如何设置SELinux 策略规则 ? 在Kernel Log 中出现"avc: denied" 要如何处理?

本文深入探讨了Android KK4.4版本后,Google引入SELinux所带来的权限管理变化,包括SELinux启用机制、权限拒绝记录、解决方法以及常见访问对象的SELinux标签细化。通过提供简化方法、按需确认方法和权限放大的处理策略,帮助开发者高效解决SELinux引发的问题,确保应用正常运行。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

[Description]
android KK 4.4 版本后,Google 默认启用了SELinux, 并会把SELinux 审查异常打印在kernel log 或者 android log(L 版本)中,对应的关键字是: "avc:  denied" 或者"avc: denied"
如一行LOG:
<5>[ 17.285600].(0)[503:idmap]type=1400 audit(1356999072.320:202): avc:  denied  { create } for  pid=503 comm="idmap" name="overlays.list" scontext=u:r:zygote:s0 tcontext=u:object_r:resource_cache_data_file:s0 tclass=file
即表明idmap 这个process, 使用zygote 的source context, 访问/data/resource_cache 目录,并创建文件时,被SELinux 拒绝访问。
 
[Keyword]
android, SELinux, avc:  denied, audit
 
[Solution]
KK 版本, Google 只有限制的启用SELinux, 即只有针对netd, installd, zygote, vold 以及它们直接fork 出的child process 使用enforcing mode, 但不包括zygote fork的普通app.
L  版本, Google 全面开启SELinux, 几乎所有的process 都使enforcing mode, 影响面非常广.
 
目前所有的SELinux check 失败,在kernel log 或者android log(L版本后)中都有对应的"avc:  denied" 或者 "avc: denied"的LOG 与之对应。反过来,有此LOG,并非就会直接失败,还需要确认当时SELinux 的模式, 是enforcing mode 还是 permissve mode.
首先, 务必确认对应进程访问系统资源是否正常, 是否有必要 ?如果本身是异常非法访问,那么就要自行消除访问。
其次, 如果确认访问是必要,并且正常的,那么就要对对应的process/domain 增加新的policy.

1). 简化方法
 1.1 提取所有的avc LOG.   如 adb shell "cat /proc/kmsg | grep avc" > avc_log.txt
 1.2 使用 audit2allow tool 直接生成policy. audit2allow -i avc_log.txt  即可自动输出生成的policy
 1.3 将对应的policy 添加到selinux policy 规则中,对应MTK Solution, 您可以将它们添加在KK: mediatek/custom/common/sepolicy, L: device/mediatek/common/sepolicy 下面,如
  allow zygote resource_cache_data_file:dir rw_dir_perms;
  allow zygote resource_cache_data_file:file create_file_perms;
  ===> mediatek/custom/common/sepolicy/zygote.te (KK)
  ===> device/mediatek/common/sepolicy/zygote.te (L)
 注意audit2allow 它自动机械的帮您将LOG 转换成policy, 而无法知道你操作的真实意图,有可能出现权限放大问题。
 
2). 按需确认方法
 此方法需要工程人员对SELinux 基本原理,以及SELinux Policy Language 有了解. 
 2.1 确认是哪个进程访问哪个资源,具体需要哪些访问权限,read ? write ? exec ? create ? search ?
 2.2 当前进程是否已经创建了policy 文件? 通常是process 的执行档.te,如果没有,并且它的父进程即source context 无须访问对应的资源,则创建新的te 文件.
     在L 版本上, Google 要求维护关键 security context 的唯一性, 比如严禁zygote, netd, installd, vold, ueventd 等关键process 与其它process 共享同一个security context.
 2.3 创建文件后,关联它的执行档,在file_contexts 中, 关联相关的执行档.
  比如 /system/bin/idmap 则是 /system/bin/idmap u:object_r:idmap_exec:s0
 2.4 填写policy 到相关的te 文件中
  如果沿用原来父进程的te 文件,则直接添加.
  如果是新的文件,那么首先:
  #==============================================
  # Type Declaration
  #==============================================
  type idmap, domain;
  type idmap_exec, exec_type, file_type;
  
  #==============================================
  # Android Policy Rule
  #==============================================
  #permissive idmap;
  domain_auto_trans(zygote, idmap_exec, idmap);
  
  然后添加新的policy
  
  # new policy
  allow idmap resource_cache_data_file:dir rw_dir_perms;
  allow idmap resource_cache_data_file:file create_file_perms;
 
3). 权限放大情况处理
  如果直接按照avc: denied 的LOG 转换出SELinux Policy, 往往会产生权限放大问题. 比如因为要访问某个device, 在这个device 没有细化SELinux Label 的情况下, 可能出现:
  <7>[11281.586780] avc:  denied { read write } for pid=1217 comm="mediaserver" name="tfa9897" dev="tmpfs" ino=4385 scontext=u:r:mediaserver:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0
  如果直接按照此LOG 转换出SELinux Policy:  allow mediaserver device:chr_file {read write};  那么就会放开mediaserver 读写所有device 的权限. 而Google 为了防止这样的情况, 使用了neverallow 语句来约束, 这样你编译sepolicy 时就无法编译通过.
  为了规避这种权限放大情况, 我们需要细化访问目标(Object) 的SELinux Label, 做到按需申请. 通常会由三步构成
  3.1 定义相关的SELinux type.
   比如上述案例, 在 device/mediatek/common/sepolicy/device.te 添加
   type tfa9897_device, dev_type;
  3.2 绑定文件与SELinux type.
   比如上述案例, 在 device/mediatek/common/sepolicy/file_contexts 添加
   /dev/tfa9897(/.*)? u:object_r:tfa9897_device:s0
  3.3 添加对应process/domain 的访问权限.
   比如上述案例, 在 device/mediatek/common/sepolicy/mediaserver.te 添加
   allow mediaserver tfa9897_device:chr_file { open read write };
 
  那么哪些访问对象通常会遇到此类呢?(以L 版本为例)
    * device  
  -- 类型定义: external/sepolicy/device.te;device/mediatek/common/sepolicy/device.te 
  -- 类型绑定: external/sepolicy/file_contexts;device/mediatek/common/sepolicy/file_contexts
  
  * File 类型: 
  -- 类型定义: external/sepolicy/file.te;device/mediatek/common/sepolicy/file.te
  -- 绑定类型: external/sepolicy/file_contexts;device/mediatek/common/sepolicy/file_contexts
 
  * 虚拟File 类型: 
  -- 类型定义: external/sepolicy/file.te;device/mediatek/common/sepolicy/file.te
  -- 绑定类型: external/sepolicy/genfs_contexts;device/mediatek/common/sepolicy/genfs_contexts
 
  * Service 类型:
  -- 类型定义: external/sepolicy/service.te; device/mediatek/common/sepolicy/service.te
  -- 绑定类型:external/sepolicyservice_contexts;device/mediatek/common/sepolicy/service_contexts
 
  * Property 类型:
  -- 类型定义: external/sepolicy/property.te;device/mediatek/common/sepolicy/property.te
  -- 绑定类型: external/sepolicy/property_contexts;device/mediatek/common/sepolicy/property_contexts;
 
  通常我们强烈反对更新google default 的policy, 大家可以更新mediatek 下面的相关的policy.
 
[相关FAQ]
[FAQ11414] android KK 4.4 版本后,user 版本su 权限严重被限制问题说明
[FAQ11485] 权限(Permission denied)问题如何确认是Selinux 约束引起
[FAQ11484] 如何设置确认selinux 模式
[FAQ11483] 如何快速Debug SELinux Policy 问题
01-01 00:00:11.856 1 1 I auditd : type=1400 audit(0.0:3): avc: denied { open } for comm="init" path="/dev/kmsg" dev="tmpfs" ino=5 scontext=u:r:kernel:s0 tcontext=u:object_r:tmpfs:s0 tclass=chr_file permissive=1 01-01 00:00:12.104 1 1 I auditd : type=1107 audit(0.0:5): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=ro.telephony.sim.count pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0' 01-01 00:00:12.896 1 1 I auditd : type=1107 audit(0.0:6): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=vts.native_server.on pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:vts_status_prop:s0 tclass=file permissive=0' 01-01 00:00:12.904 1 1 I auditd : type=1107 audit(0.0:7): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=vts.native_server.on pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:vts_status_prop:s0 tclass=file permissive=0' 01-01 00:00:12.908 1 1 I auditd : type=1107 audit(0.0:8): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=vts.native_server.on pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:vts_status_prop:s0 tclass=file permissive=0' 01-01 00:00:12.916 1 1 I auditd : type=1107 audit(0.0:9): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=vts.native_server.on pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:vts_status_prop:s0 tclass=file permissive=0' 01-01 00:00:13.048 1 1 I auditd : type=1107 audit(0.0:10): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=init.svc.dplanner-2-0 pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:init_service_status_private_prop:s0 tclass=file permissive=0' 01-01 00:00:13.052 1 1 I auditd : type=1107 audit(0.0:11): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=init.svc.dplanner-2-0 pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:init_service_status_private_prop:s0 tclass=file permissive=0' 01-01 00:00:14.784 325 325 I auditd : type=1400 audit(0.0:12): avc: denied { read } for comm="modprobe" name="cmdline" dev="proc" ino=4026532095 scontext=u:r:init_insmod_sh:s0 tcontext=u:object_r:proc_cmdline:s0 tclass=file permissive=0 01-01 00:00:15.708 367 367 I auditd : type=1400 audit(0.0:13): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25249 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.712 367 367 I auditd : type=1400 audit(0.0:14): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46006 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.720 367 367 I auditd : type=1400 audit(0.0:15): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45106 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.728 367 367 I auditd : type=1400 audit(0.0:16): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46726 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.732 367 367 I auditd : type=1400 audit(0.0:17): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45826 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.732 367 367 I auditd : type=1400 audit(0.0:18): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=44926 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.736 367 367 I auditd : type=1400 audit(0.0:19): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25879 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.736 367 367 I auditd : type=1400 audit(0.0:20): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46546 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.744 367 367 I auditd : type=1400 audit(0.0:21): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45646 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.760 367 367 I auditd : type=1400 audit(0.0:22): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26509 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.764 367 367 I auditd : type=1400 audit(0.0:23): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25699 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.764 367 367 I auditd : type=1400 audit(0.0:24): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46366 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.768 367 367 I auditd : type=1400 audit(0.0:25): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45466 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.772 367 367 I auditd : type=1400 audit(0.0:26): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26329 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.776 367 367 I auditd : type=1400 audit(0.0:27): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25519 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.776 367 367 I auditd : type=1400 audit(0.0:28): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46186 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.780 367 367 I auditd : type=1400 audit(0.0:29): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45286 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.784 367 367 I auditd : type=1400 audit(0.0:30): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26149 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.788 367 367 I auditd : type=1400 audit(0.0:31): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25339 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.788 367 367 I auditd : type=1400 audit(0.0:32): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46816 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.792 367 367 I auditd : type=1400 audit(0.0:33): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25159 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.792 367 367 I auditd : type=1400 audit(0.0:34): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45916 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.796 367 367 I auditd : type=1400 audit(0.0:35): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45016 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.800 367 367 I auditd : type=1400 audit(0.0:36): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25969 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.800 367 367 I auditd : type=1400 audit(0.0:37): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46636 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.804 367 367 I auditd : type=1400 audit(0.0:38): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45736 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.804 367 367 I auditd : type=1400 audit(0.0:39): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=44836 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.808 367 367 I auditd : type=1400 audit(0.0:40): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25789 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.808 367 367 I auditd : type=1400 audit(0.0:41): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46456 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.816 367 367 I auditd : type=1400 audit(0.0:42): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45556 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.824 367 367 I auditd : type=1400 audit(0.0:43): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26419 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.828 367 367 I auditd : type=1400 audit(0.0:44): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25609 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.828 367 367 I auditd : type=1400 audit(0.0:45): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46276 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.836 367 367 I auditd : type=1400 audit(0.0:46): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45376 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.840 367 367 I auditd : type=1400 audit(0.0:47): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26239 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.848 367 367 I auditd : type=1400 audit(0.0:48): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=25429 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.848 367 367 I auditd : type=1400 audit(0.0:49): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=46096 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.856 367 367 I auditd : type=1400 audit(0.0:50): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=45196 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.864 367 367 I auditd : type=1400 audit(0.0:51): avc: denied { write } for comm="binder:367_2" name="uevent" dev="sysfs" ino=26059 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_loop_recovery:s0 tclass=file permissive=0 01-01 00:00:15.912 1 1 I auditd : type=1107 audit(0.0:52): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.keymaster.optee.status pid=368 uid=1000 gid=1000 scontext=u:r:hal_keymaster_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0' 01-01 00:00:16.360 400 400 I auditd : type=1400 audit(0.0:53): avc: denied { read } for comm="e2fsck" name="mmcblk0p50" dev="tmpfs" ino=729 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0 01-01 00:00:16.364 400 400 I auditd : type=1400 audit(0.0:54): avc: denied { read write } for comm="e2fsck" name="mmcblk0p50" dev="tmpfs" ino=729 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0 01-01 00:00:16.432 405 405 I auditd : type=1400 audit(0.0:55): avc: denied { read } for comm="e2fsck" name="mmcblk0p49" dev="tmpfs" ino=787 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0 01-01 00:00:16.432 405 405 I auditd : type=1400 audit(0.0:56): avc: denied { read write } for comm="e2fsck" name="mmcblk0p49" dev="tmpfs" ino=787 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0 01-01 00:00:22.744 750 750 I auditd : type=1400 audit(0.0:57): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 01-01 00:00:22.748 750 750 I auditd : type=1400 audit(0.0:58): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 01-01 00:00:22.752 750 750 I auditd : type=1400 audit(0.0:59): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 01-01 00:00:22.752 750 750 I auditd : type=1400 audit(0.0:60): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 01-01 00:00:22.752 750 750 I auditd : type=1400 audit(0.0:61): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 01-01 00:00:22.852 750 750 I auditd : type=1400 audit(0.0:62): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.856 750 750 I auditd : type=1400 audit(0.0:63): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.856 750 750 I auditd : type=1400 audit(0.0:64): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.856 750 750 I auditd : type=1400 audit(0.0:65): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.896 750 750 I auditd : type=1400 audit(0.0:66): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.896 750 750 I auditd : type=1400 audit(0.0:67): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:22.896 750 750 I auditd : type=1400 audit(0.0:68): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.296 750 750 I auditd : type=1400 audit(0.0:69): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.296 750 750 I auditd : type=1400 audit(0.0:70): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.300 750 750 I auditd : type=1400 audit(0.0:71): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.304 750 750 I auditd : type=1400 audit(0.0:72): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.304 750 750 I auditd : type=1400 audit(0.0:73): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:23.308 750 750 I auditd : type=1400 audit(0.0:74): avc: denied { write } for comm="bhd_radio_autoc" name="property_service" dev="tmpfs" ino=715 scontext=u:r:systemmix:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 01-01 00:00:23.308 750 750 I auditd : type=1400 audit(0.0:75): avc: denied { write } for comm="bhd_radio_autoc" name="property_service" dev="tmpfs" ino=715 scontext=u:r:systemmix:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 01-01 00:00:23.340 1 1 I auditd : type=1400 audit(0.0:76): avc: denied { write } for comm="init" name="discard_max_bytes" dev="sysfs" ino=40447 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_devices_block:s0 tclass=file permissive=0 01-01 00:00:23.972 792 792 I auditd : type=1400 audit(0.0:77): avc: denied { search } for comm="nvram_daemon" name="android" dev="sysfs" ino=39 scontext=u:r:nvram_daemon:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=0 01-01 00:00:23.972 792 792 I auditd : type=1400 audit(0.0:78): avc: denied { search } for comm="nvram_daemon" name="android" dev="sysfs" ino=39 scontext=u:r:nvram_daemon:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=0 01-01 00:00:23.980 792 792 I auditd : type=1400 audit(0.0:79): avc: denied { search } for comm="nvram_daemon" name="android" dev="sysfs" ino=39 scontext=u:r:nvram_daemon:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=0 01-01 00:00:23.984 792 792 I auditd : type=1400 audit(0.0:80): avc: denied { search } for comm="nvram_daemon" name="android" dev="sysfs" ino=39 scontext=u:r:nvram_daemon:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=0 01-01 00:00:24.184 810 810 I auditd : type=1400 audit(0.0:81): avc: denied { dac_read_search } for comm="gsid" capability=2 scontext=u:r:gsid:s0 tcontext=u:r:gsid:s0 tclass=capability permissive=0 01-01 00:00:24.488 812 812 I auditd : type=1400 audit(0.0:82): avc: denied { dac_read_search } for comm="profcollectctl" capability=2 scontext=u:r:profcollectd:s0 tcontext=u:r:profcollectd:s0 tclass=capability permissive=0 01-01 00:00:24.488 812 812 I auditd : type=1400 audit(0.0:83): avc: denied { dac_override } for comm="profcollectctl" capability=1 scontext=u:r:profcollectd:s0 tcontext=u:r:profcollectd:s0 tclass=capability permissive=0 01-01 00:00:24.952 855 855 I auditd : type=1400 audit(0.0:84): avc: denied { dac_read_search } for comm="adbd" capability=2 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0 01-01 00:00:24.952 855 855 I auditd : type=1400 audit(0.0:85): avc: denied { dac_override } for comm="adbd" capability=1 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0 01-01 00:00:25.380 332 332 I auditd : avc: denied { find } for pid=783 uid=1000 name=vendor.mediatek.hardware.composer_ext.IComposerExt/default scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 01-01 00:00:25.420 889 889 I auditd : type=1400 audit(0.0:86): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 01-01 00:00:25.420 889 889 I auditd : type=1400 audit(0.0:87): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 01-01 00:00:25.428 889 889 I auditd : type=1400 audit(0.0:88): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 01-01 00:00:25.428 889 889 I auditd : type=1400 audit(0.0:89): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 01-01 00:00:25.428 889 889 I auditd : type=1400 audit(0.0:90): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 01-01 00:00:25.452 890 890 I auditd : type=1400 audit(0.0:91): avc: denied { dac_read_search } for comm="atrace" capability=2 scontext=u:r:atrace:s0 tcontext=u:r:atrace:s0 tclass=capability permissive=0 01-01 00:00:25.532 889 889 I auditd : type=1400 audit(0.0:92): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.532 889 889 I auditd : type=1400 audit(0.0:93): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.532 889 889 I auditd : type=1400 audit(0.0:94): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.532 889 889 I auditd : type=1400 audit(0.0:95): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.536 1 1 I auditd : type=1400 audit(0.0:96): avc: denied { create } for comm="init" name="lbs_dbg_ext" scontext=u:r:init:s0 tcontext=u:object_r:socket_device:s0 tclass=sock_file permissive=0 01-01 00:00:25.572 889 889 I auditd : type=1400 audit(0.0:97): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.572 889 889 I auditd : type=1400 audit(0.0:98): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.572 889 889 I auditd : type=1400 audit(0.0:99): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.700 920 920 I auditd : type=1400 audit(0.0:100): avc: denied { dac_read_search } for comm="mobile_log_d" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:25.708 920 920 I auditd : type=1400 audit(0.0:101): avc: denied { dac_override } for comm="mobile_log_d" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:25.712 915 915 I auditd : type=1400 audit(0.0:102): avc: denied { call } for comm="binder:915_2" scontext=u:r:lbs_dbg_ext:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0 01-01 00:00:25.716 915 915 I auditd : type=1400 audit(0.0:103): avc: denied { call } for comm="binder:915_2" scontext=u:r:lbs_dbg_ext:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0 01-01 00:00:25.848 926 926 I auditd : type=1400 audit(0.0:104): avc: denied { read } for comm="netdiag" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:netdiag:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:25.924 778 778 I auditd : type=1400 audit(0.0:105): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:25.924 778 778 I auditd : type=1400 audit(0.0:106): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:25.972 889 889 I auditd : type=1400 audit(0.0:107): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.972 889 889 I auditd : type=1400 audit(0.0:108): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.976 889 889 I auditd : type=1400 audit(0.0:109): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.976 889 889 I auditd : type=1400 audit(0.0:110): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.980 889 889 I auditd : type=1400 audit(0.0:111): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 01-01 00:00:25.980 889 889 I auditd : type=1400 audit(0.0:112): avc: denied { write } for comm="bhd_radio_autoc" name="property_service" dev="tmpfs" ino=715 scontext=u:r:systemmix:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 01-01 00:00:25.980 889 889 I auditd : type=1400 audit(0.0:113): avc: denied { write } for comm="bhd_radio_autoc" name="property_service" dev="tmpfs" ino=715 scontext=u:r:systemmix:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 01-01 00:00:26.092 929 929 I auditd : type=1400 audit(0.0:114): avc: denied { read } for comm="android.hardwar" name="u:object_r:default_prop:s0" dev="tmpfs" ino=158 scontext=u:r:mediacodec:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 01-01 00:00:26.156 920 920 I auditd : type=1400 audit(0.0:115): avc: denied { read } for comm="mobile_log_d" name="atc_arm2_log" dev="proc" ino=4026532933 scontext=u:r:mobile_log_d:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 01-01 00:00:26.328 778 778 I auditd : type=1400 audit(0.0:116): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:26.392 1004 1004 I auditd : type=1400 audit(0.0:117): avc: denied { dac_read_search } for comm="mobile_log_d" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.404 1004 1004 I auditd : type=1400 audit(0.0:118): avc: denied { dac_override } for comm="mobile_log_d" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.592 1008 1008 I auditd : type=1400 audit(0.0:119): avc: denied { dac_read_search } for comm="sh" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.596 1008 1008 I auditd : type=1400 audit(0.0:120): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.600 1008 1008 I auditd : type=1400 audit(0.0:121): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.616 1009 1009 I auditd : type=1400 audit(0.0:122): avc: denied { dac_read_search } for comm="sh" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.616 1009 1009 I auditd : type=1400 audit(0.0:123): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.644 1013 1013 I auditd : type=1400 audit(0.0:124): avc: denied { dac_read_search } for comm="sh" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.644 1013 1013 I auditd : type=1400 audit(0.0:125): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.664 1016 1016 I auditd : type=1400 audit(0.0:126): avc: denied { dac_read_search } for comm="sh" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.664 1016 1016 I auditd : type=1400 audit(0.0:127): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.688 1017 1017 I auditd : type=1400 audit(0.0:128): avc: denied { dac_read_search } for comm="sh" capability=2 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:26.688 1017 1017 I auditd : type=1400 audit(0.0:129): avc: denied { dac_override } for comm="sh" capability=1 scontext=u:r:mobile_log_d:s0 tcontext=u:r:mobile_log_d:s0 tclass=capability permissive=0 01-01 00:00:27.184 1037 1037 I auditd : type=1400 audit(0.0:130): avc: denied { read } for comm="aee" name="u:object_r:system_mtk_persist_aee_prop:s0" dev="tmpfs" ino=388 scontext=u:r:mobile_log_d:s0 tcontext=u:object_r:system_mtk_persist_aee_prop:s0 tclass=file permissive=0 01-01 00:00:28.060 907 907 I auditd : type=1400 audit(0.0:131): avc: denied { read } for comm="system_server" name="u:object_r:qemu_sf_lcd_density_prop:s0" dev="tmpfs" ino=286 scontext=u:r:system_server:s0 tcontext=u:object_r:qemu_sf_lcd_density_prop:s0 tclass=file permissive=0 01-01 00:00:28.060 907 907 I auditd : type=1400 audit(0.0:132): avc: denied { read } for comm="system_server" name="u:object_r:qemu_sf_lcd_density_prop:s0" dev="tmpfs" ino=286 scontext=u:r:system_server:s0 tcontext=u:object_r:qemu_sf_lcd_density_prop:s0 tclass=file permissive=0 01-01 00:00:28.552 907 907 I auditd : type=1400 audit(0.0:133): avc: denied { execute } for comm="system_server" name="idmap2" dev="dm-6" ino=288 scontext=u:r:system_server:s0 tcontext=u:object_r:idmap_exec:s0 tclass=file permissive=0 01-01 00:00:30.480 424 424 I auditd : type=1400 audit(0.0:134): avc: denied { read } for comm="binder:424_2" name="wakeup2" dev="sysfs" ino=37747 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 01-01 00:00:30.488 424 424 I auditd : type=1400 audit(0.0:135): avc: denied { read } for comm="binder:424_2" name="wakeup26" dev="sysfs" ino=49976 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 01-01 00:00:30.544 424 424 I auditd : type=1400 audit(0.0:136): avc: denied { read } for comm="binder:424_2" name="wakeup7" dev="sysfs" ino=41499 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_usb_nonplat:s0 tclass=dir permissive=0 01-01 00:00:30.564 424 424 I auditd : type=1400 audit(0.0:137): avc: denied { read } for comm="binder:424_2" name="wakeup10" dev="sysfs" ino=41988 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=0 01-01 00:00:31.708 778 778 I auditd : type=1400 audit(0.0:138): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:31.716 778 778 I auditd : type=1400 audit(0.0:139): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:31.832 778 778 I auditd : type=1400 audit(0.0:140): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:31.832 778 778 I auditd : type=1400 audit(0.0:141): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:31.880 778 778 I auditd : type=1400 audit(0.0:142): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 01-01 00:00:31.880 778 778 I auditd : type=1400 audit(0.0:143): avc: denied { read } for comm="audioserver" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=467 scontext=u:r:audioserver:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 05-29 06:30:56.804 907 907 I auditd : type=1400 audit(0.0:144): avc: denied { read } for comm="InputReader" name="virtualkeys.mtk-tpd" dev="sysfs" ino=62995 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 05-29 06:30:56.976 1164 1164 I auditd : type=1400 audit(0.0:145): avc: denied { dac_read_search } for comm="extra_free_kbyt" capability=2 scontext=u:r:extra_free_kbytes:s0 tcontext=u:r:extra_free_kbytes:s0 tclass=capability permissive=0 05-29 06:30:56.976 1164 1164 I auditd : type=1400 audit(0.0:146): avc: denied { dac_override } for comm="extra_free_kbyt" capability=1 scontext=u:r:extra_free_kbytes:s0 tcontext=u:r:extra_free_kbytes:s0 tclass=capability permissive=0 05-29 06:30:58.608 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.nps.nos.fastswitch.INativeFastSwitch/default scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:00.728 766 766 I auditd : type=1400 audit(0.0:147): avc: denied { read } for comm="VcodecProcess" name="u:object_r:default_prop:s0" dev="tmpfs" ino=158 scontext=u:r:mtk_hal_c2:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 05-29 06:31:00.764 766 766 I auditd : type=1400 audit(0.0:148): avc: denied { read } for comm="VcodecProcess" name="u:object_r:default_prop:s0" dev="tmpfs" ino=158 scontext=u:r:mtk_hal_c2:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 05-29 06:31:00.788 766 766 I auditd : type=1400 audit(0.0:149): avc: denied { read } for comm="VcodecProcess" name="u:object_r:default_prop:s0" dev="tmpfs" ino=158 scontext=u:r:mtk_hal_c2:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 05-29 06:31:00.812 766 766 I auditd : type=1400 audit(0.0:150): avc: denied { read } for comm="VcodecProcess" name="u:object_r:default_prop:s0" dev="tmpfs" ino=158 scontext=u:r:mtk_hal_c2:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 05-29 06:31:02.331 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.mtkpower.IMtkPowerService/default scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:02.748 332 332 I auditd : avc: denied { add } for pid=907 uid=1000 name=vendor.mediatek.hardware.mbrainj.IMBrainJava/default scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:02.976 1477 1477 I auditd : type=1400 audit(0.0:151): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532090 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file 05-29 06:31:02.976 1477 1477 I auditd : type=1400 audit(0.0:152): avc: granted { read open } for comm="rkstack.process" path="/proc/1477/net/psched" dev="proc" ino=4026532090 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file 05-29 06:31:02.976 1477 1477 I auditd : type=1400 audit(0.0:153): avc: granted { getattr } for comm="rkstack.process" path="/proc/1477/net/psched" dev="proc" ino=4026532090 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file 05-29 06:31:04.859 332 332 I auditd : avc: denied { add } for pid=907 uid=1000 name=vendor.mediatek.hardware.mbrainj.IMBrainJava/default scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:11.640 1971 1971 I auditd : type=1400 audit(0.0:154): avc: denied { dac_read_search } for comm="aee_aed" capability=2 scontext=u:r:crash_dump:s0 tcontext=u:r:crash_dump:s0 tclass=capability permissive=0 05-29 06:31:11.640 1971 1971 I auditd : type=1400 audit(0.0:155): avc: denied { dac_override } for comm="aee_aed" capability=1 scontext=u:r:crash_dump:s0 tcontext=u:r:crash_dump:s0 tclass=capability permissive=0 05-29 06:31:11.688 1982 1982 I auditd : type=1400 audit(0.0:156): avc: denied { dac_read_search } for comm="perfetto" capability=2 scontext=u:r:perfetto:s0 tcontext=u:r:perfetto:s0 tclass=capability permissive=0 05-29 06:31:11.688 1982 1982 I auditd : type=1400 audit(0.0:157): avc: denied { dac_override } for comm="perfetto" capability=1 scontext=u:r:perfetto:s0 tcontext=u:r:perfetto:s0 tclass=capability permissive=0 05-29 06:31:11.948 259 259 I auditd : type=1400 audit(0.0:158): avc: denied { write } for comm="init" name="control" dev="proc" ino=4026532112 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc_dynamic_debug_control:s0 tclass=file permissive=0 05-29 06:31:13.240 2075 2075 I auditd : type=1400 audit(0.0:159): avc: denied { setattr } for comm="wmt_loader" name="wmt_aee" dev="proc" ino=4026534089 scontext=u:r:wmt_loader:s0 tcontext=u:object_r:proc_wmt_aee:s0 tclass=file permissive=0 05-29 06:31:13.456 1 1 I auditd : type=1107 audit(0.0:160): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.pullFWlog pid=2108 uid=2000 gid=1007 scontext=u:r:connsyslogger:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0' 05-29 06:31:13.488 424 424 I auditd : type=1400 audit(0.0:161): avc: denied { read } for comm="binder:424_3" name="wakeup2" dev="sysfs" ino=37747 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 05-29 06:31:13.504 424 424 I auditd : type=1400 audit(0.0:162): avc: denied { read } for comm="binder:424_3" name="wakeup26" dev="sysfs" ino=49976 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 05-29 06:31:13.660 424 424 I auditd : type=1400 audit(0.0:163): avc: denied { read } for comm="binder:424_3" name="wakeup7" dev="sysfs" ino=41499 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_usb_nonplat:s0 tclass=dir permissive=0 05-29 06:31:13.812 424 424 I auditd : type=1400 audit(0.0:164): avc: denied { read } for comm="binder:424_3" name="wakeup10" dev="sysfs" ino=41988 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=0 05-29 06:31:14.060 332 332 I auditd : avc: denied { find } for pid=2021 uid=1000 name=hzbhd_share scontext=u:r:system_app:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:14.995 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_wlan scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.072 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_bt scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.120 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_sensor scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.141 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_network scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.161 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_ipaddr scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.175 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_lbs scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.237 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_agps2framework scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:15.288 332 332 I auditd : avc: denied { find } for pid=907 uid=1000 name=vendor.mediatek.hardware.lbs.ILbs/mtk_lppe_socket_agps scontext=u:r:system_server:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:16.234 332 332 I auditd : avc: denied { find } for pid=2236 uid=10082 name=vendor.mediatek.hardware.lbs.ILbs/mtk_mtklogger2mnld scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:16.339 332 332 I auditd : avc: denied { find } for pid=2236 uid=10082 name=vendor.mediatek.hardware.lbs.ILbs/mtk_mtklogger2mnld scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:16.448 332 332 I auditd : avc: denied { find } for pid=2236 uid=10082 name=vendor.mediatek.hardware.lbs.ILbs/mtk_mtklogger2mnld scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0 05-29 06:31:16.712 920 920 I auditd : type=1400 audit(0.0:166): avc: denied { read } for comm="mobile_log_d.cp" name="last_arm2_log" dev="proc" ino=4026532935 scontext=u:r:mobile_log_d:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 05-29 06:31:16.752 2484 2484 I auditd : type=1400 audit(0.0:167): avc: denied { read } for comm="logcat" path="/proc/kmsg" dev="proc" ino=4026532106 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_kmsg:s0 tclass=file permissive=0 05-29 06:31:16.752 2484 2484 I auditd : type=1400 audit(0.0:168): avc: denied { read } for comm="logcat" path="/dev/scp" dev="tmpfs" ino=1232 scontext=u:r:dumpstate:s0 tcontext=u:object_r:scp_device:s0 tclass=chr_file permissive=0 05-29 06:31:16.752 2484 2484 I auditd : type=1400 audit(0.0:169): avc: denied { read } for comm="logcat" path="/dev/sspm" dev="tmpfs" ino=1183 scontext=u:r:dumpstate:s0 tcontext=u:object_r:sspm_device:s0 tclass=chr_file permissive=0 05-29 06:31:16.752 2484 2484 I auditd : type=1400 audit(0.0:170): avc: denied { read append } for comm="logcat" path="/data/log_temp/boot_3__normal/main_log_2010_0101_000027.curf" dev="mmcblk0p51" ino=745477 scontext=u:r:dumpstate:s0 tcontext=u:object_r:logtemp_data_file:s0 tclass=file permissive=0 05-29 06:58:41.496 3308 3308 I auditd : type=1400 audit(0.0:179): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:58:41.496 3308 3308 I auditd : type=1400 audit(0.0:180): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:58:41.500 3308 3308 I auditd : type=1400 audit(0.0:181): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:58:41.500 3308 3308 I auditd : type=1400 audit(0.0:182): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:58:41.500 3308 3308 I auditd : type=1400 audit(0.0:183): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 06:58:49.824 3315 3315 I auditd : type=1400 audit(0.0:198): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:58:49.824 3315 3315 I auditd : type=1400 audit(0.0:199): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:58:49.828 3315 3315 I auditd : type=1400 audit(0.0:200): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:58:49.828 3315 3315 I auditd : type=1400 audit(0.0:201): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:58:49.828 3315 3315 I auditd : type=1400 audit(0.0:202): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 06:59:02.224 3323 3323 I auditd : type=1400 audit(0.0:217): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:02.224 3323 3323 I auditd : type=1400 audit(0.0:218): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:02.228 3323 3323 I auditd : type=1400 audit(0.0:219): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:02.228 3323 3323 I auditd : type=1400 audit(0.0:220): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:02.228 3323 3323 I auditd : type=1400 audit(0.0:221): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 06:59:07.004 3328 3328 I auditd : type=1400 audit(0.0:236): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:07.004 3328 3328 I auditd : type=1400 audit(0.0:237): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:07.004 3328 3328 I auditd : type=1400 audit(0.0:238): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:07.008 3328 3328 I auditd : type=1400 audit(0.0:239): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:07.008 3328 3328 I auditd : type=1400 audit(0.0:240): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 06:59:08.744 3331 3331 I auditd : type=1400 audit(0.0:255): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:08.744 3331 3331 I auditd : type=1400 audit(0.0:256): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:08.748 3331 3331 I auditd : type=1400 audit(0.0:257): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:08.748 3331 3331 I auditd : type=1400 audit(0.0:258): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:08.748 3331 3331 I auditd : type=1400 audit(0.0:259): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 06:59:10.088 3334 3334 I auditd : type=1400 audit(0.0:286): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:10.088 3334 3334 I auditd : type=1400 audit(0.0:287): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:10.088 3334 3334 I auditd : type=1400 audit(0.0:288): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:10.088 3334 3334 I auditd : type=1400 audit(0.0:289): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:10.092 3334 3334 I auditd : type=1400 audit(0.0:290): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:11.296 3342 3342 I auditd : type=1400 audit(0.0:317): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:11.300 3342 3342 I auditd : type=1400 audit(0.0:318): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:11.300 3342 3342 I auditd : type=1400 audit(0.0:319): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:11.304 3342 3342 I auditd : type=1400 audit(0.0:320): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:11.308 3342 3342 I auditd : type=1400 audit(0.0:321): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:12.400 3345 3345 I auditd : type=1400 audit(0.0:336): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:12.400 3345 3345 I auditd : type=1400 audit(0.0:337): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:12.404 3345 3345 I auditd : type=1400 audit(0.0:338): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:12.408 3345 3345 I auditd : type=1400 audit(0.0:339): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:12.408 3345 3345 I auditd : type=1400 audit(0.0:340): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:13.432 3348 3348 I auditd : type=1400 audit(0.0:355): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:13.432 3348 3348 I auditd : type=1400 audit(0.0:356): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:13.436 3348 3348 I auditd : type=1400 audit(0.0:357): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:13.440 3348 3348 I auditd : type=1400 audit(0.0:358): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:13.444 3348 3348 I auditd : type=1400 audit(0.0:359): avc: denied { read write } for comm="bhd_radio_autoc" name="i2c-3" dev="tmpfs" ino=757 scontext=u:r:systemmix:s0 tcontext=u:object_r:ttyS_device:s0 tclass=chr_file permissive=0 05-29 06:59:15.116 3353 3353 I auditd : type=1400 audit(0.0:362): avc: denied { dac_read_search } for comm="bhd_radio_autoc" capability=2 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:15.116 3353 3353 I auditd : type=1400 audit(0.0:363): avc: denied { dac_override } for comm="bhd_radio_autoc" capability=1 scontext=u:r:systemmix:s0 tcontext=u:r:systemmix:s0 tclass=capability permissive=0 05-29 06:59:15.124 3353 3353 I auditd : type=1400 audit(0.0:364): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:15.124 3353 3353 I auditd : type=1400 audit(0.0:365): avc: denied { read } for comm="bhd_radio_autoc" name="u:object_r:system_prop:s0" dev="tmpfs" ino=424 scontext=u:r:systemmix:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0 05-29 06:59:15.124 3353 3353 I auditd : type=1400 audit(0.0:366): avc: denied { read write } for comm="bhd_radio_autoc" name="gpio_sw" dev="tmpfs" ino=1008 scontext=u:r:systemmix:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 05-29 07:00:29.388 424 424 I auditd : type=1400 audit(0.0:381): avc: denied { read } for comm="binder:424_3" name="wakeup2" dev="sysfs" ino=37747 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 05-29 07:00:29.392 424 424 I auditd : type=1400 audit(0.0:382): avc: denied { read } for comm="binder:424_3" name="wakeup26" dev="sysfs" ino=49976 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 05-29 07:00:29.408 424 424 I auditd : type=1400 audit(0.0:383): avc: denied { read } for comm="binder:424_3" name="wakeup7" dev="sysfs" ino=41499 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_usb_nonplat:s0 tclass=dir permissive=0 05-29 07:00:29.416 424 424 I auditd : type=1400 audit(0.0:384): avc: denied { read } for comm="binder:424_3" name="wakeup10" dev="sysfs" ino=41988 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=0 05-29 07:00:29.436 424 424 I auditd : type=1400 audit(0.0:385): avc: denied { read } for comm="binder:424_3" name="wakeup63" dev="sysfs" ino=64642 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
05-30
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值