Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- juno:/ # cat /system/build.prop
- # begin build properties
- # autogenerated by buildinfo.sh
- ro.build.id=OPR5.170623.014
- ro.build.display.id=juno-userdebug 8.0.0 OPR5.170623.014 30 test-keys
- ro.build.version.incremental=30
- ro.build.version.sdk=26
- ro.build.version.preview_sdk=0
- ro.build.version.codename=REL
- ro.build.version.all_codenames=REL
- ro.build.version.release=8.0.0
- ro.build.version.security_patch=2017-12-01
- ro.build.version.base_os=
- ro.build.date=Fri Jan 19 10:27:25 UTC 2018
- ro.build.date.utc=1516357645
- ro.build.type=userdebug
- ro.build.user=buildslave
- ro.build.host=aosp-x86-64-07
- ro.build.tags=test-keys
- ro.build.flavor=juno-userdebug
- ro.product.model=juno
- ro.product.brand=generic
- ro.product.name=juno
- ro.product.device=juno
- # ro.product.cpu.abi and ro.product.cpu.abi2 are obsolete,
- # use ro.product.cpu.abilist instead.
- ro.product.cpu.abi=arm64-v8a
- ro.product.cpu.abilist=arm64-v8a,armeabi-v7a,armeabi
- ro.product.cpu.abilist32=armeabi-v7a,armeabi
- ro.product.cpu.abilist64=arm64-v8a
- ro.product.manufacturer=unknown
- ro.product.locale=en-US
- ro.wifi.channels=
- # ro.build.product is obsolete; use ro.product.device
- ro.build.product=juno
- # Do not try to parse description, fingerprint, or thumbprint
- ro.build.description=juno-userdebug 8.0.0 OPR5.170623.014 30 test-keys
- ro.build.fingerprint=generic/juno/juno:8.0.0/OPR5.170623.014/30:userdebug/test-keys
- ro.build.characteristics=default
- # end build properties
- # begin build properties
- # autogenerated by vendor_buildinfo.sh
- ro.product.board=
- ro.board.platform=juno
- # end build properties
- #
- # from device/linaro/juno/system.prop
- #
- # This overrides settings in the products/generic/system.prop file
- #
- # rild.libpath=/system/lib/libreference-ril.so
- # rild.libargs=-d /dev/ttyS0
- #
- # ADDITIONAL_BUILD_PROPERTIES
- #
- dalvik.vm.heapstartsize=16m
- dalvik.vm.heapgrowthlimit=192m
- dalvik.vm.heapsize=512m
- dalvik.vm.heaptargetutilization=0.75
- dalvik.vm.heapminfree=512k
- dalvik.vm.heapmaxfree=8m
- ro.logd.size=1M
- service.adb.root=1
- ro.config.ringtone=Ring_Synth_04.ogg
- ro.config.notification_sound=pixiedust.ogg
- ro.carrier=unknown
- ro.config.alarm_alert=Alarm_Classic.ogg
- ro.treble.enabled=false
- persist.sys.dalvik.vm.lib.2=libart.so
- dalvik.vm.isa.arm64.variant=cortex-a53
- dalvik.vm.isa.arm64.features=default
- dalvik.vm.isa.arm.variant=cortex-a53
- dalvik.vm.isa.arm.features=default
- dalvik.vm.lockprof.threshold=500
- net.bt.name=Android
- dalvik.vm.stack-trace-file=/data/anr/traces.txt
- juno:/ #
- juno:/ # [ 126.368036] init: computing context for service 'netd'
- [ 126.373359] init: starting service 'netd'...
- [ 126.378265] init: property_set("ro.boottime.netd", "126229535360") failed: property already set
- [ 126.378734] init: Created socket '/dev/socket/netd', mode 660, user 0, group 1000
- [ 126.379085] init: Created socket '/dev/socket/dnsproxyd', mode 660, user 0, group 3003
- [ 126.379375] init: Created socket '/dev/socket/mdns', mode 660, user 0, group 1000
- [ 126.379660] init: Created socket '/dev/socket/fwmarkd', mode 660, user 0, group 3003
- [ 126.381525] type=1400 audit(1517403644.712:501): avc: denied { search } for pid=180 comm="[email protected]" name="graphics" dev="tmpfs" ino=5838 scontext=u:r:hal_graph
- ics_allocator_default:s0 tcontext=u:object_r:graphics_device:s0 tclass=dir permissive=0
- [ 126.381534] type=1400 audit(1517403649.140:502): avc: granted { getattr } for pid=2388 comm="netd" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcontext=
- u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.408374] type=1400 audit(1517403649.140:502): avc: granted { getattr } for pid=2388 comm="netd" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcontext=
- u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.408385] type=1400 audit(1517403649.164:503): avc: granted { getattr } for pid=2389 comm="iptables-restor" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.420425] type=1400 audit(1517403649.164:503): avc: granted { getattr } for pid=2389 comm="iptables-restor" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.420434] type=1400 audit(1517403649.176:504): avc: granted { getattr } for pid=2390 comm="ip6tables-resto" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.437099] type=1400 audit(1517403649.176:504): avc: granted { getattr } for pid=2390 comm="ip6tables-resto" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.437112] type=1400 audit(1517403649.196:505): avc: granted { getattr } for pid=2391 comm="iptables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcont
- ext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.447439] type=1400 audit(1517403649.196:505): avc: granted { getattr } for pid=2391 comm="iptables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcont
- ext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.447450] type=1400 audit(1517403649.204:506): avc: granted { getattr } for pid=2392 comm="ip6tables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcon
- text=u:object_r:rootfs:s0 tclass=lnk_file
- [ 126.639882] init: computing context for service 'surfaceflinger'
- [ 126.646022] init: starting service 'surfaceflinger'...
- [ 126.651781] init: property_set("ro.boottime.surfaceflinger", "126503039740") failed: property already set
- [ 131.377995] init: computing context for service 'netd'
- [ 131.383381] init: starting service 'netd'...
- [ 131.388269] init: property_set("ro.boottime.netd", "131239541720") failed: property already set
- [ 131.388895] init: Created socket '/dev/socket/netd', mode 660, user 0, group 1000
- [ 131.389262] init: Created socket '/dev/socket/dnsproxyd', mode 660, user 0, group 3003
- [ 131.389544] init: Created socket '/dev/socket/mdns', mode 660, user 0, group 1000
- [ 131.389817] init: Created socket '/dev/socket/fwmarkd', mode 660, user 0, group 3003
- [ 131.392005] type=1400 audit(1517403649.712:520): avc: denied { search } for pid=180 comm="[email protected]" name="graphics" dev="tmpfs" ino=5838 scontext=u:r:hal_graph
- ics_allocator_default:s0 tcontext=u:object_r:graphics_device:s0 tclass=dir permissive=0
- [ 131.392027] type=1400 audit(1517403654.148:521): avc: granted { getattr } for pid=2476 comm="netd" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcontext=
- u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.417339] type=1400 audit(1517403654.148:521): avc: granted { getattr } for pid=2476 comm="netd" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcontext=
- u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.417350] type=1400 audit(1517403654.176:522): avc: granted { getattr } for pid=2477 comm="iptables-restor" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.427410] type=1400 audit(1517403654.176:522): avc: granted { getattr } for pid=2477 comm="iptables-restor" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.427419] type=1400 audit(1517403654.184:523): avc: granted { getattr } for pid=2478 comm="ip6tables-resto" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.443668] type=1400 audit(1517403654.184:523): avc: granted { getattr } for pid=2478 comm="ip6tables-resto" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s
- 0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.443681] type=1400 audit(1517403654.200:524): avc: granted { getattr } for pid=2479 comm="iptables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcont
- ext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.454103] type=1400 audit(1517403654.200:524): avc: granted { getattr } for pid=2479 comm="iptables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcont
- ext=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.454114] type=1400 audit(1517403654.212:525): avc: granted { getattr } for pid=2480 comm="ip6tables" path="/vendor" dev="rootfs" ino=5751 scontext=u:r:netd:s0 tcon
- text=u:object_r:rootfs:s0 tclass=lnk_file
- [ 131.651487] init: computing context for service 'surfaceflinger'
- [ 131.657640] init: starting service 'surfaceflinger'...
- [ 131.663407] init: property_set("ro.boottime.surfaceflinger", "131514657780") failed: property already set
- [ 132.076921] binder: undelivered transaction 7060
Add Comment
Please, Sign In to add comment