Advertisement
Guest User

logcat PE 11

a guest
Nov 29th, 2021
51
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.79 KB | None | 0 0
  1. --------- beginning of main
  2. 01-22 00:40:37.105 540 540 W auditd : type=2000 audit(0.0:1): initialized
  3. 01-22 00:40:38.639 540 540 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
  4. 01-22 00:40:38.659 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  5. 01-22 00:40:39.169 1 1 I init : type=1400 audit(0.0:4): avc: denied { create } for name="bin" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=1
  6. 01-22 00:40:39.169 1 1 I init : type=1400 audit(0.0:5): avc: denied { create } for name="sh" scontext=u:r:init:s0 tcontext=u:object_r:shell_exec:s0 tclass=lnk_file permissive=1
  7. 01-22 00:40:39.169 1 1 I init : type=1400 audit(0.0:6): avc: denied { create } for name="manifest.xml" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=lnk_file permissive=1
  8. 01-22 00:40:39.169 1 1 I init : type=1400 audit(0.0:7): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
  9. 01-22 00:40:39.169 540 540 I init : type=1400 audit(0.0:8): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=17318 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  10. 01-22 00:40:39.169 540 540 I logd : type=1400 audit(0.0:9): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=17318 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  11. 01-22 00:40:39.169 540 540 I logd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sbin/logd" dev="rootfs" ino=17318 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  12. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:12): avc: denied { read } for name="plat_hwservice_contexts" dev="rootfs" ino=12275 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  13. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:13): avc: denied { open } for path="/vendor_hwservice_contexts" dev="rootfs" ino=17600 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  14. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:14): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=17600 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  15. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:15): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  16. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:16): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  17. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:17): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  18. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:18): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  19. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:19): avc: denied { write } for name="access" dev="selinuxfs" ino=6 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
  20. 01-22 00:40:39.189 537 537 I hwservicemanage: type=1400 audit(0.0:20): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  21. 01-22 00:40:39.206 537 537 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
  22. 01-22 00:40:39.206 537 537 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
  23. 01-22 00:40:39.207 537 537 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
  24. 01-22 00:40:39.208 537 537 I hwservicemanager: hwservicemanager is ready now.
  25. 01-22 00:40:39.233 563 563 D QSEECOMD: : qseecom listener services process entry PPID = 1
  26. 01-22 00:40:39.234 563 563 E QSEECOMD: : Listener: index = 0, hierarchy = 0
  27. 01-22 00:40:39.234 563 563 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
  28. 01-22 00:40:39.234 563 563 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
  29. 01-22 00:40:39.237 563 563 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64
  30. 01-22 00:40:39.238 563 563 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
  31. 01-22 00:40:39.238 563 563 D QSEECOMD: : Init rpmb_init_service ret = 0
  32. 01-22 00:40:39.238 563 563 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
  33. 01-22 00:40:39.238 563 563 E QSEECOMD: : Listener: index = 1, hierarchy = 0
  34. 01-22 00:40:39.238 563 563 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
  35. 01-22 00:40:39.238 563 563 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
  36. 01-22 00:40:39.238 563 563 E SSD : ssd_init_service succeeded!
  37. 01-22 00:40:39.238 563 563 D QSEECOMD: : Init ssd_init_service ret = 0
  38. 01-22 00:40:39.238 563 563 D QSEECOMD: : SSD system services: init (Listener ID = 12288)
  39. 01-22 00:40:39.238 563 563 E QSEECOMD: : Listener: index = 2, hierarchy = 0
  40. 01-22 00:40:39.258 563 563 D QSEECOMD: : Init dlopen(libsecureui.so, RTLD_NOW) succeeds
  41. 01-22 00:40:39.258 563 563 D QSEECOMD: : Init::Init dlsym(g_FSHandle secure_ui_init) succeeds
  42. 01-22 00:40:39.258 563 563 D QSEECOMD: : Init secure_ui_init ret = 0
  43. 01-22 00:40:39.258 563 563 D QSEECOMD: : secure UI services: init (Listener ID = 16384)
  44. 01-22 00:40:39.259 563 563 D QSEECOMD: : Parent qseecom daemon process paused!!
  45. 01-22 00:40:39.259 567 567 D QSEECOMD: : qseecom listener service threads starting!!!
  46. 01-22 00:40:39.259 567 567 D QSEECOMD: : Total listener services to start = 9
  47. 01-22 00:40:39.259 567 567 E QSEECOMD: : Listener: index = 0, hierarchy = 1
  48. 01-22 00:40:39.259 567 567 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
  49. 01-22 00:40:39.259 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds
  50. 01-22 00:40:39.260 567 567 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400
  51. 01-22 00:40:39.260 567 567 D QSEECOMD: : Init rpmb_start ret = 0
  52. 01-22 00:40:39.260 567 567 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192)
  53. 01-22 00:40:39.260 567 567 E QSEECOMD: : Listener: index = 1, hierarchy = 1
  54. 01-22 00:40:39.260 567 567 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
  55. 01-22 00:40:39.260 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds
  56. 01-22 00:40:39.260 567 567 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000
  57. 01-22 00:40:39.261 567 567 D QSEECOMD: : Init ssd_start ret = 0
  58. 01-22 00:40:39.261 567 567 D QSEECOMD: : SSD system services: Started (Listener ID = 12288)
  59. 01-22 00:40:39.261 567 567 E QSEECOMD: : Listener: index = 2, hierarchy = 1
  60. 01-22 00:40:39.261 567 567 D QSEECOMD: : Init dlopen(libsecureui.so, RTLD_NOW) succeeds
  61. 01-22 00:40:39.261 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle secure_ui_start) succeeds
  62. 01-22 00:40:39.261 567 567 D QSEECOMAPI: QSEECom_register_listener 16384 sb_length = 0x10a8
  63. 01-22 00:40:39.261 567 567 D QSEECOMD: : Init secure_ui_start ret = 0
  64. 01-22 00:40:39.261 567 567 D QSEECOMD: : secure UI services: Started (Listener ID = 16384)
  65. 01-22 00:40:39.261 567 567 E QSEECOMD: : Listener: index = 3, hierarchy = 1
  66. 01-22 00:40:39.262 567 567 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
  67. 01-22 00:40:39.262 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds
  68. 01-22 00:40:39.262 567 567 D DrmLibTime: QSEE Time Listener: atime_start
  69. 01-22 00:40:39.262 567 567 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000
  70. 01-22 00:40:39.262 567 567 D DrmLibTime: registering fs service to QSEECom is done!
  71. 01-22 00:40:39.262 567 567 D DrmLibTime: begin to create a thread!
  72. 01-22 00:40:39.262 567 567 D DrmLibTime: Creating a pthread in atime_start is done! return 0
  73. 01-22 00:40:39.262 567 567 D QSEECOMD: : Init atime_start ret = 0
  74. 01-22 00:40:39.262 567 567 D QSEECOMD: : time services: Started (Listener ID = 11)
  75. 01-22 00:40:39.262 567 567 E QSEECOMD: : Listener: index = 4, hierarchy = 1
  76. 01-22 00:40:39.262 567 571 D DrmLibTime: QSEE Time Listener: dispatch
  77. 01-22 00:40:39.263 567 571 D DrmLibTime: before calling ioctl to read the next time_cmd
  78. 01-22 00:40:39.263 567 567 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
  79. 01-22 00:40:39.263 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds
  80. 01-22 00:40:39.263 567 567 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000
  81. 01-22 00:40:39.263 567 567 D QSEECOMD: : Init fs_start ret = 0
  82. 01-22 00:40:39.263 567 567 D QSEECOMD: : file system services: Started (Listener ID = 10)
  83. 01-22 00:40:39.263 567 567 E QSEECOMD: : Listener: index = 5, hierarchy = 1
  84. 01-22 00:40:39.263 567 567 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
  85. 01-22 00:40:39.263 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds
  86. 01-22 00:40:39.264 567 567 E DrmLibFs: Error: Invalid config file
  87. 01-22 00:40:39.264 567 567 E DrmLibFs: Data path not parsed: Using default data path: /data/vendor/tzstorage/
  88. 01-22 00:40:39.264 567 567 E DrmLibFs: Persist path not parsed: Using default persist path: /mnt/vendor/persist/data/
  89. 01-22 00:40:39.264 567 567 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000
  90. 01-22 00:40:39.264 567 567 D QSEECOMD: : Init gpfs_start ret = 0
  91. 01-22 00:40:39.264 567 567 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672)
  92. 01-22 00:40:39.264 567 567 E QSEECOMD: : Listener: index = 6, hierarchy = 1
  93. 01-22 00:40:39.264 567 567 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds
  94. 01-22 00:40:39.264 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds
  95. --------- beginning of system
  96. 01-22 00:40:39.265 567 574 I QISL : QSEE Interrupt Service Listener Thread is started
  97. 01-22 00:40:39.265 567 574 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
  98. 01-22 00:40:39.265 567 574 I QISL : QSEE Interrupt Service Listener was activated successfully
  99. 01-22 00:40:39.265 567 567 D QSEECOMD: : Init qisl_start ret = 0
  100. 01-22 00:40:39.265 567 567 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
  101. 01-22 00:40:39.265 567 567 E QSEECOMD: : Listener: index = 7, hierarchy = 1
  102. 01-22 00:40:39.265 567 567 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds
  103. 01-22 00:40:39.265 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds
  104. 01-22 00:40:39.265 567 567 D SPL : Call QSEECom_register_listener()
  105. 01-22 00:40:39.265 567 567 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400
  106. 01-22 00:40:39.266 567 567 D SPL : Registered listener sucessfully!
  107. 01-22 00:40:39.266 567 567 D SPL : pipe read-fd [31] write-fd [32]
  108. 01-22 00:40:39.266 567 567 D SPL : Create thread
  109. 01-22 00:40:39.266 567 567 D SPL : Thread created sucessfully.
  110. 01-22 00:40:39.266 567 567 D QSEECOMD: : Init spl_start ret = 0
  111. 01-22 00:40:39.266 567 575 D SPL : spl_dispatch() started
  112. 01-22 00:40:39.266 567 567 D QSEECOMD: : secure processor services: Started (Listener ID = 45056)
  113. 01-22 00:40:39.266 567 567 E QSEECOMD: : Listener: index = 8, hierarchy = 1
  114. 01-22 00:40:39.266 567 575 D SPL : ==== Wait For Request ======
  115. 01-22 00:40:39.266 567 567 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds
  116. 01-22 00:40:39.266 567 567 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds
  117. 01-22 00:40:39.267 567 567 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000
  118. 01-22 00:40:39.267 567 567 D QSEECOMD: : Init gp_reqcancel_start ret = 0
  119. 01-22 00:40:39.267 567 567 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352)
  120. 01-22 00:40:39.270 567 567 D QSEECOMD: : QSEECOM DAEMON RUNNING
  121. 01-22 00:40:39.282 579 579 I SELinux : SELinux: Loaded service_contexts from:
  122. 01-22 00:40:39.282 579 579 I SELinux : /plat_service_contexts
  123. 01-22 00:40:39.282 579 579 I SELinux : /vendor_service_contexts
  124. 01-22 00:40:39.285 578 578 E cutils-trace: Error opening trace file: No such file or directory (2)
  125. 01-22 00:40:39.285 577 577 E cutils-trace: Error opening trace file: No such file or directory (2)
  126. 01-22 00:40:39.285 537 537 E cutils-trace: Error opening trace file: No such file or directory (2)
  127. 01-22 00:40:39.285 537 537 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=578 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  128. 01-22 00:40:39.309 578 578 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  129. 01-22 00:40:39.313 537 537 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=577 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  130. 01-22 00:40:39.314 578 578 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
  131. 01-22 00:40:39.314 577 577 D vndksupport: Loading /vendor/lib64/hw/android.hardware.keymaster@3.0-impl-qti.so from current namespace instead of sphal namespace.
  132. 01-22 00:40:39.314 578 578 D QSEECOMAPI: App is already loaded QSEE and app id = 1
  133. 01-22 00:40:39.316 577 577 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
  134. 01-22 00:40:39.317 578 578 E KeymasterUtils: TA API Major Version: 3
  135. 01-22 00:40:39.317 577 577 D QSEECOMAPI: App is already loaded QSEE and app id = 1
  136. 01-22 00:40:39.317 578 578 E KeymasterUtils: TA API Minor Version: 0
  137. 01-22 00:40:39.317 578 578 E KeymasterUtils: TA Major Version: 3
  138. 01-22 00:40:39.317 578 578 E KeymasterUtils: TA Minor Version: 132
  139. 01-22 00:40:39.321 578 578 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-service-qti.
  140. 01-22 00:40:39.322 537 537 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=578 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  141. 01-22 00:40:39.322 578 578 I android.hardware.gatekeeper@1.0-service: Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  142. 01-22 00:40:39.323 577 577 E KeymasterUtils: TA API Major Version: 3
  143. 01-22 00:40:39.323 577 577 E KeymasterUtils: TA API Minor Version: 0
  144. 01-22 00:40:39.323 577 577 E KeymasterUtils: TA Major Version: 3
  145. 01-22 00:40:39.323 577 577 E KeymasterUtils: TA Minor Version: 132
  146. 01-22 00:40:39.327 577 577 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@3.0-service-qti to keymaster@3.0-service-qti.
  147. 01-22 00:40:39.327 537 537 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=577 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  148. 01-22 00:40:39.327 577 577 I android.hardware.keymaster@3.0-service: Registration complete for android.hardware.keymaster@3.0::IKeymasterDevice/default.
  149. 01-22 00:40:39.623 542 542 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x73ca0923c0:0x73ca092784] in 92396 ns
  150. 01-22 00:40:39.656 542 542 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A01_00000000 [ 69 ipp] (113 ins) at [0x73ca092790:0x73ca092954] in 48437 ns
  151. 01-22 00:40:39.662 542 542 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A08_00000000 [ 69 ipp] (116 ins) at [0x73ca092960:0x73ca092b30] in 28698 ns
  152. 11-18 04:46:39.727 542 542 I recovery: type=1400 audit(0.0:459): avc: denied { getattr } for path="/data/drm" dev="sda21" ino=655361 scontext=u:r:recovery:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir permissive=1
  153. 11-18 04:46:39.727 542 542 I recovery: type=1400 audit(0.0:460): avc: denied { read } for name="drm" dev="sda21" ino=655361 scontext=u:r:recovery:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir permissive=1
  154. 11-18 04:46:39.727 542 542 I recovery: type=1400 audit(0.0:461): avc: denied { open } for path="/data/drm" dev="sda21" ino=655361 scontext=u:r:recovery:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir permissive=1
  155. 11-18 04:46:39.727 542 542 I recovery: type=1400 audit(0.0:462): avc: denied { getattr } for path="/data/drm/fwdlock/kek.dat" dev="sda21" ino=655363 scontext=u:r:recovery:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file permissive=1
  156. 11-18 04:46:39.747 542 542 I recovery: type=1400 audit(0.0:463): avc: denied { getattr } for path="/data/vendor/wifi/wpa" dev="sda21" ino=3014688 scontext=u:r:recovery:s0 tcontext=u:object_r:wpa_data_file:s0 tclass=dir permissive=1
  157. 11-18 04:46:41.217 542 542 I recovery: type=1400 audit(0.0:658): avc: denied { getattr } for path="/vndservice_contexts" dev="rootfs" ino=17604 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1
  158. 11-18 04:46:41.217 542 542 I recovery: type=1400 audit(0.0:659): avc: denied { getattr } for path="/vendor_seapp_contexts" dev="rootfs" ino=17602 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1
  159. 11-18 04:46:41.217 542 542 I recovery: type=1400 audit(0.0:660): avc: denied { getattr } for path="/sepolicy" dev="rootfs" ino=17464 scontext=u:r:recovery:s0 tcontext=u:object_r:sepolicy_file:s0 tclass=file permissive=1
  160. 11-18 04:46:41.217 542 542 I recovery: type=1400 audit(0.0:661): avc: denied { getattr } for path="/init" dev="rootfs" ino=12250 scontext=u:r:recovery:s0 tcontext=u:object_r:init_exec:s0 tclass=file permissive=1
  161. 11-18 04:46:41.437 542 542 I recovery: type=1400 audit(0.0:662): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=23787 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
  162. 11-18 04:46:41.503 614 616 I adbd : initializing functionfs
  163. 11-18 04:46:41.503 614 616 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
  164. 11-18 04:46:41.507 614 616 I adbd : functionfs successfully initialized
  165. 11-18 04:46:41.507 614 616 I adbd : registering usb transport
  166. 11-18 04:46:41.507 614 617 E cutils-trace: Error opening trace file: No such file or directory (2)
  167. 11-18 04:46:41.514 542 542 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x73ca092b40:0x73ca092cb8] in 111146 ns
  168. 11-18 04:46:42.297 615 615 I recovery: type=1400 audit(0.0:736): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=24029 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  169. 11-18 04:46:42.297 615 615 I recovery: type=1400 audit(0.0:737): avc: denied { open } for path="/dev/mtp_usb" dev="tmpfs" ino=24029 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  170. 11-18 04:46:42.297 615 615 I recovery: type=1400 audit(0.0:738): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=24029 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
  171. 11-18 04:46:49.147 542 542 I recovery: type=1400 audit(0.0:739): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
  172. 11-18 04:46:49.147 542 542 I recovery: type=1400 audit(0.0:740): avc: denied { read } for name="twadbfifo" dev="tmpfs" ino=24144 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
  173. 11-18 04:46:49.147 542 542 I recovery: type=1400 audit(0.0:741): avc: denied { open } for path="/tmp/twadbfifo" dev="tmpfs" ino=24144 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
  174. 11-18 04:46:49.157 542 542 I recovery: type=1400 audit(0.0:742): avc: denied { unlink } for name="orsin" dev="rootfs" ino=24136 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=fifo_file permissive=1
  175. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:743): avc: denied { create } for name="recovery.log" scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  176. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:744): avc: denied { write open } for path="/data/media/0/recovery.log" dev="sda21" ino=6029597 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  177. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:745): avc: denied { getattr } for path="/data/media/0/recovery.log" dev="sda21" ino=6029597 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  178. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:746): avc: denied { setattr } for name="recovery.log" dev="sda21" ino=6029597 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  179. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:747): avc: denied { relabelfrom } for name="recovery.log" dev="sda21" ino=6029597 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  180. 11-18 04:46:56.787 542 542 I recovery: type=1400 audit(0.0:748): avc: denied { relabelto } for name="recovery.log" dev="sda21" ino=6029597 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1
  181. 11-18 04:46:56.827 629 629 I logcat : type=1400 audit(0.0:749): avc: denied { write } for name="logdr" dev="tmpfs" ino=24616 scontext=u:r:recovery:s0 tcontext=u:object_r:logdr_socket:s0 tclass=sock_file permissive=1
  182. 11-18 04:46:56.827 629 629 I logcat : type=1400 audit(0.0:750): avc: denied { connectto } for path="/dev/socket/logdr" scontext=u:r:recovery:s0 tcontext=u:r:logd:s0 tclass=unix_stream_socket permissive=1
  183.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement