SHARE
TWEET

Untitled

a guest Feb 17th, 2020 60 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. P840F12:/ $ su
  2. P840F12:/ # dmesg | grep avc
  3. [   22.461985] type=1400 audit(1581946760.452:3): avc: denied { read } for pid=1801 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  4. [   22.462564] type=1400 audit(1581946760.452:4): avc: denied { read } for pid=1801 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  5. [   22.462741] type=1400 audit(1581946760.452:5): avc: denied { read } for pid=1801 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  6. [   22.465186] type=1400 audit(1581946760.452:6): avc: denied { read } for pid=1801 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  7. [   22.466467] type=1400 audit(1581946760.452:7): avc: denied { read } for pid=1801 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  8. [   24.782915] init: avc:  granted  { set } for property=net.lte.ims.data.enabled pid=2054 uid=1001 gid=1001 scontext=u:r:radio:s0 tcontext=u:object_r:net_radio_prop:s0 tclass=property_service
  9. [   29.673506] type=1400 audit(1581946767.662:8): avc: denied { read } for pid=2447 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  10. [   29.675085] type=1400 audit(1581946767.662:9): avc: denied { read } for pid=2447 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  11. [   29.675458] type=1400 audit(1581946767.662:10): avc: denied { read } for pid=2447 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  12. [   29.675693] type=1400 audit(1581946767.662:11): avc: denied { read } for pid=2447 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  13. [   29.675916] type=1400 audit(1581946767.662:12): avc: denied { read } for pid=2447 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  14. [   29.841973] type=1400 audit(1581946767.832:13): avc: denied { read } for pid=2501 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  15. [   29.843026] type=1400 audit(1581946767.832:14): avc: denied { read } for pid=2501 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  16. [   29.843438] type=1400 audit(1581946767.832:15): avc: denied { read } for pid=2501 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  17. [   29.843731] type=1400 audit(1581946767.832:16): avc: denied { read } for pid=2501 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  18. [   29.843967] type=1400 audit(1581946767.832:17): avc: denied { read } for pid=2501 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  19. [   31.349940] type=1400 audit(1581946769.332:18): avc: denied { read } for pid=2735 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  20. [   31.350704] type=1400 audit(1581946769.332:19): avc: denied { read } for pid=2735 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  21. [   31.350951] type=1400 audit(1581946769.332:20): avc: denied { read } for pid=2735 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  22. [   31.351178] type=1400 audit(1581946769.332:21): avc: denied { read } for pid=2735 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  23. [   31.351437] type=1400 audit(1581946769.342:22): avc: denied { read } for pid=2735 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  24. [   31.818236] type=1400 audit(1581946769.802:23): avc: denied { read } for pid=2824 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  25. [   31.818899] type=1400 audit(1581946769.802:24): avc: denied { read } for pid=2824 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  26. [   31.819144] type=1400 audit(1581946769.802:25): avc: denied { read } for pid=2824 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  27. [   31.819361] type=1400 audit(1581946769.802:26): avc: denied { read } for pid=2824 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  28. [   31.819584] type=1400 audit(1581946769.802:27): avc: denied { read } for pid=2824 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  29. [   32.864023] type=1400 audit(1581946771.665:28): avc: denied { read } for pid=2982 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  30. [   32.865099] type=1400 audit(1581946771.665:29): avc: denied { read } for pid=2982 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  31. [   32.865909] type=1400 audit(1581946771.665:30): avc: denied { read } for pid=2982 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  32. [   32.866197] type=1400 audit(1581946771.665:31): avc: denied { read } for pid=2982 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  33. [   33.184169] type=1400 audit(1581946771.985:32): avc: denied { write } for pid=2501 comm="com.dolby" name="property_service" dev="tmpfs" ino=400 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
  34. [   33.184377] type=1400 audit(1581946771.985:33): avc: denied { connectto } for pid=2501 comm="com.dolby" path="/dev/socket/property_service" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
  35. [   33.184846] init: avc:  denied  { set } for property=dolby.ds.state pid=2501 uid=10064 gid=10064 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:dolby_prop:s0 tclass=property_service permissive=1
  36. [   33.787139] type=1400 audit(1581946772.585:34): avc: denied { read } for pid=3143 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  37. [   33.788126] type=1400 audit(1581946772.585:35): avc: denied { read } for pid=3143 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  38. [   33.788552] type=1400 audit(1581946772.585:36): avc: denied { read } for pid=3143 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  39. [   33.788772] type=1400 audit(1581946772.585:37): avc: denied { read } for pid=3143 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  40. [   33.788995] type=1400 audit(1581946772.585:38): avc: denied { read } for pid=3143 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  41. [   34.833764] type=1400 audit(1581946773.635:39): avc: denied { write } for pid=3250 comm="time_daemon" name="ats_2" dev="mmcblk0p22" ino=39 scontext=u:r:time_daemon:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
  42. [   69.944903] type=1400 audit(1581946808.745:40): avc: denied { read } for pid=3332 comm="main" name="u:object_r:fpd_test_down_prop:s0" dev="tmpfs" ino=324 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  43. [   69.945519] type=1400 audit(1581946808.745:41): avc: denied { read } for pid=3332 comm="main" name="u:object_r:fpd_test_up_prop:s0" dev="tmpfs" ino=325 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  44. [   69.945790] type=1400 audit(1581946808.745:42): avc: denied { read } for pid=3332 comm="main" name="u:object_r:fpd_test_prop:s0" dev="tmpfs" ino=326 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  45. [   69.945979] type=1400 audit(1581946808.745:43): avc: denied { read } for pid=3332 comm="main" name="u:object_r:fpd_emode_prop:s0" dev="tmpfs" ino=327 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  46. [   69.946222] type=1400 audit(1581946808.745:44): avc: denied { read } for pid=3332 comm="main" name="u:object_r:fpd_prop:s0" dev="tmpfs" ino=328 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
  47. P840F12:/ #
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top