Skip to content

Instantly share code, notes, and snippets.

😈

Andrew andrwgldmn

😈
View GitHub Profile
View g
ANDROID_LOG_MUCH_COUNT =
AUTO_ADD_GLOBAL_DEFINE_BY_NAME = CUSTOM_KERNEL_PDR_SENSOR MTK_EMBMS_SUPPORT MTK_16X_SLOWMOTION_VIDEO_SUPPORT MTK_SIM_LOCK_POWER_ON_WRITE_PROTECT MTK_CROSSMOUNT_MULTI_CH_SUPPORT MTK_MULTIPLE_TDLS_SUPPORT MTK_MODEM_MONITOR_SUPPORT MTK_BT_BLUEDROID_AVRCP_TG_16 MTK_CROSSMOUNT_SUPPORT CUSTOM_KERNEL_ANSWER_CALL_SENSOR MTK_CAM_STEREO_DENOISE_SUPPORT CUSTOM_KERNEL_UNCALI_MAG_SENSOR CUSTOM_KERNEL_UNCALI_GYRO_SENSOR MTK_BLULIGHT_DEFENDER_SUPPORT MTK_LCM_DEVICE_TREE_SUPPORT MTK_BT_BLUEDROID_A2DP_APTX MTK_NVCONFIG_PARTITION_SUPPORT MTK_BT_BLUEDROID_HFP_AG_17 MTK_AURISYS_PHONE_CALL_SUPPORT MTK_HEADSET_ACTIVE_NOISE_CANCELLATION MTK_DYNAMIC_SBP_SUPPORT MTK_FACTORY_GAMMA_SUPPORT MTK_VT3G324M_SUPPORT MTK_ECCCI_C2K MTK_WFC_SUPPORT MTK_BT_BLUEDROID_AVRCP_TG_15 MTK_BT_BLUEDROID_PLUS MTK_CAM_VSDOF_SUPPORT MTK_EXTERNAL_SIM_SUPPORT MTK_EFUSE_WRITER_SUPPORT MTK_FACTORY_MODE_IN_GB2312 MTK_A1_FEATURE MTK_AUDIO_TUNNELING_SUPPORT CUSTOM_KERNEL_HEART_RATE_SENSOR CUSTOM_KERNEL_SENSORHUB CUSTOM_KERNEL_TILT_DETECTOR
View stock log
This file has been truncated, but you can view the full file.
--------- beginning of radio
I/ ( 406): [terserver] service not enabled. exit.
I/ccci_mdinit( 403): MD1 set status: mtk.md1.status=init
I/ccci_mdinit( 403): MD1 set status: mtk.md1.status=reset
I/ccci_mdinit( 403): MD1 set status: mtk.md1.status=bootup
I/ccci_mdinit( 403): MD1 set status: mtk.md1.status=ready
E/RILMUXD ( 1093): 3727:main(): Enter
E/RILMUXD ( 1093): 3904:main(): /vendor/bin/gsm0710muxd $Rev: 1 $ starting
D/PhoneNumberUtils( 632): PhoneNumberUtils init: sIsCtaSupport: false, sIsCtaSet: false, sIsC2kSupport: false, sIsOP09Support: false, sPhoneNumberExt: null
View out
/(system\/vendor|vendor)/bin/pq u:object_r:pq_exec:s0/(system\/vendor|vendor)/bin/sn u:object_r:sn_exec:s0/(system\/vendor|vendor)/bin/aal u:object_r:aal_exec:s0/(system\/vendor|vendor)/bin/rda u:object_r:rda_exec:s0/(system\/vendor|vendor)/bin/mmp u:object_r:mmp_exec:s0/(system\/vendor|vendor)/bin/matv u:object_r:matv_exec:s0/(system\/vendor|vendor)/bin/slpd u:object_r:slpd_exec:s0/(system\/vendor|vendor)/bin/ipod u:object_r:ipod_exec:s0/(system\/vendor|vendor)/bin/atcp u:object_r:atcp_exec:s0/(system\/vendor|vendor)/bin/wfca u:object_r:wfca_exec:s0/(system\/vendor|vendor)/bin/mnld u:object_r:mnld_exec:s0/(system\/vendor|vendor)/bin/dmlog u:object_r:dmlog_exec:s0/(system\/vendor|vendor)/bin/s62xd u:object_r:s62xd_exec:s0/(system\/vendor|vendor)/bin/mbimd u:object_r:mbimd_exec:s0/(system\/vendor|vendor)/bin/ipsec u:object_r:ipsec_exec:s0/(system\/vendor|vendor)/xbin/MPED u:object_r:MPED_exec:s0/(system\/vendor|vendor)/bin/atcid u:object_r:atcid_exec:s0/(system\/vendor|vendor)/bin/gmadfs u:object_r:gmadfs_exec
View вх,вых
вх:
/(system\/vendor|vendor)/etc/sensor(/.*)? u:object_r:system_sensor_data_file:s0
вых:
type system_sensor_data_file, data_file_type;
type system_sensor_data_file, file_type;
а нужно:
type system_sensor_data_file, data_file_type, file_type;
View зфкыук
#! /usr/bin/env python
# -*- coding: utf-8 -*-
import re
value = None
while value != 0:
print (' ----------------------------')
value = int(input(" Choose category: \n \n 0) Exit \n 1) Parsing property_contexts \n 2) Parsing file_contexts \n 3) Parsing service_contexts \n ---------------------------- \n "))
if (value == 0):
print('-' * 28 + '\n Thanks!\n' + '-' * 28)
elif (value == 1):
View stack
#line 1 "device/mediatek/common/sepolicy/basic/property_contexts"
# ==============================================
# MTK Policy Rule
# ==============================================
#=============allow ccci_mdinit to start gsm0710muxd==============
ctl.gsm0710muxd u:object_r:ctl_gsm0710muxd_prop:s0
ctl.gsm0710muxd-s u:object_r:ctl_gsm0710muxd-s_prop:s0
ctl.gsm0710muxd-d u:object_r:ctl_gsm0710muxd-d_prop:s0
ctl.gsm0710muxdmd2 u:object_r:ctl_gsm0710muxdmd2_prop:s0
View rilp
--------- beginning of system
I/vold ( 325): Vold 3.0 (the awakening) firing up
V/vold ( 325): Detected support for: exfat ext4 ntfs vfat
D/vold ( 325): e4crypt_init_user0
D/vold ( 325): e4crypt_prepare_user_storage for volume null, user 0, serial 0, flags 1
D/vold ( 325): Preparing: /data/system/users/0
D/vold ( 325): Preparing: /data/misc/profiles/cur/0
D/vold ( 325): Preparing: /data/misc/profiles/cur/0/foreign-dex
D/vold ( 325): Preparing: /data/system_de/0
D/vold ( 325): Preparing: /data/misc_de/0
View tad
This file has been truncated, but you can view the full file.
--------- beginning of events
I/auditd ( 311): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
I/auditd ( 1): type=1400 audit(0.0:3): avc: denied { module_request } for comm="init" kmod="fs-cpuset" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
I/auditd ( 1): type=1400 audit(0.0:4): avc: denied { write } for comm="init" name="mmcblk0p1" dev="tmpfs" ino=2583 scontext=u:r:init:s0 tcontext=u:object_r:tad_block_device:s0 tclass=blk_file permissive=1
I/auditd ( 1): type=1400 audit(0.0:5): avc: denied { setattr } for comm="init" name="mmcblk0p1" dev="tmpfs" ino=2583 scontext=u:r:init:s0 tcontext=u:object_r:tad_block_device:s0 tclass=blk_file permissive=1
I/auditd ( 269): type=1400 audit(0.0:6): avc: denied { entrypoint } for comm="init" path="/sbin/wait4tad_static" dev="rootfs" ino=4178 scontext=u:r:tad:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
View with_sim_2019
This file has been truncated, but you can view the full file.
--------- beginning of events
I/auditd ( 309): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
--------- beginning of system
I/vold ( 320): Vold 3.0 (the awakening) firing up
V/vold ( 320): Detected support for: exfat ext4 ntfs vfat
D/vold ( 320): e4crypt_init_user0
D/vold ( 320): e4crypt_prepare_user_storage for volume null, user 0, serial 0, flags 1
D/vold ( 320): Preparing: /data/system/users/0
D/vold ( 320): Preparing: /data/misc/profiles/cur/0
View without_sim_2019
This file has been truncated, but you can view the full file.
--------- beginning of events
I/auditd ( 310): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
--------- beginning of system
I/vold ( 321): Vold 3.0 (the awakening) firing up
V/vold ( 321): Detected support for: exfat ext4 ntfs vfat
V/vold ( 321): /system/bin/sgdisk
V/vold ( 321): --android-dump
V/vold ( 321): /dev/block/vold/disk:179_128
D/vold ( 321): e4crypt_init_user0
You can’t perform that action at this time.