0% found this document useful (0 votes)
21 views

System Logcat

The document contains logs of an application being denied access to read various system files and directories. It contains many entries for the application being denied read access to the arp file in proc, power_supply in sysfs, searching sysfs net directories, and ioctl calls on sockets over time.

Uploaded by

Hshsb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

System Logcat

The document contains logs of an application being denied access to read various system files and directories. It contains many entries for the application being denied read access to the arp file in proc, power_supply in sysfs, searching sysfs net directories, and ioctl calls on sockets over time.

Uploaded by

Hshsb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

--------- beginning of main

01-27 01:16:06.992 W/Thread-20(20444): type=1400 audit(0.0:92509): avc: denied


{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:16:07.000 W/Thread-20(20444): type=1400 audit(0.0:92510): avc: denied
{ read } for name="power_supply" dev="sysfs" ino=19610
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs:s0
tclass=dir permissive=0
01-27 01:16:07.004 W/Thread-20(20444): type=1400 audit(0.0:92511): avc: denied
{ read } for name="thermal" dev="sysfs" ino=20132
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs:s0
tclass=dir permissive=0
01-27 01:16:07.400 W/Thread-20(20444): type=1400 audit(0.0:92512): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:16:07.488 W/Thread-20(20444): type=1400 audit(0.0:92513): avc: denied
{ search } for name="net" dev="sysfs" ino=19671
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs_net:s0
tclass=dir permissive=0
01-27 01:16:07.488 W/Thread-20(20444): type=1400 audit(0.0:92514): avc: denied
{ ioctl } for path="socket:[9024627]" dev="sockfs" ino=9024627 ioctlcmd=0x8927
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768
tcontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tclass=udp_socket permissive=0
01-27 01:16:07.488 W/Thread-20(20444): type=1400 audit(0.0:92515): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:16:07.496 W/Thread-20(20444): type=1400 audit(0.0:92516): avc: denied
{ read } for name="power_supply" dev="sysfs" ino=19610
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs:s0
tclass=dir permissive=0
01-27 01:16:07.496 W/Thread-20(20444): type=1400 audit(0.0:92517): avc: denied
{ search } for name="net" dev="sysfs" ino=19671
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs_net:s0
tclass=dir permissive=0
01-27 01:16:09.448 W/Thread-20(20444): type=1400 audit(0.0:92534): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:16:09.448 W/Thread-20(20444): type=1400 audit(0.0:92535): avc: denied
{ search } for name="net" dev="sysfs" ino=19671
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs_net:s0
tclass=dir permissive=0
01-27 01:16:09.448 W/Thread-20(20444): type=1400 audit(0.0:92536): avc: denied
{ ioctl } for path="socket:[9019975]" dev="sockfs" ino=9019975 ioctlcmd=0x8927
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768
tcontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tclass=udp_socket permissive=0
01-27 01:16:09.448 W/Thread-20(20444): type=1400 audit(0.0:92537): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:16:09.488 W/Thread-20(20444): type=1400 audit(0.0:92538): avc: denied
{ read } for name="power_supply" dev="sysfs" ino=19610
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs:s0
tclass=dir permissive=0
01-27 01:24:22.433 W/Thread-14(23714): type=1400 audit(0.0:92682): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:24:22.461 W/Thread-14(23714): type=1400 audit(0.0:92683): avc: denied
{ search } for name="net" dev="sysfs" ino=19671
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:sysfs_net:s0
tclass=dir permissive=0
01-27 01:24:22.461 W/Thread-14(23714): type=1400 audit(0.0:92684): avc: denied
{ ioctl } for path="socket:[9066503]" dev="sockfs" ino=9066503 ioctlcmd=0x8927
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768
tcontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tclass=udp_socket permissive=0
01-27 01:24:22.461 W/Thread-14(23714): type=1400 audit(0.0:92685): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0
01-27 01:24:22.469 W/Thread-14(23714): type=1400 audit(0.0:92686): avc: denied
{ read } for name="arp" dev="proc" ino=4026532236
scontext=u:r:untrusted_app:s0:c101,c257,c512,c768 tcontext=u:object_r:proc_net:s0
tclass=file permissive=0

You might also like