=u:r:adbd:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file
  6. audit(1362497956.690:5): avc: denied { execute } for pid=236 comm="adbd" name="mksh" dev=mmcblk0p3 ino=6993 scontext=u:r:adbd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  7. audit(1362497956.690:6): avc: denied { read open } for pid=236 comm="adbd" name="mksh" dev=mmcblk0p3 ino=6993 scontext=u:r:adbd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  8. audit(1362497956.690:7): avc: denied { execute_no_trans } for pid=236 comm="adbd" path="/system/bin/mksh" dev=mmcblk0p3 ino=6993 scontext=u:r:adbd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  9. audit(1362497956.690:8): avc: denied { getattr } for pid=236 comm="sh" path="/system/lib/libc.so" dev=mmcblk0p3 ino=20967 scontext=u:r:adbd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  10. audit(1362497956.890:9): avc: denied { search } for pid=297 comm="ueventd" name="/" dev=mmcblk0p3 ino=2 scontext=u:r:ueventd:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
  11. audit(1362497956.890:10): avc: denied { read } for pid=297 comm="ueventd" name="nvavp_os_0ff00000.bin" dev=mmcblk0p3 ino=13911 scontext=u:r:ueventd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  12. audit(1362497956.890:11): avc: denied { open } for pid=297 comm="ueventd" name="nvavp_os_0ff00000.bin" dev=mmcblk0p3 ino=13911 scontext=u:r:ueventd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  13. audit(1362497956.890:12): avc: denied { getattr } for pid=297 comm="ueventd" path="/system/etc/firmware/nvavp_os_0ff00000.bin" dev=mmcblk0p3 ino=13911 scontext=u:r:ueventd:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  14. audit(1362497961.710:13): avc: denied { read } for pid=485 comm="system_server" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=tmpfs ino=5488 scontext=u:r:system:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file
  15. audit(1362497961.710:14): avc: denied { search } for pid=485 comm="system_server" name="/" dev=mmcblk0p3 ino=2 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
  16. audit(1362497961.710:15): avc: denied { getattr } for pid=485 comm="system_server" path="/system/lib/libandroid_servers.so" dev=mmcblk0p3 ino=20953 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  17. audit(1362497961.710:16): avc: denied { read } for pid=485 comm="system_server" name="libandroid_servers.so" dev=mmcblk0p3 ino=20953 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  18. audit(1362497961.710:17): avc: denied { open } for pid=485 comm="system_server" name="libandroid_servers.so" dev=mmcblk0p3 ino=20953 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  19. audit(1362497961.720:18): avc: denied { execute } for pid=485 comm="system_server" path="/system/lib/libandroid_servers.so" dev=mmcblk0p3 ino=20953 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  20. audit(1362497961.870:19): avc: denied { call } for pid=485 comm="system_server" scontext=u:r:system:s0 tcontext=u:r:init:s0 tclass=binder
  21. audit(1362497961.870:20): avc: denied { transfer } for pid=485 comm="system_server" scontext=u:r:system:s0 tcontext=u:r:init:s0 tclass=binder
  22. audit(1362497961.910:21): avc: denied { search } for pid=499 comm="er.ServerThread" name="cpu" dev=sysfs ino=26 scontext=u:r:system:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir
  23. audit(1362497961.990:22): avc: denied { read write } for pid=126 comm="surfaceflinger" path="socket:[7543]" dev=sockfs ino=7543 scontext=u:r:system:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
  24. audit(1362497961.990:23): avc: denied { setopt } for pid=501 comm="WindowManager" scontext=u:r:system:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
  25. audit(1362497962.040:24): avc: denied { getattr } for pid=499 comm="er.ServerThread" path="/system/etc/permissions" dev=mmcblk0p3 ino=13928 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
  26. audit(1362497962.040:25): avc: denied { read } for pid=499 comm="er.ServerThread" name="permissions" dev=mmcblk0p3 ino=13928 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
  27. audit(1362497962.040:26): avc: denied { open } for pid=499 comm="er.ServerThread" name="permissions" dev=mmcblk0p3 ino=13928 scontext=u:r:system:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
  28. audit(1362497962.060:27): avc: denied { setsched } for pid=496 comm="Binder_1" scontext=u:r:system:s0 tcontext=u:r:init:s0 tclass=process
  29. audit(1362497965.230:28): avc: denied { read } for pid=519 comm="cat" name="audit.log" dev=mmcblk0p9 ino=474222 scontext=u:r:adbd:s0 tcontext=u:object_r:audit
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement