Advertisement
Guest User

ErrorLogCipher

a guest
Jun 29th, 2021
271
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C# 18.29 KB | None | 0 0
  1. --------- beginning of main
  2. 10-11 05:42:26.917 W/auditd  (  541): type=2000 audit(0.0:1): state=initialized audit_enabled=0 res=1
  3. 10-11 05:42:27.533 I/auditd  (  541): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
  4. 10-11 05:42:27.540 I/init    (    1): type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  5. 10-11 05:42:27.540 I/init    (    1): type=1400 audit(0.0:4): avc: denied { dac_read_search } for capability=2 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=capability permissive=1
  6. 10-11 05:42:27.543 I/init    (  528): type=1400 audit(0.0:5): avc: denied { map } for path="/plat_file_contexts" dev="rootfs" ino=15240 scontext=u:r:vendor_init:s0 tcontext=u:object_r:file_contexts_file:s0 tclass=file permissive=1
  7. 10-11 05:42:27.663 I/init    (    1): type=1400 audit(0.0:6): avc: denied { setattr } for name="system" dev="rootfs" ino=14813 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
  8. 10-11 05:42:27.670 I/init    (    1): type=1400 audit(0.0:7): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
  9. 10-11 05:42:27.670 I/kworker/u16:10(  540): type=1400 audit(0.0:8): avc: denied { execute } for name="busybox" dev="rootfs" ino=15199 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  10. 10-11 05:42:27.670 I/kworker/u16:10(  540): type=1400 audit(0.0:9): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=15199 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  11. 10-11 05:42:27.676 I/init    (  541): type=1400 audit(0.0:10): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=14993 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  12. 10-11 05:42:27.686 I/hwservicemanage(  538): type=1400 audit(0.0:16): avc: denied { read } for name="plat_hwservice_contexts" dev="rootfs" ino=15239 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  13. 10-11 05:42:27.686 I/hwservicemanage(  538): type=1400 audit(0.0:17): avc: denied { open } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13073 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  14. 10-11 05:42:27.686 I/hwservicemanage(  538): type=1400 audit(0.0:18): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13073 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  15. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:19): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  16. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:20): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  17. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:21): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  18. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:22): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  19. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:23): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  20. 10-11 05:42:27.690 I/hwservicemanage(  538): type=1400 audit(0.0:24): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  21. 10-11 05:42:27.692 E/SELinux (  538): avc:  denied  { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=538 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
  22. 10-11 05:42:27.692 E/SELinux (  538): avc:  denied  { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=538 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
  23. 10-11 05:42:27.692 E/SELinux (  538): avc:  denied  { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=538 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
  24. 10-11 05:42:27.695 I/hwservicemanager(  538): hwservicemanager is ready now.
  25. 05-15 15:32:00.017 D/QSEECOMD: (  566): qseecom listener services process entry PPID = 1
  26. 05-15 15:32:00.017 E/QSEECOMD: (  566): Listener: index = 0, hierarchy = 0
  27. 05-15 15:32:00.017 D/QSEECOMD: (  566): Init dlopen(librpmb.so, RTLD_NOW) succeeds
  28. 05-15 15:32:00.017 D/QSEECOMD: (  566): Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
  29. 05-15 15:32:00.019 E/rpmb_ufs(  566): Found an applicable RPMB lun and its index is 2
  30. 05-15 15:32:00.019 I/rpmb_ufs(  566): RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 32
  31. 05-15 15:32:00.020 E/DrmLibRpmb(  566): rpmb_init succeeded! with ret = 0
  32. 05-15 15:32:00.020 D/QSEECOMD: (  566): Init rpmb_init_service ret = 0
  33. 05-15 15:32:00.020 D/QSEECOMD: (  566): RPMB system services: init (Listener ID = 8192)
  34. 05-15 15:32:00.020 E/QSEECOMD: (  566): Listener: index = 1, hierarchy = 0
  35. 05-15 15:32:00.020 D/QSEECOMD: (  566): Init dlopen(libssd.so, RTLD_NOW) succeeds
  36. 05-15 15:32:00.020 D/QSEECOMD: (  566): Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
  37. 05-15 15:32:00.020 E/SSD     (  566): ssd_init_service succeeded!
  38. 05-15 15:32:00.020 D/QSEECOMD: (  566): Init ssd_init_service ret = 0
  39. 05-15 15:32:00.020 D/QSEECOMD: (  566): SSD system services: init (Listener ID = 12288)
  40. 05-15 15:32:00.020 E/QSEECOMD: (  566): Listener: index = 2, hierarchy = 0
  41. 05-15 15:32:00.028 E/QSEECOMD: (  566): Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: cannot locate symbol "_ZN7android8hardware23getOrCreateCachedBinderEPNS_4hidl4base4V1_05IBaseE" referenced by "/vendor/lib64/[email protected]"...
  42. 05-15 15:32:00.028 D/QSEECOMD: (  566): SEC_UI_INIT failed, shall not start secure ui listener
  43. 05-15 15:32:00.028 D/QSEECOMD: (  566): qseecom listener service threads starting!!!
  44. 05-15 15:32:00.028 D/QSEECOMD: (  566): Total listener services to start = 10
  45. 05-15 15:32:00.028 E/QSEECOMD: (  566): Listener: index = 0, hierarchy = 1
  46. 05-15 15:32:00.028 D/QSEECOMD: (  566): Init dlopen(librpmb.so, RTLD_NOW) succeeds
  47. 05-15 15:32:00.028 D/QSEECOMD: (  566): Init::Init dlsym(g_FSHandle rpmb_start) succeeds
  48. 05-15 15:32:00.028 D/QSEECOMAPI(  566): QSEECom_register_listener 8192 sb_length = 0x6400
  49. 05-15 15:32:00.028 E/ion     (  566): ioctl c0044901 failed with code -1: Not a typewriter
  50. 05-15 15:32:00.028 D/QSEECOMD: (  566): Init rpmb_start ret = 0
  51. 05-15 15:32:00.028 D/QSEECOMD: (  566): RPMB system services: Started (Listener ID = 8192)
  52. 05-15 15:32:00.029 D/DrmLibTime(  566): before calling ioctl to read the next time_cmd
  53. 05-15 15:32:00.029 D/QSEECOMD: (  566): Init fs_start ret = 0
  54. 05-15 15:32:00.029 D/QSEECOMD: (  566): file system services: Started (Listener ID = 10)
  55. 05-15 15:32:00.029 E/QSEECOMD: (  566): Listener: index = 5, hierarchy = 1
  56. 05-15 15:32:00.029 D/QSEECOMD: (  566): Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
  57. 05-15 15:32:00.029 D/QSEECOMD: (  566): Init::Init dlsym(g_FSHandle gpfs_start) succeeds
  58. 05-15 15:32:00.030 E/DrmLibFs(  566): Error: Invalid config file
  59. 05-15 15:32:00.030 E/DrmLibFs(  566): Data path not parsed: Using default data path: /data/vendor/tzstorage/
  60. 05-15 15:32:00.030 E/DrmLibFs(  566): Persist path not parsed: Using default persist path: /mnt/vendor/persist/data/
  61. 05-15 15:32:00.030 D/QSEECOMAPI(  566): QSEECom_register_listener 28672 sb_length = 0x7e000
  62. 05-15 15:32:00.030 D/QSEECOMD: (  566): Init gpfs_start ret = 0
  63. 05-15 15:32:00.030 D/QSEECOMD: (  566): gpfile system services: Started (Listener ID = 28672)
  64. --------- beginning of system
  65. 05-15 15:32:00.030 I/QISL    (  566): QSEE Interrupt Service Listener Thread is started
  66. 05-15 15:32:00.030 D/QSEECOMAPI(  566): QSEECom_register_listener 36864 sb_length = 0x1f4
  67. 05-15 15:32:00.030 I/QISL    (  566): QSEE Interrupt Service Listener was activated successfully
  68. 05-15 15:32:00.030 D/QSEECOMD: (  566): Init qisl_start ret = 0
  69. 05-15 15:32:00.030 D/QSEECOMD: (  566): interrupt services: Started (Listener ID = 36864)
  70. 05-15 15:32:00.030 E/QSEECOMD: (  566): Listener: index = 7, hierarchy = 1
  71. 05-15 15:32:00.030 D/QSEECOMD: (  566): Init dlopen(libspl.so, RTLD_NOW) succeeds
  72. 05-15 15:32:00.030 D/QSEECOMD: (  566): Init::Init dlsym(g_FSHandle spl_start) succeeds
  73. 05-15 15:32:00.031 D/SPL     (  566): Call QSEECom_register_listener()
  74. 05-15 15:32:00.031 D/QSEECOMAPI(  566): QSEECom_register_listener 45056 sb_length = 0x400
  75. 05-15 15:32:00.031 D/SPL     (  566): Registered listener sucessfully!
  76. 05-15 15:32:00.031 D/SPL     (  566): pipe read-fd [29] write-fd [30]
  77. 05-15 15:32:00.031 D/SPL     (  566): Create thread
  78. 05-15 15:32:00.031 D/SPL     (  566): Thread created sucessfully.
  79. 05-15 15:32:00.031 D/QSEECOMD: (  566): Init spl_start ret = 0
  80. 05-15 15:32:00.031 D/QSEECOMD: (  566): secure processor services: Started (Listener ID = 45056)
  81. 05-15 15:32:00.031 E/QSEECOMD: (  566): Listener: index = 8, hierarchy = 1
  82. 05-15 15:32:00.031 D/QSEECOMD: (  566): QSEECOM DAEMON RUNNING
  83. 05-15 15:32:00.043 I/SELinux (  578): SELinux: Loaded service_contexts from:
  84. 05-15 15:32:00.043 I/SELinux (  578):     /plat_service_contexts
  85. 05-15 15:32:00.043 I/SELinux (  578):     /vendor_service_contexts
  86. 05-15 15:32:00.045 E/cutils-trace(  577): Error opening trace file: No such file or directory (2)
  87. 05-15 15:32:00.046 E/cutils-trace(  538): Error opening trace file: No such file or directory (2)
  88. 05-15 15:32:00.046 E/SELinux (  538): avc:  denied  { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=577 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  89. 05-15 15:32:00.046 W//sbin/hwservicemanager(  538): Cannot open /system/manifest.xml
  90. 05-15 15:32:00.053 D/QSEECOMAPI(  576): QSEECom_get_handle sb_length = 0xa000
  91. 05-15 15:32:00.053 D/QSEECOMAPI(  576): App is already loaded QSEE and app id = 1
  92. 05-15 15:32:00.053 E/ion     (  576): ioctl c0044901 failed with code -1: Not a typewriter
  93. 05-15 15:32:00.055 E/KeymasterUtils(  576): TA API Major Version: 4
  94. 05-15 15:32:00.055 E/KeymasterUtils(  576): TA API Minor Version: 0
  95. 05-15 15:32:00.055 E/KeymasterUtils(  576): TA Major Version: 4
  96. 05-15 15:32:00.055 E/KeymasterUtils(  576): TA Minor Version: 527
  97. 05-15 15:32:00.059 I/ServiceManagement(  576): Removing namespace from process name android.hardware.keymaster@4.0-service-qti to keymaster@4.0-service-qti.
  98. 05-15 15:32:00.059 E/cutils-trace(  576): Error opening trace file: No such file or directory (2)
  99. 05-15 15:32:00.066 D/vndksupport(  577): Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  100. 05-15 15:32:00.067 D/QSEECOMAPI(  577): QSEECom_get_handle sb_length = 0xa000
  101. 05-15 15:32:00.067 D/QSEECOMAPI(  577): App is already loaded QSEE and app id = 1
  102. 05-15 15:32:00.067 E/ion     (  577): ioctl c0044901 failed with code -1: Not a typewriter
  103. 05-15 15:32:00.068 E/KeymasterUtils(  577): TA API Major Version: 4
  104. 05-15 15:32:00.069 E/KeymasterUtils(  577): TA API Minor Version: 0
  105. 05-15 15:32:00.069 E/KeymasterUtils(  577): TA Major Version: 4
  106. 05-15 15:32:00.069 E/KeymasterUtils(  577): TA Minor Version: 527
  107. 05-15 15:32:00.070 E/SELinux (  538): avc:  denied  { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=576 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  108. 05-15 15:32:00.070 I/ServiceManagement(  577): Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-service-qti.
  109. 05-15 15:32:00.070 E/SELinux (  538): avc:  denied  { add } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=577 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  110. 05-15 15:32:00.070 I/android.hardware.gatekeeper@1.0-service(  577): Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  111. 05-15 15:32:00.077 I/ArmToArm64Assembler(  543): generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x72dc2493c0:0x72dc249784] in 31303 ns
  112. 05-15 15:32:00.086 I/ArmToArm64Assembler(  543): generated scanline__00000077:03545401_00000A01_00000000 [ 69 ipp] (113 ins) at [0x72dc249790:0x72dc249954] in 31719 ns
  113. 05-15 15:32:00.088 I/ArmToArm64Assembler(  543): generated scanline__00000077:03545401_00000A08_00000000 [ 69 ipp] (116 ins) at [0x72dc249960:0x72dc249b30] in 13125 ns
  114. 06-29 08:03:57.198 I/recovery(  543): type=1400 audit(0.0:382): avc: denied { getattr } for path="/data/data/com.android.theme.icon_pack.rounded.systemui" dev="sda31" ino=3801376 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c41,c256,c512,c768 tclass=dir permissive=1
  115. 06-29 08:03:57.198 I/recovery(  543): type=1400 audit(0.0:383): avc: denied { read } for name="com.android.theme.icon_pack.rounded.systemui" dev="sda31" ino=3801376 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c41,c256,c512,c768 tclass=dir permissive=1
  116. 06-29 08:03:57.198 I/recovery(  543): type=1400 audit(0.0:384): avc: denied { open } for path="/data/data/com.android.theme.icon_pack.rounded.systemui" dev="sda31" ino=3801376 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c41,c256,c512,c768 tclass=dir permissive=1
  117. 06-29 08:03:57.202 I/recovery(  543): type=1400 audit(0.0:385): avc: denied { getattr } for path="/data/data/com.android.cts.ctsshim" dev="sda31" ino=3801286 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c166,c256,c512,c768 tclass=dir permissive=1
  118. 06-29 08:03:57.202 I/recovery(  543): type=1400 audit(0.0:386): avc: denied { read } for name="com.android.cts.ctsshim" dev="sda31" ino=3801286 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c166,c256,c512,c768 tclass=dir permissive=1
  119. 06-29 08:03:58.512 I/resetprop(  719): type=1400 audit(0.0:575): avc: denied { write } for name="u:object_r:fingerprint_prop:s0" dev="tmpfs" ino=29850 scontext=u:r:recovery:s0 tcontext=u:object_r:fingerprint_prop:s0 tclass=file permissive=1
  120. 06-29 08:03:58.538 I/gnused  (  723): type=1400 audit(0.0:576): avc: denied { rename } for name="sedd1XIjN" dev="rootfs" ino=17873 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  121. 06-29 08:03:58.538 I/gnused  (  723): type=1400 audit(0.0:577): avc: denied { unlink } for name="advanced.xml" dev="rootfs" ino=13166 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  122. 06-29 08:03:59.062 I/recovery(  543): type=1400 audit(0.0:578): avc: denied { getattr } for path="/sdcard/Fox/.theme/font.xml" dev="sda31" ino=2361312 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  123. 06-29 08:03:59.062 I/recovery(  543): type=1400 audit(0.0:579): avc: denied { read } for name="font.xml" dev="sda31" ino=2361312 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  124. 06-29 08:03:59.151 I/ArmToArm64Assembler(  543): generated scanline__00000077:03010102_00008002_00000000 [192 ipp] (238 ins) at [0x72dc249b40:0x72dc249ef8] in 33073 ns
  125. 06-29 08:03:59.522 I/recovery(  543): type=1400 audit(0.0:581): avc: denied { getattr } for path="/sdcard/Audiobooks" dev="sda31" ino=2360068 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c208,c256,c512,c768 tclass=dir permissive=1
  126. 06-29 08:03:59.525 I/recovery(  543): type=1400 audit(0.0:582): avc: denied { getattr } for path="/sdcard/AncientOS-R-Society-v5.4-raphael-Iron-20210628-1900-GApps.zip" dev="sda31" ino=2360120 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c208,c256,c512,c768 tclass=file permissive=1
  127. 06-29 08:03:59.632 I/recovery(  543): type=1400 audit(0.0:583): avc: denied { read } for name="orangefox.cfg" dev="tmpfs" ino=19688 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file permissive=1
  128. 06-29 08:03:59.775 I/recovery(  543): type=1400 audit(0.0:584): avc: denied { getattr } for path="/init" dev="rootfs" ino=15263 scontext=u:r:recovery:s0 tcontext=u:object_r:init_exec:s0 tclass=file permissive=1
  129. 06-29 08:03:59.775 I/recovery(  543): type=1400 audit(0.0:585): avc: denied { getattr } for path="/plat_seapp_contexts" dev="rootfs" ino=15237 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1
  130. 06-29 08:04:00.313 I/adbd    (  753): initializing functionfs
  131. 06-29 08:04:00.313 I/adbd    (  753): opening control endpoint /dev/usb-ffs/adb/ep0
  132. 06-29 08:04:00.320 I/adbd    (  753): functionfs successfully initialized
  133. 06-29 08:04:00.320 I/adbd    (  753): registering usb transport
  134. 06-29 08:04:00.320 E/cutils-trace(  753): Error opening trace file: No such file or directory (2)
  135. 06-29 08:04:00.354 I/ArmToArm64Assembler(  543): generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x72dc249f00:0x72dc24a078] in 32917 ns
  136. 06-29 08:04:01.112 I/recovery(  755): type=1400 audit(0.0:701): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=28893 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  137. 06-29 08:04:01.112 I/recovery(  755): type=1400 audit(0.0:702): avc: denied { open } for path="/dev/mtp_usb" dev="tmpfs" ino=28893 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  138. 06-29 08:04:01.112 I/recovery(  755): type=1400 audit(0.0:703): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=28893 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  139. 06-29 08:04:02.018 I/recovery(  755): type=1400 audit(0.0:704): avc: denied { read } for name="Audiobooks" dev="sda31" ino=2360068 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c208,c256,c512,c768 tclass=dir permissive=1
  140. 06-29 08:04:02.018 I/recovery(  755): type=1400 audit(0.0:705): avc: denied { open } for path="/data/media/0/Audiobooks" dev="sda31" ino=2360068 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c208,c256,c512,c768 tclass=dir permissive=1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement