Advertisement
Guest User

Untitled

a guest
May 25th, 2018
219
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.72 KB | None | 0 0
  1. finished. total time: 1.094s
  2. joemossjr@joemossjr-Aspire-VX5-591G ~/TWRP $ adb logcat
  3. --------- beginning of main
  4. 02-07 18:10:35.434 536 536 W auditd : type=2000 audit(0.0:1): initialized
  5. 02-07 18:10:36.519 536 536 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
  6. 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  7. 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:4): avc: denied { create } for name="cgroup.procs" scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  8. 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:5): avc: denied { write } for path="/acct/uid_0/pid_522/cgroup.procs" dev="rootfs" ino=19605 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  9. 02-07 18:10:36.729 1 1 I init : type=1400 audit(0.0:6): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
  10. 02-07 18:10:36.729 532 532 I kworker/u16:4: type=1400 audit(0.0:7): avc: denied { execute } for name="busybox" dev="rootfs" ino=13366 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  11. 02-07 18:10:36.729 532 532 I kworker/u16:4: type=1400 audit(0.0:8): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13366 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  12. 02-07 18:10:36.739 537 537 I init : type=1400 audit(0.0:9): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=13557 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  13. 02-07 18:10:36.739 537 537 I logd : type=1400 audit(0.0:10): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=13557 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  14. 02-07 18:10:36.759 541 541 I setenforce: type=1400 audit(0.0:13): avc: denied { write } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
  15. 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:14): avc: denied { write } for name="sbin" dev="rootfs" ino=13341 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  16. 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:15): avc: denied { add_name } for name="qseecomd_old" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  17. 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:16): avc: denied { create } for name="qseecomd_old" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  18. 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:17): avc: denied { write } for path="/sbin/qseecomd_old" dev="rootfs" ino=14055 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  19. 02-07 18:10:36.779 1 1 I init : type=1400 audit(0.0:18): avc: denied { add_name } for name="iSerial" scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
  20. 02-07 18:10:36.779 1 1 I init : type=1400 audit(0.0:19): avc: denied { create } for name="iSerial" scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
  21. 02-07 18:10:36.789 556 556 I chmod : type=1400 audit(0.0:20): avc: denied { setattr } for name="qseecomd" dev="rootfs" ino=13622 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  22. 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:21): avc: denied { write } for name="panel0-backlight" dev="sysfs" ino=46729 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
  23. 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:22): avc: denied { add_name } for name="brightness" scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
  24. 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:23): avc: denied { create } for name="brightness" scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
  25. 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:24): avc: denied { read write } for name="card0" dev="tmpfs" ino=20563 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  26. 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:25): avc: denied { open } for path="/dev/dri/card0" dev="tmpfs" ino=20563 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  27. 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/dri/card0" dev="tmpfs" ino=20563 ioctlcmd=0x640c scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  28. 02-07 18:10:36.819 1 1 I init : type=1400 audit(0.0:27): avc: denied { mounton } for path="/dev/usb-ffs/adb" dev="functionfs" ino=26100 scontext=u:r:init:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
  29. 02-07 18:10:36.889 575 575 I qseecomd: type=1400 audit(0.0:28): avc: denied { sys_rawio } for capability=17 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
  30. 02-07 18:10:36.889 575 575 I qseecomd: type=1400 audit(0.0:29): avc: denied { setattr } for name="sg2" dev="tmpfs" ino=13965 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  31. 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:30): avc: denied { read } for name="ion" dev="tmpfs" ino=14031 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
  32. 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:31): avc: denied { open } for path="/dev/ion" dev="tmpfs" ino=14031 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
  33. 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:32): avc: denied { ioctl } for path="/dev/ion" dev="tmpfs" ino=14031 ioctlcmd=0x4900 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
  34. 02-07 18:10:36.899 575 575 D QSEECOMD: : qseecom listener services process entry PPID = 1
  35. 02-07 18:10:36.899 575 575 E QSEECOMD: : Listener: index = 0, hierarchy = 0
  36. 02-07 18:10:36.899 575 575 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
  37. 02-07 18:10:36.899 575 575 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
  38. 02-07 18:10:36.902 575 575 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64
  39. 02-07 18:10:36.902 575 575 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
  40. 02-07 18:10:36.902 575 575 D QSEECOMD: : Init rpmb_init_service ret = 0
  41. 02-07 18:10:36.902 575 575 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
  42. 02-07 18:10:36.902 575 575 E QSEECOMD: : Listener: index = 1, hierarchy = 0
  43. 02-07 18:10:36.902 575 575 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
  44. 02-07 18:10:36.902 575 575 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
  45. 02-07 18:10:36.902 575 575 E SSD : ssd_init_service succeeded!
  46. 02-07 18:10:36.902 575 575 D QSEECOMD: : Init ssd_init_service ret = 0
  47. 02-07 18:10:36.902 575 575 D QSEECOMD: : SSD system services: init (Listener ID = 12288)
  48. 02-07 18:10:36.902 575 575 E QSEECOMD: : Listener: index = 2, hierarchy = 0
  49. 02-07 18:10:36.903 575 575 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libqdutils.so" not found
  50. 02-07 18:10:36.904 576 576 D QSEECOMD: : qseecom listener service threads starting!!!
  51. 02-07 18:10:36.904 576 576 D QSEECOMD: : Total listener services to start = 9
  52. 02-07 18:10:36.904 576 576 E QSEECOMD: : Listener: index = 0, hierarchy = 1
  53. 02-07 18:10:36.904 576 576 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
  54. 02-07 18:10:36.904 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds
  55. 02-07 18:10:36.904 576 576 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400
  56. 02-07 18:10:36.905 576 576 D QSEECOMD: : Init rpmb_start ret = 0
  57. 02-07 18:10:36.905 576 576 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192)
  58. 02-07 18:10:36.905 576 576 E QSEECOMD: : Listener: index = 1, hierarchy = 1
  59. 02-07 18:10:36.906 576 576 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
  60. 02-07 18:10:36.906 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds
  61. 02-07 18:10:36.906 576 576 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000
  62. 02-07 18:10:36.906 576 576 D QSEECOMD: : Init ssd_start ret = 0
  63. 02-07 18:10:36.906 576 576 D QSEECOMD: : SSD system services: Started (Listener ID = 12288)
  64. 02-07 18:10:36.906 576 576 E QSEECOMD: : Listener: index = 2, hierarchy = 1
  65. 02-07 18:10:36.907 576 576 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found
  66. 02-07 18:10:36.907 576 576 E QSEECOMD: : Listener: index = 3, hierarchy = 1
  67. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:33): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  68. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:34): avc: denied { read } for name="nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
  69. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:35): avc: denied { open } for path="/nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
  70. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:36): avc: denied { getattr } for path="/nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
  71. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:37): avc: denied { read } for name="plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  72. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:38): avc: denied { open } for path="/plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  73. 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:39): avc: denied { getattr } for path="/plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  74. --------- beginning of system
  75. 02-07 18:10:36.909 576 582 I QISL : QSEE Interrupt Service Listener Thread is started
  76. 02-07 18:10:36.909 576 582 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
  77. 02-07 18:10:36.910 576 582 I QISL : QSEE Interrupt Service Listener was activated successfully
  78. 02-07 18:10:36.910 576 576 D QSEECOMD: : Init qisl_start ret = 0
  79. 02-07 18:10:36.910 576 576 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
  80. 02-07 18:10:36.910 576 576 E QSEECOMD: : Listener: index = 7, hierarchy = 1
  81. 02-07 18:10:36.910 576 576 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds
  82. 02-07 18:10:36.910 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds
  83. 02-07 18:10:36.910 576 576 D SPL : Call QSEECom_register_listener()
  84. 02-07 18:10:36.910 576 576 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400
  85. 02-07 18:10:36.910 576 576 D SPL : Registered listener sucessfully!
  86. 02-07 18:10:36.911 576 576 D SPL : pipe read-fd [27] write-fd [28]
  87. 02-07 18:10:36.911 576 576 D SPL : Create thread
  88. 02-07 18:10:36.911 576 576 D SPL : Thread created sucessfully.
  89. 02-07 18:10:36.916 576 576 D QSEECOMD: : QSEECOM DAEMON RUNNING
  90. 02-07 18:10:36.924 588 588 I SELinux : SELinux: Loaded service_contexts from:
  91. 02-07 18:10:36.924 588 588 I SELinux : /plat_service_contexts
  92. 02-07 18:10:36.924 588 588 I SELinux : /nonplat_service_contexts
  93. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:40): avc: denied { read } for name="nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  94. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:41): avc: denied { open } for path="/nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  95. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:42): avc: denied { getattr } for path="/nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  96. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:43): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  97. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:44): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  98. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:45): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112146 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  99. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:46): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112146 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  100. 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:47): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  101. 02-07 18:10:36.929 586 586 I android.hardwar: type=1400 audit(0.0:48): avc: denied { call } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  102. 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
  103. 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
  104. 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
  105. 02-07 18:10:36.938 585 585 E hwservicemanager: BINDER_SET_INHERIT_FIFO_PRIO failed with error -1
  106. 02-07 18:10:36.939 586 586 E cutils-trace: Error opening trace file: No such file or directory (2)
  107. 02-07 18:10:36.939 587 587 E cutils-trace: Error opening trace file: No such file or directory (2)
  108. 02-07 18:10:36.939 585 585 E cutils-trace: Error opening trace file: No such file or directory (2)
  109. 02-07 18:10:36.940 585 585 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice pid=586 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  110. 02-07 18:10:36.940 585 585 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
  111. 02-07 18:10:36.943 585 585 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper pid=587 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  112. 02-07 18:10:36.943 585 585 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
  113. 02-07 18:10:36.943 586 586 D vndksupport: Loading /vendor/lib64/hw/android.hardware.keymaster@3.0-impl-qti.so from current namespace instead of sphal namespace.
  114. 02-07 18:10:36.946 587 587 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  115. 02-07 18:10:36.946 586 586 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
  116. 02-07 18:10:36.946 586 586 D QSEECOMAPI: App is already loaded QSEE and app id = 1
  117. 02-07 18:10:36.949 586 586 I keymaster@3.0-s: type=1400 audit(0.0:49): avc: denied { transfer } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  118. 02-07 18:10:36.949 587 587 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
  119. 02-07 18:10:36.950 586 586 E KeymasterUtils: TA API Major Verion: 3
  120. 02-07 18:10:36.950 587 587 D QSEECOMAPI: App is already loaded QSEE and app id = 1
  121. 02-07 18:10:36.950 586 586 E KeymasterUtils: TA API Minor Verion: 0
  122. 02-07 18:10:36.950 586 586 E KeymasterUtils: TA Major Verion: 3
  123. 02-07 18:10:36.950 586 586 E KeymasterUtils: TA Minor Verion: 121
  124. 02-07 18:10:36.956 587 587 E KeymasterUtils: TA API Major Verion: 3
  125. 02-07 18:10:36.956 587 587 E KeymasterUtils: TA API Minor Verion: 0
  126. 02-07 18:10:36.956 587 587 E KeymasterUtils: TA Major Verion: 3
  127. 02-07 18:10:36.956 587 587 E KeymasterUtils: TA Minor Verion: 121
  128. 02-07 18:10:36.962 586 586 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@3.0-service-qti to keymaster@3.0-s.
  129. 02-07 18:10:36.962 585 585 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice pid=586 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  130. 02-07 18:10:36.962 586 586 I android.hardware.keymaster@3.0-service: Registration complete for android.hardware.keymaster@3.0::IKeymasterDevice/default.
  131. 02-07 18:10:36.963 587 587 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-.
  132. 02-07 18:10:36.963 585 585 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper pid=587 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  133. 02-07 18:10:36.963 587 587 I android.hardware.gatekeeper@1.0-service: Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  134. 02-07 18:10:41.842 593 594 I adbd : initializing functionfs
  135. 02-07 18:10:41.842 593 594 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
  136. 02-07 18:10:42.343 593 594 I adbd : functionfs successfully initialized
  137. 02-07 18:10:42.343 593 594 I adbd : registering usb transport
  138. 02-07 18:10:42.344 593 595 E cutils-trace: Error opening trace file: No such file or directory (2)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement