-
-
Save Celoxocis/ffe9194984ea00e629a21aa0ce65889a to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
08-25 13:53:54.319 300 300 I auditd : type=1400 audit(0.0:4): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.319 300 300 I auditd : type=1400 audit(0.0:5): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.359 300 300 I auditd : type=1400 audit(0.0:6): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.359 300 300 I auditd : type=1400 audit(0.0:7): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.387 300 300 I auditd : type=1400 audit(0.0:8): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.387 300 300 I auditd : type=1400 audit(0.0:9): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.395 300 300 I auditd : type=1400 audit(0.0:10): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
08-25 13:53:54.395 300 300 I auditd : type=1400 audit(0.0:11): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:44.538 405 405 I auditd : type=1400 audit(0.0:12): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0 | |
07-13 17:36:44.558 405 405 I auditd : type=1400 audit(0.0:19): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0 | |
07-13 17:36:44.566 424 424 I auditd : type=1400 audit(0.0:20): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0 | |
07-13 17:36:44.574 424 424 I auditd : type=1400 audit(0.0:27): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0 | |
07-13 17:36:47.294 352 352 I auditd : type=1400 audit(0.0:28): avc: denied { search } for comm="psensord" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:sensor_init:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0 | |
07-13 17:36:53.506 445 445 I auditd : type=1400 audit(0.0:29): avc: denied { create } for comm="rild" name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.506 445 445 W rild : type=1400 audit(0.0:29): avc: denied { create } for name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.510 445 445 I auditd : type=1400 audit(0.0:30): avc: denied { create } for comm="rild" name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.510 445 445 W rild : type=1400 audit(0.0:30): avc: denied { create } for name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.514 445 445 I auditd : type=1400 audit(0.0:31): avc: denied { create } for comm="rild" name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.514 445 445 W rild : type=1400 audit(0.0:31): avc: denied { create } for name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:32): avc: denied { create } for comm="rild" name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:32): avc: denied { create } for name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:33): avc: denied { create } for comm="rild" name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:33): avc: denied { create } for name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:34): avc: denied { write } for comm="rild" name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0 | |
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:34): avc: denied { write } for name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0 | |
07-13 17:36:53.532 350 426 I OMXMaster: makeComponentInstance(OMX.qcom.video.decoder.avc) in android.hardwar process | |
07-13 17:36:53.562 446 446 I auditd : type=1400 audit(0.0:35): avc: denied { create } for comm="rild" name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.562 446 446 W rild : type=1400 audit(0.0:35): avc: denied { create } for name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.566 446 446 I auditd : type=1400 audit(0.0:36): avc: denied { create } for comm="rild" name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.566 446 446 W rild : type=1400 audit(0.0:36): avc: denied { create } for name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.574 446 446 I auditd : type=1400 audit(0.0:37): avc: denied { create } for comm="rild" name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.574 446 446 W rild : type=1400 audit(0.0:37): avc: denied { create } for name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.578 446 446 I auditd : type=1400 audit(0.0:38): avc: denied { create } for comm="rild" name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.578 446 446 W rild : type=1400 audit(0.0:38): avc: denied { create } for name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.582 446 446 I auditd : type=1400 audit(0.0:39): avc: denied { create } for comm="rild" name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.582 446 446 W rild : type=1400 audit(0.0:39): avc: denied { create } for name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0 | |
07-13 17:36:53.582 446 446 I auditd : type=1400 audit(0.0:40): avc: denied { write } for comm="rild" name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0 | |
07-13 17:36:53.582 446 446 W rild : type=1400 audit(0.0:40): avc: denied { write } for name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0 | |
07-13 17:36:53.681 350 426 I OMX-VDEC-1080P: component_init: OMX.qcom.video.decoder.avc : fd=7 | |
07-13 17:36:53.706 350 426 E OMXNodeInstance: getParameter(0xef7e8044:qcom.decoder.avc, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019) | |
07-13 17:36:53.706 350 426 E OMXNodeInstance: getParameter(0xef7e8044:qcom.decoder.avc, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019) | |
07-13 17:36:53.707 350 2186 E OMXNodeInstance: getExtensionIndex(0xef7e8044:qcom.decoder.avc, OMX.google.android.index.configureVideoTunnelMode) ERROR: NotImplemented(0x80001006) | |
07-13 17:36:53.712 350 350 I OMXMaster: makeComponentInstance(OMX.qcom.video.decoder.avc.secure) in android.hardwar process | |
07-13 17:36:53.713 350 350 I OMX-VDEC-1080P: component_init: OMX.qcom.video.decoder.avc : fd=7 | |
07-13 17:36:53.737 350 350 E OMXNodeInstance: getParameter(0xef7e8184:qcom.decoder.avc.secure, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019) | |
07-13 17:36:53.738 350 350 E OMXNodeInstance: getParameter(0xef7e8184:qcom.decoder.avc.secure, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019) | |
07-13 17:36:53.739 350 426 E OMXNodeInstance: getExtensionIndex(0xef7e8184:qcom.decoder.avc.secure, OMX.google.android.index.configureVideoTunnelMode) ERROR: NotImplemented(0x80001006) | |
07-13 17:36:53.973 350 2186 I OMXMaster: makeComponentInstance(OMX.qcom.video.encoder.avc) in android.hardwar process | |
07-13 17:36:53.994 350 2186 I OMX-VENC: Component_init : OMX.qcom.video.encoder.avc : return = 0x0 | |
07-13 17:36:55.170 37 37 I auditd : type=1400 audit(0.0:41): avc: denied { dac_override } for comm="kworker/4:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:55.170 37 37 W kworker/4:1: type=1400 audit(0.0:41): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:55.170 37 37 I auditd : type=1400 audit(0.0:42): avc: denied { dac_read_search } for comm="kworker/4:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:55.170 37 37 W kworker/4:1: type=1400 audit(0.0:42): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:58.274 2154 2154 I auditd : type=1400 audit(0.0:43): avc: denied { getattr } for comm="ndroid.systemui" path="/data/user_de/0/com.android.phone" dev="mmcblk0p37" ino=1425497 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_data_file:s0 tclass=dir permissive=0 | |
07-13 17:36:58.274 2154 2154 W ndroid.systemui: type=1400 audit(0.0:43): avc: denied { getattr } for path="/data/user_de/0/com.android.phone" dev="mmcblk0p37" ino=1425497 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_data_file:s0 tclass=dir permissive=0 | |
07-13 17:36:59.058 44 44 I auditd : type=1400 audit(0.0:44): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.058 44 44 W kworker/u16:1: type=1400 audit(0.0:44): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.058 44 44 I auditd : type=1400 audit(0.0:45): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.058 44 44 W kworker/u16:1: type=1400 audit(0.0:45): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.138 44 44 I auditd : type=1400 audit(0.0:46): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.138 44 44 W kworker/u16:1: type=1400 audit(0.0:46): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.138 44 44 I auditd : type=1400 audit(0.0:47): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.138 44 44 W kworker/u16:1: type=1400 audit(0.0:47): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.158 44 44 I auditd : type=1400 audit(0.0:48): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.158 44 44 W kworker/u16:1: type=1400 audit(0.0:48): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.158 44 44 I auditd : type=1400 audit(0.0:49): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:36:59.158 44 44 W kworker/u16:1: type=1400 audit(0.0:49): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0 | |
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:50): avc: denied { execute } for comm="system_server" path="/data/dalvik-cache/arm64/system@app@AntHalService@AntHalService.apk@classes.dex" dev="mmcblk0p37" ino=688362 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0 | |
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:51): avc: denied { execute } for comm="system_server" path="/data/dalvik-cache/arm64/system@app@AntHalService@AntHalService.apk@classes.dex" dev="mmcblk0p37" ino=688362 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0 | |
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:52): avc: denied { write } for comm="system_server" name="system@app@AntHalService@AntHalService.apk@classes.vdex" dev="mmcblk0p37" ino=688363 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment