Skip to content

Instantly share code, notes, and snippets.

@tdrkDev
Created December 30, 2021 19:41
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tdrkDev/b6a34d5f30fca8ba4bec3b8f0d37cdcf to your computer and use it in GitHub Desktop.
Save tdrkDev/b6a34d5f30fca8ba4bec3b8f0d37cdcf to your computer and use it in GitHub Desktop.
--------- beginning of main
03-03 02:24:08.327 413 413 W auditd : type=2000 audit(0.0:1): initialized
03-03 02:24:11.643 413 413 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
03-03 02:24:11.665 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
03-03 02:24:11.823 1 1 I init : type=1400 audit(0.0:4): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
03-03 02:24:11.823 412 412 I kworker/u16:2: type=1400 audit(0.0:5): avc: denied { execute } for name="busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.823 412 412 I kworker/u16:2: type=1400 audit(0.0:6): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.832 413 413 I init : type=1400 audit(0.0:7): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.833 413 413 I logd : type=1400 audit(0.0:8): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.834 413 413 I logd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sbin/logd" dev="rootfs" ino=14432 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.834 413 413 I logd : type=1400 audit(0.0:10): avc: denied { open } for path="/sbin/libsysutils.so" dev="rootfs" ino=14410 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
03-03 02:24:11.891 436 437 I adbd : initializing functionfs
03-03 02:24:11.891 436 437 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
03-03 02:24:11.891 436 437 I adbd : functionfs successfully initialized
03-03 02:24:11.892 436 437 I adbd : registering usb transport
03-03 02:24:11.892 436 439 E cutils-trace: Error opening trace file: No such file or directory (2)
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:12): avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone0/temp" dev="sysfs" ino=21331 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:13): avc: denied { write } for name="brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
03-03 02:24:11.917 415 415 I recovery: type=1400 audit(0.0:14): avc: denied { open } for path="/sys/devices/platform/soc/1a00000.qcom,mdss_mdp/1a00000.qcom,mdss_mdp:qcom,mdss_fb_primary/leds/lcd-backlight/brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
03-03 02:24:11.927 441 441 I date : type=1400 audit(0.0:15): avc: denied { sys_time } for capability=25 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
11-21 12:06:13.279 415 415 I recovery: type=1400 audit(0.0:16): avc: denied { execmem } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=process permissive=1
11-21 12:06:13.279 415 415 I recovery: type=1400 audit(0.0:17): avc: denied { execute } for path="/dev/ashmem" dev="tmpfs" ino=17118 scontext=u:r:recovery:s0 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1
11-21 12:06:13.281 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x79080873c0:0x7908087784] in 127708 ns
11-21 12:06:13.545 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A01_00000000 [ 69 ipp] (113 ins) at [0x7908087790:0x7908087954] in 83438 ns
11-21 12:06:13.639 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A08_00000000 [ 69 ipp] (116 ins) at [0x7908087960:0x7908087b30] in 72292 ns
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:18): avc: denied { write } for name="etc" dev="rootfs" ino=13134 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:19): avc: denied { add_name } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
11-21 12:06:13.655 415 415 I recovery: type=1400 audit(0.0:20): avc: denied { create } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
12-30 19:19:46.187 415 415 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb
12-30 19:19:46.195 457 457 D QSEECOMD: : qseecom listener services process entry PPID = 1
12-30 19:19:46.195 457 457 E QSEECOMD: : Listener: index = 0, hierarchy = 0
12-30 19:19:46.196 457 457 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
12-30 19:19:46.196 457 457 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
12-30 19:19:46.196 457 457 I rpmb_emmc: RPMB Mult (512-bytes sector) = 8192, Rel_sec_cnt = 32
12-30 19:19:46.196 457 457 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
12-30 19:19:46.196 457 457 D QSEECOMD: : Init rpmb_init_service ret = 0
12-30 19:19:46.196 457 457 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
12-30 19:19:46.196 457 457 E QSEECOMD: : Listener: index = 1, hierarchy = 0
12-30 19:19:46.196 457 457 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
12-30 19:19:46.196 457 457 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
12-30 19:19:46.198 458 458 D QSEECOMD: : Init rpmb_start ret = 0
12-30 19:19:46.199 458 458 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192)
12-30 19:19:46.199 458 458 E QSEECOMD: : Listener: index = 1, hierarchy = 1
12-30 19:19:46.199 458 458 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
12-30 19:19:46.199 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds
12-30 19:19:46.199 458 458 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000
12-30 19:19:46.199 458 458 D QSEECOMD: : Init ssd_start ret = 0
12-30 19:19:46.199 458 458 D QSEECOMD: : SSD system services: Started (Listener ID = 12288)
12-30 19:19:46.199 458 458 E QSEECOMD: : Listener: index = 2, hierarchy = 1
12-30 19:19:46.200 458 458 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed....
12-30 19:19:46.200 458 458 E QSEECOMD: : Listener: index = 3, hierarchy = 1
12-30 19:19:46.200 458 458 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
12-30 19:19:46.200 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds
12-30 19:19:46.200 458 458 D DrmLibTime: QSEE Time Listener: atime_start
12-30 19:19:46.200 458 458 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000
12-30 19:19:46.201 458 458 D DrmLibTime: registering fs service to QSEECom is done!
12-30 19:19:46.201 458 458 D DrmLibTime: begin to create a thread!
12-30 19:19:46.201 458 458 D DrmLibTime: Creating a pthread in atime_start is done! return 0
12-30 19:19:46.201 458 458 D QSEECOMD: : Init atime_start ret = 0
12-30 19:19:46.201 458 458 D QSEECOMD: : time services: Started (Listener ID = 11)
12-30 19:19:46.201 458 458 E QSEECOMD: : Listener: index = 4, hierarchy = 1
12-30 19:19:46.201 458 461 D DrmLibTime: QSEE Time Listener: dispatch
12-30 19:19:46.201 458 461 D DrmLibTime: before calling ioctl to read the next time_cmd
12-30 19:19:46.201 458 458 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
12-30 19:19:46.201 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds
12-30 19:19:46.201 458 458 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000
12-30 19:19:46.201 458 458 D QSEECOMD: : Init fs_start ret = 0
12-30 19:19:46.201 458 458 D QSEECOMD: : file system services: Started (Listener ID = 10)
12-30 19:19:46.201 458 458 E QSEECOMD: : Listener: index = 5, hierarchy = 1
12-30 19:19:46.201 458 458 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
12-30 19:19:46.201 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds
12-30 19:19:46.201 458 458 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000
12-30 19:19:46.203 458 458 D QSEECOMD: : Init gpfs_start ret = 0
12-30 19:19:46.203 458 458 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672)
12-30 19:19:46.203 458 458 E QSEECOMD: : Listener: index = 6, hierarchy = 1
12-30 19:19:46.203 458 458 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds
12-30 19:19:46.203 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds
--------- beginning of system
12-30 19:19:46.204 458 464 I QISL : QSEE Interrupt Service Listener Thread is started
12-30 19:19:46.204 458 464 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
12-30 19:19:46.204 458 464 I QISL : QSEE Interrupt Service Listener was activated successfully
12-30 19:19:46.204 458 458 D QSEECOMD: : Init qisl_start ret = 0
12-30 19:19:46.204 458 458 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
12-30 19:19:46.204 458 458 E QSEECOMD: : Listener: index = 7, hierarchy = 1
12-30 19:19:46.204 458 458 E QSEECOMD: : Init dlopen(libspl.so, RLTD_NOW) is failed....
12-30 19:19:46.204 458 458 E QSEECOMD: : Listener: index = 8, hierarchy = 1
12-30 19:19:46.205 458 458 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds
12-30 19:19:46.205 458 458 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds
12-30 19:19:46.205 458 458 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000
12-30 19:19:46.205 458 458 D QSEECOMD: : Init gp_reqcancel_start ret = 0
12-30 19:19:46.205 458 458 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352)
12-30 19:19:46.206 458 458 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x400
12-30 19:19:46.206 458 458 D QSEECOMAPI: App is not loaded in QSEE
12-30 19:19:46.206 458 458 E QSEECOMAPI: Error::Cannot open the file /firmware/image/keymaste.mdt errno = 2
12-30 19:19:46.206 458 458 E QSEECOMAPI: Error::Loading image failed with ret = -1
12-30 19:19:46.206 458 458 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x400
12-30 19:19:46.206 458 458 D QSEECOMAPI: App is already loaded QSEE and app id = 65537
12-30 19:19:46.206 458 458 D QSEECOMD: : QSEECOM DAEMON RUNNING
12-30 19:19:47.733 415 415 I recovery: type=1400 audit(0.0:44): avc: denied { create } for name="system" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
12-30 19:19:48.353 415 415 I recovery: type=1400 audit(0.0:45): avc: denied { module_request } for kmod="fs-auto" scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
12-30 19:19:48.354 471 471 I kworker/u16:3: type=1400 audit(0.0:46): avc: denied { execute } for name="busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
12-30 19:19:48.354 471 471 I kworker/u16:3: type=1400 audit(0.0:47): avc: denied { execute_no_trans } for path="/sbin/busybox" dev="rootfs" ino=13203 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
12-30 19:19:48.896 415 415 I recovery: type=1400 audit(0.0:48): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1
12-30 19:19:48.896 415 415 I recovery: type=1400 audit(0.0:49): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1
12-30 19:19:48.950 479 479 I rm : type=1400 audit(0.0:50): avc: denied { unlink } for name="setprop" dev="rootfs" ino=14532 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
12-30 19:19:49.038 476 476 I foxstart.sh: type=1400 audit(0.0:51): avc: denied { append } for name="orangefox.cfg" dev="rootfs" ino=18716 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
12-30 19:19:49.039 500 500 I resetprop: type=1400 audit(0.0:52): avc: denied { write } for name="properties_serial" dev="tmpfs" ino=17898 scontext=u:r:recovery:s0 tcontext=u:object_r:properties_serial:s0 tclass=file permissive=1
12-30 19:19:49.039 500 500 I resetprop: type=1400 audit(0.0:53): avc: denied { write } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=17858 scontext=u:r:recovery:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1
12-30 19:19:50.165 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010102_00008002_00000000 [192 ipp] (238 ins) at [0x7908087b40:0x7908087ef8] in 87239 ns
12-30 19:19:51.957 415 415 I recovery: type=1400 audit(0.0:59): avc: denied { read } for name="orangefox.cfg" dev="tmpfs" ino=18784 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file permissive=1
12-30 19:19:52.615 415 415 I recovery: type=1400 audit(0.0:60): avc: denied { getattr } for path="/vndservice_contexts" dev="rootfs" ino=13985 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1
12-30 19:19:52.615 415 415 I recovery: type=1400 audit(0.0:61): avc: denied { getattr } for path="/vendor_service_contexts" dev="rootfs" ino=13984 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1
12-30 19:19:52.616 415 415 I recovery: type=1400 audit(0.0:62): avc: denied { getattr } for path="/vendor_seapp_contexts" dev="rootfs" ino=13983 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1
12-30 19:19:52.616 415 415 I recovery: type=1400 audit(0.0:63): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13981 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:67): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=17835 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:68): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=17835 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:69): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=17837 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:70): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=17837 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1
12-30 19:19:54.492 415 415 I recovery: type=1400 audit(0.0:71): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=17840 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:135): avc: denied { read } for name="capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:136): avc: denied { open } for path="/sys/devices/platform/soc/200f000.qcom,spmi/spmi-0/spmi0-02/200f000.qcom,spmi:qcom,pmi8950@2:qcom,qpnp-smbcharger/power_supply/battery/capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
12-30 19:19:58.742 415 415 I recovery: type=1400 audit(0.0:137): avc: denied { getattr } for path="/sys/devices/platform/soc/200f000.qcom,spmi/spmi-0/spmi0-02/200f000.qcom,spmi:qcom,pmi8950@2:qcom,qpnp-smbcharger/power_supply/battery/capacity" dev="sysfs" ino=34432 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
12-30 19:19:58.777 415 415 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x7908087f00:0x7908088078] in 105834 ns
12-30 19:20:01.139 415 415 I recovery: type=1400 audit(0.0:138): avc: denied { read } for name="mmcblk0p53" dev="sysfs" ino=36465 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
12-30 19:20:01.139 415 415 I recovery: type=1400 audit(0.0:139): avc: denied { open } for path="/sys/devices/platform/soc/7824900.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p53" dev="sysfs" ino=36465 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
12-30 19:20:01.144 415 415 I ArmToArm64Assembler: generated scanline__00000077:03010101_00000A02_00000000 [ 26 ipp] (73 ins) at [0x7908088080:0x79080881a4] in 68802 ns
12-30 19:20:01.280 582 582 D : HW based disk encryption is enabled
12-30 19:20:01.745 582 582 D vndksupport: Loading /vendor/lib64/hw/keystore.msm8953.so from current namespace instead of sphal namespace.
12-30 19:20:31.280 415 415 I recovery: type=1400 audit(0.0:140): avc: denied { kill } for capability=5 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
12-30 19:20:45.548 415 415 I recovery: type=1400 audit(0.0:141): avc: denied { fsetid } for capability=4 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:142): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:143): avc: denied { read } for name="twadbfifo" dev="tmpfs" ino=19001 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
12-30 19:20:45.646 415 415 I recovery: type=1400 audit(0.0:144): avc: denied { open } for path="/tmp/twadbfifo" dev="tmpfs" ino=19001 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1
12-30 19:20:45.648 415 415 I recovery: type=1400 audit(0.0:145): avc: denied { unlink } for name="orsin" dev="rootfs" ino=16354 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=fifo_file permissive=1
12-30 19:21:02.339 592 593 I adbd : initializing functionfs
12-30 19:21:02.339 592 593 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
12-30 19:21:02.345 592 593 I adbd : functionfs successfully initialized
12-30 19:21:02.345 592 593 I adbd : registering usb transport
12-30 19:21:02.346 592 594 E cutils-trace: Error opening trace file: No such file or directory (2)
12-30 19:21:02.743 598 599 I adbd : initializing functionfs
12-30 19:21:02.743 598 599 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
12-30 19:21:02.744 598 599 I adbd : functionfs successfully initialized
12-30 19:21:02.744 598 599 I adbd : registering usb transport
12-30 19:21:02.744 598 600 E cutils-trace: Error opening trace file: No such file or directory (2)
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:146): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:147): avc: denied { open } for path="/dev/mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
12-30 19:21:03.526 597 597 I recovery: type=1400 audit(0.0:148): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=16247 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
12-30 19:21:03.527 597 597 I recovery: type=1400 audit(0.0:149): avc: denied { read } for name="/" dev="mmcblk1p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1
12-30 19:21:03.527 597 597 I recovery: type=1400 audit(0.0:150): avc: denied { open } for path="/sdcard1" dev="mmcblk1p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1
12-30 19:21:03.544 597 597 I recovery: type=1400 audit(0.0:151): avc: denied { getattr } for path="/sdcard1/recovery.log" dev="mmcblk1p1" ino=66 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1
12-30 19:22:02.839 415 415 I recovery: type=1400 audit(0.0:152): avc: denied { write } for name="brightness" dev="sysfs" ino=29660 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
12-30 19:23:11.649 77 77 I kworker/u16:1: type=1400 audit(0.0:153): avc: denied { kill } for capability=5 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=1
12-30 19:23:19.530 597 597 I recovery: type=1400 audit(0.0:154): avc: denied { ioctl } for path="/dev/mtp_usb" dev="tmpfs" ino=16247 ioctlcmd=0x4d03 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
12-30 19:20:01.281 582 582 D : HW based disk encryption is enabled
12-30 19:40:15.730 743 743 D : HW based disk encryption is enabled
12-30 19:40:16.177 743 743 D vndksupport: Loading /vendor/lib64/hw/keystore.msm8953.so from current namespace instead of sphal namespace.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment