Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- finished. total time: 1.094s
- joemossjr@joemossjr-Aspire-VX5-591G ~/TWRP $ adb logcat
- --------- beginning of main
- 02-07 18:10:35.434 536 536 W auditd : type=2000 audit(0.0:1): initialized
- 02-07 18:10:36.519 536 536 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
- 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
- 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:4): avc: denied { create } for name="cgroup.procs" scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.529 1 1 I init : type=1400 audit(0.0:5): avc: denied { write } for path="/acct/uid_0/pid_522/cgroup.procs" dev="rootfs" ino=19605 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.729 1 1 I init : type=1400 audit(0.0:6): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
- 02-07 18:10:36.729 532 532 I kworker/u16:4: type=1400 audit(0.0:7): avc: denied { execute } for name="busybox" dev="rootfs" ino=13366 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.729 532 532 I kworker/u16:4: type=1400 audit(0.0:8): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13366 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.739 537 537 I init : type=1400 audit(0.0:9): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=13557 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.739 537 537 I logd : type=1400 audit(0.0:10): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=13557 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.759 541 541 I setenforce: type=1400 audit(0.0:13): avc: denied { write } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
- 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:14): avc: denied { write } for name="sbin" dev="rootfs" ino=13341 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:15): avc: denied { add_name } for name="qseecomd_old" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:16): avc: denied { create } for name="qseecomd_old" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.759 542 542 I cp : type=1400 audit(0.0:17): avc: denied { write } for path="/sbin/qseecomd_old" dev="rootfs" ino=14055 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.779 1 1 I init : type=1400 audit(0.0:18): avc: denied { add_name } for name="iSerial" scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.779 1 1 I init : type=1400 audit(0.0:19): avc: denied { create } for name="iSerial" scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
- 02-07 18:10:36.789 556 556 I chmod : type=1400 audit(0.0:20): avc: denied { setattr } for name="qseecomd" dev="rootfs" ino=13622 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
- 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:21): avc: denied { write } for name="panel0-backlight" dev="sysfs" ino=46729 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:22): avc: denied { add_name } for name="brightness" scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.789 539 539 I recovery: type=1400 audit(0.0:23): avc: denied { create } for name="brightness" scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
- 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:24): avc: denied { read write } for name="card0" dev="tmpfs" ino=20563 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:25): avc: denied { open } for path="/dev/dri/card0" dev="tmpfs" ino=20563 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.809 539 539 I recovery: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/dri/card0" dev="tmpfs" ino=20563 ioctlcmd=0x640c scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.819 1 1 I init : type=1400 audit(0.0:27): avc: denied { mounton } for path="/dev/usb-ffs/adb" dev="functionfs" ino=26100 scontext=u:r:init:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.889 575 575 I qseecomd: type=1400 audit(0.0:28): avc: denied { sys_rawio } for capability=17 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
- 02-07 18:10:36.889 575 575 I qseecomd: type=1400 audit(0.0:29): avc: denied { setattr } for name="sg2" dev="tmpfs" ino=13965 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:30): avc: denied { read } for name="ion" dev="tmpfs" ino=14031 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:31): avc: denied { open } for path="/dev/ion" dev="tmpfs" ino=14031 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.889 576 576 I qseecomd: type=1400 audit(0.0:32): avc: denied { ioctl } for path="/dev/ion" dev="tmpfs" ino=14031 ioctlcmd=0x4900 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1
- 02-07 18:10:36.899 575 575 D QSEECOMD: : qseecom listener services process entry PPID = 1
- 02-07 18:10:36.899 575 575 E QSEECOMD: : Listener: index = 0, hierarchy = 0
- 02-07 18:10:36.899 575 575 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
- 02-07 18:10:36.899 575 575 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
- 02-07 18:10:36.902 575 575 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64
- 02-07 18:10:36.902 575 575 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
- 02-07 18:10:36.902 575 575 D QSEECOMD: : Init rpmb_init_service ret = 0
- 02-07 18:10:36.902 575 575 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
- 02-07 18:10:36.902 575 575 E QSEECOMD: : Listener: index = 1, hierarchy = 0
- 02-07 18:10:36.902 575 575 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
- 02-07 18:10:36.902 575 575 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
- 02-07 18:10:36.902 575 575 E SSD : ssd_init_service succeeded!
- 02-07 18:10:36.902 575 575 D QSEECOMD: : Init ssd_init_service ret = 0
- 02-07 18:10:36.902 575 575 D QSEECOMD: : SSD system services: init (Listener ID = 12288)
- 02-07 18:10:36.902 575 575 E QSEECOMD: : Listener: index = 2, hierarchy = 0
- 02-07 18:10:36.903 575 575 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libqdutils.so" not found
- 02-07 18:10:36.904 576 576 D QSEECOMD: : qseecom listener service threads starting!!!
- 02-07 18:10:36.904 576 576 D QSEECOMD: : Total listener services to start = 9
- 02-07 18:10:36.904 576 576 E QSEECOMD: : Listener: index = 0, hierarchy = 1
- 02-07 18:10:36.904 576 576 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
- 02-07 18:10:36.904 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds
- 02-07 18:10:36.904 576 576 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400
- 02-07 18:10:36.905 576 576 D QSEECOMD: : Init rpmb_start ret = 0
- 02-07 18:10:36.905 576 576 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192)
- 02-07 18:10:36.905 576 576 E QSEECOMD: : Listener: index = 1, hierarchy = 1
- 02-07 18:10:36.906 576 576 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
- 02-07 18:10:36.906 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds
- 02-07 18:10:36.906 576 576 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000
- 02-07 18:10:36.906 576 576 D QSEECOMD: : Init ssd_start ret = 0
- 02-07 18:10:36.906 576 576 D QSEECOMD: : SSD system services: Started (Listener ID = 12288)
- 02-07 18:10:36.906 576 576 E QSEECOMD: : Listener: index = 2, hierarchy = 1
- 02-07 18:10:36.907 576 576 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found
- 02-07 18:10:36.907 576 576 E QSEECOMD: : Listener: index = 3, hierarchy = 1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:33): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:34): avc: denied { read } for name="nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:35): avc: denied { open } for path="/nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:36): avc: denied { getattr } for path="/nonplat_service_contexts" dev="rootfs" ino=13327 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:37): avc: denied { read } for name="plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:38): avc: denied { open } for path="/plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.909 588 588 I servicemanager: type=1400 audit(0.0:39): avc: denied { getattr } for path="/plat_service_contexts" dev="rootfs" ino=13333 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
- --------- beginning of system
- 02-07 18:10:36.909 576 582 I QISL : QSEE Interrupt Service Listener Thread is started
- 02-07 18:10:36.909 576 582 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
- 02-07 18:10:36.910 576 582 I QISL : QSEE Interrupt Service Listener was activated successfully
- 02-07 18:10:36.910 576 576 D QSEECOMD: : Init qisl_start ret = 0
- 02-07 18:10:36.910 576 576 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
- 02-07 18:10:36.910 576 576 E QSEECOMD: : Listener: index = 7, hierarchy = 1
- 02-07 18:10:36.910 576 576 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds
- 02-07 18:10:36.910 576 576 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds
- 02-07 18:10:36.910 576 576 D SPL : Call QSEECom_register_listener()
- 02-07 18:10:36.910 576 576 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400
- 02-07 18:10:36.910 576 576 D SPL : Registered listener sucessfully!
- 02-07 18:10:36.911 576 576 D SPL : pipe read-fd [27] write-fd [28]
- 02-07 18:10:36.911 576 576 D SPL : Create thread
- 02-07 18:10:36.911 576 576 D SPL : Thread created sucessfully.
- 02-07 18:10:36.916 576 576 D QSEECOMD: : QSEECOM DAEMON RUNNING
- 02-07 18:10:36.924 588 588 I SELinux : SELinux: Loaded service_contexts from:
- 02-07 18:10:36.924 588 588 I SELinux : /plat_service_contexts
- 02-07 18:10:36.924 588 588 I SELinux : /nonplat_service_contexts
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:40): avc: denied { read } for name="nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:41): avc: denied { open } for path="/nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:42): avc: denied { getattr } for path="/nonplat_hwservice_contexts" dev="rootfs" ino=13324 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:43): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:44): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:45): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112146 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:46): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112146 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
- 02-07 18:10:36.929 585 585 I hwservicemanage: type=1400 audit(0.0:47): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
- 02-07 18:10:36.929 586 586 I android.hardwar: type=1400 audit(0.0:48): avc: denied { call } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
- 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.938 585 585 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager pid=585 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.938 585 585 E hwservicemanager: BINDER_SET_INHERIT_FIFO_PRIO failed with error -1
- 02-07 18:10:36.939 586 586 E cutils-trace: Error opening trace file: No such file or directory (2)
- 02-07 18:10:36.939 587 587 E cutils-trace: Error opening trace file: No such file or directory (2)
- 02-07 18:10:36.939 585 585 E cutils-trace: Error opening trace file: No such file or directory (2)
- 02-07 18:10:36.940 585 585 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice pid=586 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.940 585 585 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
- 02-07 18:10:36.943 585 585 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper pid=587 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.943 585 585 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
- 02-07 18:10:36.943 586 586 D vndksupport: Loading /vendor/lib64/hw/android.hardware.keymaster@3.0-impl-qti.so from current namespace instead of sphal namespace.
- 02-07 18:10:36.946 587 587 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
- 02-07 18:10:36.946 586 586 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
- 02-07 18:10:36.946 586 586 D QSEECOMAPI: App is already loaded QSEE and app id = 1
- 02-07 18:10:36.949 586 586 I keymaster@3.0-s: type=1400 audit(0.0:49): avc: denied { transfer } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
- 02-07 18:10:36.949 587 587 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
- 02-07 18:10:36.950 586 586 E KeymasterUtils: TA API Major Verion: 3
- 02-07 18:10:36.950 587 587 D QSEECOMAPI: App is already loaded QSEE and app id = 1
- 02-07 18:10:36.950 586 586 E KeymasterUtils: TA API Minor Verion: 0
- 02-07 18:10:36.950 586 586 E KeymasterUtils: TA Major Verion: 3
- 02-07 18:10:36.950 586 586 E KeymasterUtils: TA Minor Verion: 121
- 02-07 18:10:36.956 587 587 E KeymasterUtils: TA API Major Verion: 3
- 02-07 18:10:36.956 587 587 E KeymasterUtils: TA API Minor Verion: 0
- 02-07 18:10:36.956 587 587 E KeymasterUtils: TA Major Verion: 3
- 02-07 18:10:36.956 587 587 E KeymasterUtils: TA Minor Verion: 121
- 02-07 18:10:36.962 586 586 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@3.0-service-qti to keymaster@3.0-s.
- 02-07 18:10:36.962 585 585 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice pid=586 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.962 586 586 I android.hardware.keymaster@3.0-service: Registration complete for android.hardware.keymaster@3.0::IKeymasterDevice/default.
- 02-07 18:10:36.963 587 587 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-.
- 02-07 18:10:36.963 585 585 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper pid=587 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
- 02-07 18:10:36.963 587 587 I android.hardware.gatekeeper@1.0-service: Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default.
- 02-07 18:10:41.842 593 594 I adbd : initializing functionfs
- 02-07 18:10:41.842 593 594 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
- 02-07 18:10:42.343 593 594 I adbd : functionfs successfully initialized
- 02-07 18:10:42.343 593 594 I adbd : registering usb transport
- 02-07 18:10:42.344 593 595 E cutils-trace: Error opening trace file: No such file or directory (2)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement