Skip to content

Instantly share code, notes, and snippets.

@Celoxocis
Created July 13, 2018 15:52
Show Gist options
  • Save Celoxocis/ffe9194984ea00e629a21aa0ce65889a to your computer and use it in GitHub Desktop.
Save Celoxocis/ffe9194984ea00e629a21aa0ce65889a to your computer and use it in GitHub Desktop.
08-25 13:53:54.319 300 300 I auditd : type=1400 audit(0.0:4): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.319 300 300 I auditd : type=1400 audit(0.0:5): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.359 300 300 I auditd : type=1400 audit(0.0:6): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.359 300 300 I auditd : type=1400 audit(0.0:7): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.387 300 300 I auditd : type=1400 audit(0.0:8): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.387 300 300 I auditd : type=1400 audit(0.0:9): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.395 300 300 I auditd : type=1400 audit(0.0:10): avc: denied { dac_override } for comm="kworker/u16:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
08-25 13:53:54.395 300 300 I auditd : type=1400 audit(0.0:11): avc: denied { dac_read_search } for comm="kworker/u16:5" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:44.538 405 405 I auditd : type=1400 audit(0.0:12): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0
07-13 17:36:44.558 405 405 I auditd : type=1400 audit(0.0:19): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0
07-13 17:36:44.566 424 424 I auditd : type=1400 audit(0.0:20): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0
07-13 17:36:44.574 424 424 I auditd : type=1400 audit(0.0:27): avc: denied { search } for comm="rmt_storage" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0
07-13 17:36:47.294 352 352 I auditd : type=1400 audit(0.0:28): avc: denied { search } for comm="psensord" name="oppoVersion" dev="proc" ino=4026542835 scontext=u:r:sensor_init:s0 tcontext=u:object_r:oppo_ver_proc:s0 tclass=dir permissive=0
07-13 17:36:53.506 445 445 I auditd : type=1400 audit(0.0:29): avc: denied { create } for comm="rild" name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.506 445 445 W rild : type=1400 audit(0.0:29): avc: denied { create } for name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.510 445 445 I auditd : type=1400 audit(0.0:30): avc: denied { create } for comm="rild" name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.510 445 445 W rild : type=1400 audit(0.0:30): avc: denied { create } for name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.514 445 445 I auditd : type=1400 audit(0.0:31): avc: denied { create } for comm="rild" name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.514 445 445 W rild : type=1400 audit(0.0:31): avc: denied { create } for name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:32): avc: denied { create } for comm="rild" name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:32): avc: denied { create } for name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:33): avc: denied { create } for comm="rild" name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:33): avc: denied { create } for name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.518 445 445 I auditd : type=1400 audit(0.0:34): avc: denied { write } for comm="rild" name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
07-13 17:36:53.518 445 445 W rild : type=1400 audit(0.0:34): avc: denied { write } for name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
07-13 17:36:53.532 350 426 I OMXMaster: makeComponentInstance(OMX.qcom.video.decoder.avc) in android.hardwar process
07-13 17:36:53.562 446 446 I auditd : type=1400 audit(0.0:35): avc: denied { create } for comm="rild" name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.562 446 446 W rild : type=1400 audit(0.0:35): avc: denied { create } for name="4678" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.566 446 446 I auditd : type=1400 audit(0.0:36): avc: denied { create } for comm="rild" name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.566 446 446 W rild : type=1400 audit(0.0:36): avc: denied { create } for name="447" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.574 446 446 I auditd : type=1400 audit(0.0:37): avc: denied { create } for comm="rild" name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.574 446 446 W rild : type=1400 audit(0.0:37): avc: denied { create } for name="6855" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.578 446 446 I auditd : type=1400 audit(0.0:38): avc: denied { create } for comm="rild" name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.578 446 446 W rild : type=1400 audit(0.0:38): avc: denied { create } for name="50049" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.582 446 446 I auditd : type=1400 audit(0.0:39): avc: denied { create } for comm="rild" name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.582 446 446 W rild : type=1400 audit(0.0:39): avc: denied { create } for name="6853" scontext=u:r:rild:s0 tcontext=u:object_r:nv_data_file:s0 tclass=file permissive=0
07-13 17:36:53.582 446 446 I auditd : type=1400 audit(0.0:40): avc: denied { write } for comm="rild" name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
07-13 17:36:53.582 446 446 W rild : type=1400 audit(0.0:40): avc: denied { write } for name="/" dev="mmcblk0p26" ino=2 scontext=u:r:rild:s0 tcontext=u:object_r:cache_file:s0 tclass=dir permissive=0
07-13 17:36:53.681 350 426 I OMX-VDEC-1080P: component_init: OMX.qcom.video.decoder.avc : fd=7
07-13 17:36:53.706 350 426 E OMXNodeInstance: getParameter(0xef7e8044:qcom.decoder.avc, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019)
07-13 17:36:53.706 350 426 E OMXNodeInstance: getParameter(0xef7e8044:qcom.decoder.avc, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019)
07-13 17:36:53.707 350 2186 E OMXNodeInstance: getExtensionIndex(0xef7e8044:qcom.decoder.avc, OMX.google.android.index.configureVideoTunnelMode) ERROR: NotImplemented(0x80001006)
07-13 17:36:53.712 350 350 I OMXMaster: makeComponentInstance(OMX.qcom.video.decoder.avc.secure) in android.hardwar process
07-13 17:36:53.713 350 350 I OMX-VDEC-1080P: component_init: OMX.qcom.video.decoder.avc : fd=7
07-13 17:36:53.737 350 350 E OMXNodeInstance: getParameter(0xef7e8184:qcom.decoder.avc.secure, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019)
07-13 17:36:53.738 350 350 E OMXNodeInstance: getParameter(0xef7e8184:qcom.decoder.avc.secure, ??(0x7f000044)) ERROR: UnsupportedSetting(0x80001019)
07-13 17:36:53.739 350 426 E OMXNodeInstance: getExtensionIndex(0xef7e8184:qcom.decoder.avc.secure, OMX.google.android.index.configureVideoTunnelMode) ERROR: NotImplemented(0x80001006)
07-13 17:36:53.973 350 2186 I OMXMaster: makeComponentInstance(OMX.qcom.video.encoder.avc) in android.hardwar process
07-13 17:36:53.994 350 2186 I OMX-VENC: Component_init : OMX.qcom.video.encoder.avc : return = 0x0
07-13 17:36:55.170 37 37 I auditd : type=1400 audit(0.0:41): avc: denied { dac_override } for comm="kworker/4:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:55.170 37 37 W kworker/4:1: type=1400 audit(0.0:41): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:55.170 37 37 I auditd : type=1400 audit(0.0:42): avc: denied { dac_read_search } for comm="kworker/4:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:55.170 37 37 W kworker/4:1: type=1400 audit(0.0:42): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:58.274 2154 2154 I auditd : type=1400 audit(0.0:43): avc: denied { getattr } for comm="ndroid.systemui" path="/data/user_de/0/com.android.phone" dev="mmcblk0p37" ino=1425497 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_data_file:s0 tclass=dir permissive=0
07-13 17:36:58.274 2154 2154 W ndroid.systemui: type=1400 audit(0.0:43): avc: denied { getattr } for path="/data/user_de/0/com.android.phone" dev="mmcblk0p37" ino=1425497 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_data_file:s0 tclass=dir permissive=0
07-13 17:36:59.058 44 44 I auditd : type=1400 audit(0.0:44): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.058 44 44 W kworker/u16:1: type=1400 audit(0.0:44): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.058 44 44 I auditd : type=1400 audit(0.0:45): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.058 44 44 W kworker/u16:1: type=1400 audit(0.0:45): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.138 44 44 I auditd : type=1400 audit(0.0:46): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.138 44 44 W kworker/u16:1: type=1400 audit(0.0:46): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.138 44 44 I auditd : type=1400 audit(0.0:47): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.138 44 44 W kworker/u16:1: type=1400 audit(0.0:47): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.158 44 44 I auditd : type=1400 audit(0.0:48): avc: denied { dac_override } for comm="kworker/u16:1" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.158 44 44 W kworker/u16:1: type=1400 audit(0.0:48): avc: denied { dac_override } for capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.158 44 44 I auditd : type=1400 audit(0.0:49): avc: denied { dac_read_search } for comm="kworker/u16:1" capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:36:59.158 44 44 W kworker/u16:1: type=1400 audit(0.0:49): avc: denied { dac_read_search } for capability=2 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:50): avc: denied { execute } for comm="system_server" path="/data/dalvik-cache/arm64/system@app@AntHalService@AntHalService.apk@classes.dex" dev="mmcblk0p37" ino=688362 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:51): avc: denied { execute } for comm="system_server" path="/data/dalvik-cache/arm64/system@app@AntHalService@AntHalService.apk@classes.dex" dev="mmcblk0p37" ino=688362 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0
07-13 17:37:12.044 1013 1013 I auditd : type=1400 audit(0.0:52): avc: denied { write } for comm="system_server" name="system@app@AntHalService@AntHalService.apk@classes.vdex" dev="mmcblk0p37" ino=688363 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment