Advertisement
Guest User

Full SafetyNet Log

a guest
Jul 22nd, 2017
572
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.33 KB | None | 0 0
  1. --------- beginning of main
  2. D/OpenGLRenderer(17832): endAllActiveAnimators on 0xaf5d6700 (MenuPopupWindow$MenuDropDownListView) with handle 0xac9bf570
  3. D/AndroidRuntime(18735): >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<<
  4. V/DexLibLoader(17796): ending yield
  5. W/dex2oat (17821): Verification of void com.facebook.instantarticles.view.PublisherTitleAndPageIndicatorLinearLayout.onLayout(boolean, int, int, int, int) took 1.001s
  6. D/AndroidRuntime(18735): CheckJNI is OFF
  7. D/ICU (18735): No timezone override file found: /data/misc/zoneinfo/current/icu/icu_tzdata.dat
  8. W/main (18735): type=1400 audit(0.0:15312): avc: denied { write } for uid=0 name="arm" dev="mmcblk0p27" ino=21485 scontext=u:r:shell:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=dir permissive=0
  9. W/main (18735): type=1300 audit(0.0:15312): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b432e590 a2=20042 a3=1b6 items=2 ppid=18732 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  10. W/auditd ( 332): type=1307 audit(0.0:15312): cwd="/"
  11. W/auditd ( 332): type=1302 audit(0.0:15312): item=0 name="/data/dalvik-cache/arm/" inode=21485 dev=b3:1b mode=040711 ouid=0 ogid=0 rdev=00:00 obj=u:object_r:dalvikcache_data_file:s0 nametype=PARENT
  12. W/auditd ( 332): type=1302 audit(0.0:15312): item=1 name="/data/dalvik-cache/arm/system@framework@am.jar@classes.dex.flock" nametype=CREATE
  13. W/auditd ( 332): type=1327 audit(0.0:15312): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  14. W/auditd ( 332): type=1320 audit(0.0:15312):
  15. W/System (18735): ClassLoader referenced unknown path: /vendor/lib64
  16. W/System (18735): ClassLoader referenced unknown path: /system/lib64
  17. I/Radio-JNI(18735): register_android_hardware_Radio DONE
  18. D/AndroidRuntime(18735): Calling main entry com.android.commands.am.Am
  19. W/main (18749): type=1400 audit(0.0:15313): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  20. W/main (18749): type=1300 audit(0.0:15313): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b69418de a2=a0001 a3=0 items=1 ppid=18732 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  21. W/auditd ( 332): type=1307 audit(0.0:15313): cwd="/"
  22. W/auditd ( 332): type=1302 audit(0.0:15313): item=0 name="/dev/cpuset/foreground/tasks" inode=11481 dev=00:11 mode=0100664 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:cgroup:s0 nametype=NORMAL
  23. W/auditd ( 332): type=1327 audit(0.0:15313): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  24. W/auditd ( 332): type=1320 audit(0.0:15313):
  25. W/main (18749): type=1400 audit(0.0:15314): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  26. W/main (18749): type=1300 audit(0.0:15314): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b69418fb a2=a0001 a3=0 items=1 ppid=18732 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  27. W/auditd ( 332): type=1307 audit(0.0:15314): cwd="/"
  28. W/auditd ( 332): type=1302 audit(0.0:15314): item=0 name="/dev/cpuset/background/tasks" inode=11515 dev=00:11 mode=0100664 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:cgroup:s0 nametype=NORMAL
  29. W/auditd ( 332): type=1327 audit(0.0:15314): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  30. W/auditd ( 332): type=1320 audit(0.0:15314):
  31. W/main (18749): type=1400 audit(0.0:15315): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  32. D/AndroidRuntime(18735): Shutting down VM
  33. V/DexLibLoader(17796): beginning yield
  34. --------- beginning of system
  35. W/WindowManager( 1650): Attempted to remove non-existing token: android.os.Binder@b630a85
  36. V/DexLibLoader(17796): ending yield
  37. W/dex2oat (17821): Verification of void X.I1Y.<init>(X.0GF, com.facebook.models.ModelLoader, X.26C, com.facebook.http.tigon.Tigon4aHttpServiceHolder, X.I1Z, com.facebook.compactdisk.StoreManagerFactory) took 1.011s
  38. V/DexLibLoader(17796): beginning yield
  39. V/DexLibLoader(17796): ending yield
  40. V/DexLibLoader(17796): beginning yield
  41. V/DexLibLoader(17796): ending yield
  42. W/dex2oat (17821): Verification of X.1cZ X.IFh.a(X.0xX, com.facebook.reaction.common.ReactionUnitComponentNode, X.Dg1) took 1.093s
  43. V/DexLibLoader(17796): beginning yield
  44. D/SafetyNetHelperSAMPLE(17394): SafetyNet start request
  45. D/SafetyNetHelper(17394): apkCertificateDigests:[MZNsDhz8VAJMmFxPPso38ZRvZE6r7VIyzUqypkakG8E=]
  46. D/SafetyNetHelper(17394): apkDigest:ETDTA7RlBujNlWPPrqXoNjm5jFhIzrCa/XwnUIWh6GM=
  47. V/SafetyNetHelper(17394): Google play services connected
  48. V/SafetyNetHelper(17394): running SafetyNet.API Test
  49. I/qtaguid (13532): Tagging socket 44 with tag 2000180300000000(536877059) for uid -1 failed errno=-2
  50. I/NetworkManagementSocketTagger(13532): tagSocketFd(44, 536877059, -1) failed with errno-2
  51. D/WVCdm ( 635): Instantiating CDM.
  52. I/WVCdm ( 635): CdmEngine::OpenSession
  53. I/WVCdm ( 635): Level3 Library 4445 Sep 10 2016 21:30:01
  54. D/DrmWidevineDash( 635): OEMCrypto_Initialize: starts! g_qsee_apps_version = 0x13
  55. D/DrmWidevineDash( 635): Service_Initialize: starts!
  56. D/QSEECOMAPI: ( 635): QSEECom_get_handle sb_length = 0x19000
  57. D/QSEECOMAPI: ( 635): App is not loaded in QSEE
  58. E/QSEECOMAPI: ( 635): Error::Cannot open the file /vendor/firmware/widevine.mdt
  59. E/QSEECOMAPI: ( 635): Error::Loading image failed with ret = -1
  60. D/QSEECOMAPI: ( 635): QSEECom_get_handle sb_length = 0x19000
  61. D/QSEECOMAPI: ( 635): App is not loaded in QSEE
  62. E/QSEECOMAPI: ( 635): Error::Cannot open the file /system/etc/firmware/widevine.mdt
  63. E/QSEECOMAPI: ( 635): Error::Loading image failed with ret = -1
  64. D/QSEECOMAPI: ( 635): QSEECom_get_handle sb_length = 0x19000
  65. D/QSEECOMAPI: ( 635): App is not loaded in QSEE
  66. E/QSEECOMAPI: ( 635): Error::Cannot open the file /firmware/image/widevine.mdt
  67. E/QSEECOMAPI: ( 635): Error::Loading image failed with ret = -1
  68. E/DrmWidevineDash( 635): Error: Service_Initialize: Loading widevine DASH app failed, ret = -1
  69. D/DrmWidevineDash( 635): Service_Initialize: ends! returns -1
  70. E/DrmWidevineDash( 635): service_initialized returned failure
  71. D/DrmWidevineDash( 635): OEMCrypto_Initialize: ends! returns 1
  72. W/WVCdm ( 635): Could not initialize L1. Falling Back to L3.
  73. W/Binder:635_2( 7551): type=1400 audit(0.0:15317): avc: denied { read } for uid=1013 name="widevine.mdt" dev="mmcblk0p1" ino=43 scontext=u:r:mediadrmserver:s0 tcontext=u:object_r:firmware_file:s0 tclass=file permissive=0
  74. W/Binder:635_2( 7551): type=1300 audit(0.0:15317): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b5800264 a2=20000 a3=0 items=1 ppid=1 ppcomm=init auid=4294967295 uid=1013 gid=1031 euid=1013 suid=1013 fsuid=1013 egid=1031 sgid=1031 fsgid=1031 ses=4294967295 tty=(none) exe="/system/bin/mediadrmserver" subj=u:r:mediadrmserver:s0 key=(null)
  75. W/auditd ( 332): type=1307 audit(0.0:15317): cwd="/"
  76. W/auditd ( 332): type=1302 audit(0.0:15317): item=0 name="/system/etc/firmware/widevine.mdt" inode=43 dev=b3:01 mode=0100444 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:firmware_file:s0 nametype=NORMAL
  77. W/auditd ( 332): type=1327 audit(0.0:15317): proctitle="/system/bin/mediadrmserver"
  78. W/auditd ( 332): type=1320 audit(0.0:15317):
  79. W/Binder:635_2( 7551): type=1400 audit(0.0:15318): avc: denied { read } for uid=1013 name="widevine.mdt" dev="mmcblk0p1" ino=43 scontext=u:r:mediadrmserver:s0 tcontext=u:object_r:firmware_file:s0 tclass=file permissive=0
  80. W/Binder:635_2( 7551): type=1300 audit(0.0:15318): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b5800264 a2=20000 a3=0 items=1 ppid=1 ppcomm=init auid=4294967295 uid=1013 gid=1031 euid=1013 suid=1013 fsuid=1013 egid=1031 sgid=1031 fsgid=1031 ses=4294967295 tty=(none) exe="/system/bin/mediadrmserver" subj=u:r:mediadrmserver:s0 key=(null)
  81. W/auditd ( 332): type=1307 audit(0.0:15318): cwd="/"
  82. W/auditd ( 332): type=1302 audit(0.0:15318): item=0 name="/firmware/image/widevine.mdt" inode=43 dev=b3:01 mode=0100444 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:firmware_file:s0 nametype=NORMAL
  83. I/WVCdm ( 635): CdmEngine::QueryKeyControlInfo
  84. W/auditd ( 332): type=1327 audit(0.0:15318): proctitle="/system/bin/mediadrmserver"
  85. W/auditd ( 332): type=1320 audit(0.0:15318):
  86. I/WVCdm ( 635): CdmEngine::GenerateKeyRequest
  87. D/WVCdm ( 635): PrepareKeyRequest: nonce=2385425055
  88. I/qtaguid (13532): Untagging socket 44 failed errno=-2
  89. W/NetworkManagementSocketTagger(13532): untagSocket(44) failed with errno -2
  90. I/WVCdm ( 635): CdmEngine::CloseSession
  91. V/DexLibLoader(17796): ending yield
  92. W/dex2oat (17821): Verification of void X.IPC.<init>(X.8WX, X.8Wg, X.IP9, X.0o9, X.0Fh, java.util.concurrent.ExecutorService, X.0Q7) took 1.004s
  93. I/GoogleURLConnFactory( 3877): Using platform SSLCertificateSocketFactory
  94. V/DexLibLoader(17796): beginning yield
  95. D/SafetyNetResponse(17394): decodedJWTPayload json:{"extension":"CXI4PtQbGpdt","apkCertificateDigestSha256":[],"error":"internal_error"}
  96. D/SafetyNetHelperSAMPLE(17394): SafetyNet req success: ctsProfileMatch:false and basicIntegrity, false
  97. E/AlarmManager( 1650): RTC Alarm: 2 null com.google.android.gms com.google.android.gms.gcm.ACTION_CHECK_QUEUE
  98. V/DexLibLoader(17796): ending yield
  99. V/DexLibLoader(17796): beginning yield
  100. V/DexLibLoader(17796): ending yield
  101. W/dex2oat (17821): Verification of void X.Ibr.<init>(X.Ibs) took 1.002s
  102. V/DexLibLoader(17796): beginning yield
  103. V/DexLibLoader(17796): ending yield
  104. W/dex2oat (17821): Verification of void X.Ilq.a(android.view.View, com.google.common.util.concurrent.ListenableFuture) took 1.006s
  105. V/DexLibLoader(17796): beginning yield
  106. V/DexLibLoader(17796): ending yield
  107. W/dex2oat (17821): Verification of X.0xd X.Iub.a(X.0xX, X.1cZ) took 1.003s
  108. D/AndroidRuntime(18772): >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<<
  109. D/AndroidRuntime(18772): CheckJNI is OFF
  110. D/ICU (18772): No timezone override file found: /data/misc/zoneinfo/current/icu/icu_tzdata.dat
  111. W/main (18772): type=1400 audit(0.0:15319): avc: denied { write } for uid=0 name="arm" dev="mmcblk0p27" ino=21485 scontext=u:r:shell:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=dir permissive=0
  112. W/main (18772): type=1300 audit(0.0:15319): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b42ae590 a2=20042 a3=1b6 items=2 ppid=18767 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  113. W/auditd ( 332): type=1307 audit(0.0:15319): cwd="/"
  114. W/auditd ( 332): type=1302 audit(0.0:15319): item=0 name="/data/dalvik-cache/arm/" inode=21485 dev=b3:1b mode=040711 ouid=0 ogid=0 rdev=00:00 obj=u:object_r:dalvikcache_data_file:s0 nametype=PARENT
  115. W/auditd ( 332): type=1302 audit(0.0:15319): item=1 name="/data/dalvik-cache/arm/system@framework@am.jar@classes.dex.flock" nametype=CREATE
  116. W/auditd ( 332): type=1327 audit(0.0:15319): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  117. W/auditd ( 332): type=1320 audit(0.0:15319):
  118. W/System (18772): ClassLoader referenced unknown path: /vendor/lib64
  119. W/System (18772): ClassLoader referenced unknown path: /system/lib64
  120. V/DexLibLoader(17796): beginning yield
  121. I/Radio-JNI(18772): register_android_hardware_Radio DONE
  122. D/AndroidRuntime(18772): Calling main entry com.android.commands.am.Am
  123. W/main (18780): type=1400 audit(0.0:15320): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  124. W/main (18780): type=1300 audit(0.0:15320): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b43d98de a2=a0001 a3=0 items=1 ppid=18767 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  125. W/auditd ( 332): type=1307 audit(0.0:15320): cwd="/"
  126. W/auditd ( 332): type=1302 audit(0.0:15320): item=0 name="/dev/cpuset/foreground/tasks" inode=11481 dev=00:11 mode=0100664 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:cgroup:s0 nametype=NORMAL
  127. W/auditd ( 332): type=1327 audit(0.0:15320): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  128. W/auditd ( 332): type=1320 audit(0.0:15320):
  129. W/main (18780): type=1400 audit(0.0:15321): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  130. W/main (18780): type=1300 audit(0.0:15321): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b43d98fb a2=a0001 a3=0 items=1 ppid=18767 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  131. W/auditd ( 332): type=1307 audit(0.0:15321): cwd="/"
  132. W/auditd ( 332): type=1302 audit(0.0:15321): item=0 name="/dev/cpuset/background/tasks" inode=11515 dev=00:11 mode=0100664 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:cgroup:s0 nametype=NORMAL
  133. W/auditd ( 332): type=1327 audit(0.0:15321): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  134. W/auditd ( 332): type=1320 audit(0.0:15321):
  135. W/main (18780): type=1400 audit(0.0:15322): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  136. W/main (18780): type=1300 audit(0.0:15322): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b43d9918 a2=a0001 a3=0 items=1 ppid=18767 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  137. W/auditd ( 332): type=1307 audit(0.0:15322): cwd="/"
  138. W/auditd ( 332): type=1302 audit(0.0:15322): item=0 name="/dev/cpuset/system-background/tasks" inode=11532 dev=00:11 mode=0100664 ouid=1000 ogid=1000 rdev=00:00 obj=u:object_r:cgroup:s0 nametype=NORMAL
  139. W/auditd ( 332): type=1327 audit(0.0:15322): proctitle=6170705F70726F63657373002F73797374656D2F62696E00636F6D2E616E64726F69642E636F6D6D616E64732E616D2E416D0062726F616463617374002D2D757365720030002D610065752E636861696E666972652E737570657273752E4E6174697665416363657373002D2D65730073755F6170706E616D650072732E7065
  140. W/auditd ( 332): type=1320 audit(0.0:15322):
  141. W/main (18780): type=1400 audit(0.0:15323): avc: denied { dac_override } for uid=0 capability=1 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=0
  142. W/main (18780): type=1300 audit(0.0:15323): arch=40000028 syscall=322 per=800008 success=no exit=-13 a0=ffffff9c a1=b43d993c a2=a0001 a3=0 items=1 ppid=18767 ppcomm=sh auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/app_process32" subj=u:r:shell:s0 key=(null)
  143. W/auditd ( 332): type=1307 audit(0.0:15323): cwd="/"
  144. D/AndroidRuntime(18772): Shutting down VM
  145. V/DexLibLoader(17796): ending yield
  146. W/dex2oat (17821): Verification of void X.J8J.run() took 1.012s
  147. W/WindowManager( 1650): Attempted to remove non-existing token: android.os.Binder@74cefdf
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement