Created
December 30, 2021 19:41
-
-
Save tdrkDev/b6a34d5f30fca8ba4bec3b8f0d37cdcf to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--------- beginning of main | |
03-03 02:24:08.327 413 413 W auditd : type=2000 audit(0.0:1): initialized | |
03-03 02:24:11.643 413 413 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295 | |
03-03 02:24:11.665 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 | |
03-03 02:24:11.823 1 1 I init : type=1400 audit(0.0:4): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 | |
03-03 02:24:11.823 412 412 I kworker/u16:2: type=1400 audit(0.0:5): avc: denied { execute } for name="busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.823 412 412 I kworker/u16:2: type=1400 audit(0.0:6): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.832 413 413 I init : type=1400 audit(0.0:7): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.833 413 413 I logd : type=1400 audit(0.0:8): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.834 413 413 I logd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.834 413 413 I logd : type=1400 audit(0.0:10): avc: denied { open } for path="/sbin/libsysutils.so" dev="rootfs" ino=14410 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.891 436 437 I adbd : initializing functionfs | |
03-03 02:24:11.891 436 437 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 | |
03-03 02:24:11.891 436 437 I adbd : functionfs successfully initialized | |
03-03 02:24:11.892 436 437 I adbd : registering usb transport | |
03-03 02:24:11.892 436 439 E cutils-trace: Error opening trace file: No such file or directory (2) | |
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:12): avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone0/temp" dev="sysfs" ino=21331 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:13): avc: denied { write } for name="brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:14): avc: denied { open } for path="/sys/devices/platform/soc/1a00000.qcom,mdss_mdp/1a00000.qcom,mdss_mdp:qcom,mdss_fb_primary/leds/lcd-backlight/brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
03-03 02:24:11.927 441 441 I date : type=1400 audit(0.0:15): avc: denied { sys_time } for capability=25 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1 | |
11-21 12:06:13.279 415 415 I recovery: type=1400 audit(0.0:16): avc: denied { execmem } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=process permissive=1 | |
11-21 12:06:13.279 415 415 I recovery: type=1400 audit(0.0:17): avc: denied { execute } for path="/dev/ashmem" dev="tmpfs" ino=17118 scontext=u:r:recovery:s0 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1 | |
11-21 12:06:13.281 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x79080873c0:0x7908087784] in 127708 ns | |
11-21 12:06:13.545 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A01_00000000 [ 69 ipp] (113 ins) at [0x7908087790:0x7908087954] in 83438 ns | |
11-21 12:06:13.639 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A08_00000000 [ 69 ipp] (116 ins) at [0x7908087960:0x7908087b30] in 72292 ns | |
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:18): avc: denied { write } for name="etc" dev="rootfs" ino=13134 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 | |
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:19): avc: denied { add_name } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 | |
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:20): avc: denied { create } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1 | |
12-30 19:19:46.187 415 415 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb | |
12-30 19:19:46.195 457 457 D QSEECOMD: : qseecom listener services process entry PPID = 1 | |
12-30 19:19:46.195 457 457 E QSEECOMD: : Listener: index = 0, hierarchy = 0 | |
12-30 19:19:46.196 457 457 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds | |
12-30 19:19:46.196 457 457 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds | |
12-30 19:19:46.196 457 457 I rpmb_emmc: RPMB Mult (512-bytes sector) = 8192, Rel_sec_cnt = 32 | |
12-30 19:19:46.196 457 457 E DrmLibRpmb: rpmb_init succeeded! with ret = 0 | |
12-30 19:19:46.196 457 457 D QSEECOMD: : Init rpmb_init_service ret = 0 | |
12-30 19:19:46.196 457 457 D QSEECOMD: : RPMB system services: init (Listener ID = 8192) | |
12-30 19:19:46.196 457 457 E QSEECOMD: : Listener: index = 1, hierarchy = 0 | |
12-30 19:19:46.196 457 457 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds | |
12-30 19:19:46.196 457 457 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds | |
12-30 19:19:46.198 458 458 D QSEECOMD: : Init rpmb_start ret = 0 | |
12-30 19:19:46.199 458 458 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192) | |
12-30 19:19:46.199 458 458 E QSEECOMD: : Listener: index = 1, hierarchy = 1 | |
12-30 19:19:46.199 458 458 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds | |
12-30 19:19:46.199 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds | |
12-30 19:19:46.199 458 458 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000 | |
12-30 19:19:46.199 458 458 D QSEECOMD: : Init ssd_start ret = 0 | |
12-30 19:19:46.199 458 458 D QSEECOMD: : SSD system services: Started (Listener ID = 12288) | |
12-30 19:19:46.199 458 458 E QSEECOMD: : Listener: index = 2, hierarchy = 1 | |
12-30 19:19:46.200 458 458 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... | |
12-30 19:19:46.200 458 458 E QSEECOMD: : Listener: index = 3, hierarchy = 1 | |
12-30 19:19:46.200 458 458 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds | |
12-30 19:19:46.200 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds | |
12-30 19:19:46.200 458 458 D DrmLibTime: QSEE Time Listener: atime_start | |
12-30 19:19:46.200 458 458 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000 | |
12-30 19:19:46.201 458 458 D DrmLibTime: registering fs service to QSEECom is done! | |
12-30 19:19:46.201 458 458 D DrmLibTime: begin to create a thread! | |
12-30 19:19:46.201 458 458 D DrmLibTime: Creating a pthread in atime_start is done! return 0 | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init atime_start ret = 0 | |
12-30 19:19:46.201 458 458 D QSEECOMD: : time services: Started (Listener ID = 11) | |
12-30 19:19:46.201 458 458 E QSEECOMD: : Listener: index = 4, hierarchy = 1 | |
12-30 19:19:46.201 458 461 D DrmLibTime: QSEE Time Listener: dispatch | |
12-30 19:19:46.201 458 461 D DrmLibTime: before calling ioctl to read the next time_cmd | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds | |
12-30 19:19:46.201 458 458 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000 | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init fs_start ret = 0 | |
12-30 19:19:46.201 458 458 D QSEECOMD: : file system services: Started (Listener ID = 10) | |
12-30 19:19:46.201 458 458 E QSEECOMD: : Listener: index = 5, hierarchy = 1 | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds | |
12-30 19:19:46.201 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds | |
12-30 19:19:46.201 458 458 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000 | |
12-30 19:19:46.203 458 458 D QSEECOMD: : Init gpfs_start ret = 0 | |
12-30 19:19:46.203 458 458 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672) | |
12-30 19:19:46.203 458 458 E QSEECOMD: : Listener: index = 6, hierarchy = 1 | |
12-30 19:19:46.203 458 458 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds | |
12-30 19:19:46.203 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds | |
--------- beginning of system | |
12-30 19:19:46.204 458 464 I QISL : QSEE Interrupt Service Listener Thread is started | |
12-30 19:19:46.204 458 464 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4 | |
12-30 19:19:46.204 458 464 I QISL : QSEE Interrupt Service Listener was activated successfully | |
12-30 19:19:46.204 458 458 D QSEECOMD: : Init qisl_start ret = 0 | |
12-30 19:19:46.204 458 458 D QSEECOMD: : interrupt services: Started (Listener ID = 36864) | |
12-30 19:19:46.204 458 458 E QSEECOMD: : Listener: index = 7, hierarchy = 1 | |
12-30 19:19:46.204 458 458 E QSEECOMD: : Init dlopen(libspl.so, RLTD_NOW) is failed.... | |
12-30 19:19:46.204 458 458 E QSEECOMD: : Listener: index = 8, hierarchy = 1 | |
12-30 19:19:46.205 458 458 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds | |
12-30 19:19:46.205 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds | |
12-30 19:19:46.205 458 458 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000 | |
12-30 19:19:46.205 458 458 D QSEECOMD: : Init gp_reqcancel_start ret = 0 | |
12-30 19:19:46.205 458 458 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352) | |
12-30 19:19:46.206 458 458 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x400 | |
12-30 19:19:46.206 458 458 D QSEECOMAPI: App is not loaded in QSEE | |
12-30 19:19:46.206 458 458 E QSEECOMAPI: Error::Cannot open the file /firmware/image/keymaste.mdt errno = 2 | |
12-30 19:19:46.206 458 458 E QSEECOMAPI: Error::Loading image failed with ret = -1 | |
12-30 19:19:46.206 458 458 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x400 | |
12-30 19:19:46.206 458 458 D QSEECOMAPI: App is already loaded QSEE and app id = 65537 | |
12-30 19:19:46.206 458 458 D QSEECOMD: : QSEECOM DAEMON RUNNING | |
12-30 19:19:47.733 415 415 I recovery: type=1400 audit(0.0:44): avc: denied { create } for name="system" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1 | |
12-30 19:19:48.353 415 415 I recovery: type=1400 audit(0.0:45): avc: denied { module_request } for kmod="fs-auto" scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 | |
12-30 19:19:48.354 471 471 I kworker/u16:3: type=1400 audit(0.0:46): avc: denied { execute } for name="busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
12-30 19:19:48.354 471 471 I kworker/u16:3: type=1400 audit(0.0:47): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
12-30 19:19:48.896 415 415 I recovery: type=1400 audit(0.0:48): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1 | |
12-30 19:19:48.896 415 415 I recovery: type=1400 audit(0.0:49): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1 | |
12-30 19:19:48.950 479 479 I rm : type=1400 audit(0.0:50): avc: denied { unlink } for name="setprop" dev="rootfs" ino=14532 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1 | |
12-30 19:19:49.038 476 476 I foxstart.sh: type=1400 audit(0.0:51): avc: denied { append } for name="orangefox.cfg" dev="rootfs" ino=18716 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 | |
12-30 19:19:49.039 500 500 I resetprop: type=1400 audit(0.0:52): avc: denied { write } for name="properties_serial" dev="tmpfs" ino=17898 scontext=u:r:recovery:s0 tcontext=u:object_r:properties_serial:s0 tclass=file permissive=1 | |
12-30 19:19:49.039 500 500 I resetprop: type=1400 audit(0.0:53): avc: denied { write } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=17858 scontext=u:r:recovery:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 | |
12-30 19:19:50.165 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010102_00008002_00000000 [192 ipp] (238 ins) at [0x7908087b40:0x7908087ef8] in 87239 ns | |
12-30 19:19:51.957 415 415 I recovery: type=1400 audit(0.0:59): avc: denied { read } for name="orangefox.cfg" dev="tmpfs" ino=18784 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file permissive=1 | |
12-30 19:19:52.615 415 415 I recovery: type=1400 audit(0.0:60): avc: denied { getattr } for path="/vndservice_contexts" dev="rootfs" ino=13985 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1 | |
12-30 19:19:52.615 415 415 I recovery: type=1400 audit(0.0:61): avc: denied { getattr } for path="/vendor_service_contexts" dev="rootfs" ino=13984 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1 | |
12-30 19:19:52.616 415 415 I recovery: type=1400 audit(0.0:62): avc: denied { getattr } for path="/vendor_seapp_contexts" dev="rootfs" ino=13983 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1 | |
12-30 19:19:52.616 415 415 I recovery: type=1400 audit(0.0:63): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13981 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 | |
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:67): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=17835 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 | |
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:68): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=17835 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 | |
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:69): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=17837 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 | |
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:70): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=17837 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 | |
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:71): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=17840 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 | |
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:135): avc: denied { read } for name="capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:136): avc: denied { open } for path="/sys/devices/platform/soc/200f000.qcom,spmi/spmi-0/spmi0-02/200f000.qcom,spmi:qcom,pmi8950@2:qcom,qpnp-smbcharger/power_supply/battery/capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:137): avc: denied { getattr } for path="/sys/devices/platform/soc/200f000.qcom,spmi/spmi-0/spmi0-02/200f000.qcom,spmi:qcom,pmi8950@2:qcom,qpnp-smbcharger/power_supply/battery/capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
12-30 19:19:58.777 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x7908087f00:0x7908088078] in 105834 ns | |
12-30 19:20:01.139 415 415 I recovery: type=1400 audit(0.0:138): avc: denied { read } for name="mmcblk0p53" dev="sysfs" ino=36465 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 | |
12-30 19:20:01.139 415 415 I recovery: type=1400 audit(0.0:139): avc: denied { open } for path="/sys/devices/platform/soc/7824900.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p53" dev="sysfs" ino=36465 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 | |
12-30 19:20:01.144 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010101_00000A02_00000000 [ 26 ipp] (73 ins) at [0x7908088080:0x79080881a4] in 68802 ns | |
12-30 19:20:01.280 582 582 D : HW based disk encryption is enabled | |
12-30 19:20:01.745 582 582 D vndksupport: Loading /vendor/lib64/hw/keystore.msm8953.so from current namespace instead of sphal namespace. | |
12-30 19:20:31.280 415 415 I recovery: type=1400 audit(0.0:140): avc: denied { kill } for capability=5 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1 | |
12-30 19:20:45.548 415 415 I recovery: type=1400 audit(0.0:141): avc: denied { fsetid } for capability=4 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1 | |
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:142): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 | |
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:143): avc: denied { read } for name="twadbfifo" dev="tmpfs" ino=19001 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 | |
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:144): avc: denied { open } for path="/tmp/twadbfifo" dev="tmpfs" ino=19001 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 | |
12-30 19:20:45.648 415 415 I recovery: type=1400 audit(0.0:145): avc: denied { unlink } for name="orsin" dev="rootfs" ino=16354 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=fifo_file permissive=1 | |
12-30 19:21:02.339 592 593 I adbd : initializing functionfs | |
12-30 19:21:02.339 592 593 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 | |
12-30 19:21:02.345 592 593 I adbd : functionfs successfully initialized | |
12-30 19:21:02.345 592 593 I adbd : registering usb transport | |
12-30 19:21:02.346 592 594 E cutils-trace: Error opening trace file: No such file or directory (2) | |
12-30 19:21:02.743 598 599 I adbd : initializing functionfs | |
12-30 19:21:02.743 598 599 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 | |
12-30 19:21:02.744 598 599 I adbd : functionfs successfully initialized | |
12-30 19:21:02.744 598 599 I adbd : registering usb transport | |
12-30 19:21:02.744 598 600 E cutils-trace: Error opening trace file: No such file or directory (2) | |
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:146): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 | |
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:147): avc: denied { open } for path="/dev/mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 | |
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:148): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 | |
12-30 19:21:03.527 597 597 I recovery: type=1400 audit(0.0:149): avc: denied { read } for name="/" dev="mmcblk1p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1 | |
12-30 19:21:03.527 597 597 I recovery: type=1400 audit(0.0:150): avc: denied { open } for path="/sdcard1" dev="mmcblk1p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1 | |
12-30 19:21:03.544 597 597 I recovery: type=1400 audit(0.0:151): avc: denied { getattr } for path="/sdcard1/recovery.log" dev="mmcblk1p1" ino=66 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1 | |
12-30 19:22:02.839 415 415 I recovery: type=1400 audit(0.0:152): avc: denied { write } for name="brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 | |
12-30 19:23:11.649 77 77 I kworker/u16:1: type=1400 audit(0.0:153): avc: denied { kill } for capability=5 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=1 | |
12-30 19:23:19.530 597 597 I recovery: type=1400 audit(0.0:154): avc: denied { ioctl } for path="/dev/mtp_usb" dev="tmpfs" ino=16247 ioctlcmd=0x4d03 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 | |
12-30 19:20:01.281 582 582 D : HW based disk encryption is enabled | |
12-30 19:40:15.730 743 743 D : HW based disk encryption is enabled | |
12-30 19:40:16.177 743 743 D vndksupport: Loading /vendor/lib64/hw/keystore.msm8953.so from current namespace instead of sphal namespace. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment