AOKP_Backup
AOKP_Backup copied to clipboard
AOKP backup does not work on new 4.3
The tool does not work on the new 4.3 AOKP releases... I think it can not get proper su rights. Please check the log file bellow:
<6>[ 4482.512297] adjust_soc: ibat_ua = -578500, vbat_uv = 4170088, soc = 76, batt_temp=311
<5>[ 4483.517119] type=1400 audit(1381504306.689:4311): avc: denied { read } for pid=22223 comm="Thread-585" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev="tmpfs" ino=7165 scontext=u:r:untrusted_app:s0:c193,c256 tcontext=u:object_r:init_tmpfs:s0 tclass=file
<5>[ 4483.519072] type=1400 audit(1381504306.689:4312): avc: denied { write } for pid=22223 comm="Thread-585" name="CURRENT_BATTERY_INFO" dev="mmcblk0p23" ino=627271 scontext=u:r:untrusted_app:s0:c193,c256 tcontext=u:object_r:system_data_file:s0:c193,c256 tclass=file
<5>[ 4492.656004] type=1400 audit(1381504315.828:4313): avc: denied { call } for pid=927 comm="coilsw.launcher" scontext=u:r:untrusted_app:s0:c144,c256 tcontext=u:r:init:s0 tclass=binder
<5>[ 4492.904601] type=1400 audit(1381504316.078:4314): avc: denied { read } for pid=20196 comm="com.aokp.backup" scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:r:init:s0 tclass=unix_stream_socket
<5>[ 4492.904784] type=1400 audit(1381504316.078:4315): avc: denied { call } for pid=20196 comm="com.aokp.backup" scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:r:init:s0 tclass=binder
<5>[ 4492.941802] type=1400 audit(1381504316.108:4316): avc: denied { search } for pid=20196 comm="com.aokp.backup" name="/" dev="mmcblk0p21" ino=2 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:unlabeled:s0 tclass=dir
<5>[ 4492.942076] type=1400 audit(1381504316.108:4317): avc: denied { read } for pid=20196 comm="com.aokp.backup" name="gralloc.msm8960.so" dev="mmcblk0p21" ino=38430 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:unlabeled:s0 tclass=file
<5>[ 4493.357787] type=1400 audit(1381504316.528:4318): avc: denied { write } for pid=2319 comm="android.taskerm" name="shared_prefs" dev="mmcblk0p23" ino=603769 scontext=u:r:untrusted_app:s0:c99,c256 tcontext=u:object_r:system_data_file:s0 tclass=dir
<5>[ 4493.358000] type=1400 audit(1381504316.528:4319): avc: denied { remove_name } for pid=2319 comm="android.taskerm" name="net.dinglisch.android.tasker.statey.xml" dev="mmcblk0p23" ino=602935 scontext=u:r:untrusted_app:s0:c99,c256 tcontext=u:object_r:system_data_file:s0 tclass=dir
<5>[ 4493.358275] type=1400 audit(1381504316.528:4320): avc: denied { rename } for pid=2319 comm="android.taskerm" name="net.dinglisch.android.tasker.statey.xml" dev="mmcblk0p23" ino=602935 scontext=u:r:untrusted_app:s0:c99,c256 tcontext=u:object_r:system_data_file:s0:c99,c256 tclass=file
<5>[ 4493.358458] type=1400 audit(1381504316.528:4321): avc: denied { add_name } for pid=2319 comm="android.taskerm" name="net.dinglisch.android.tasker.statey.xml.bak" scontext=u:r:untrusted_app:s0:c99,c256 tcontext=u:object_r:system_data_file:s0 tclass=dir
<5>[ 4493.358855] type=1400 audit(1381504316.528:4322): avc: denied { create } for pid=2319 comm="android.taskerm" name="net.dinglisch.android.tasker.statey.xml" scontext=u:r:untrusted_app:s0:c99,c256 tcontext=u:object_r:system_data_file:s0:c99,c256 tclass=file
<4>[ 4499.226592] audit_printk_skb: 48 callbacks suppressed
<5>[ 4499.226683] type=1400 audit(1381504322.394:4339): avc: denied { getattr } for pid=20196 comm="com.aokp.backup" path="/system/framework/framework-res.apk" dev="mmcblk0p21" ino=30789 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:unlabeled:s0 tclass=file
<5>[ 4499.240141] type=1400 audit(1381504322.404:4340): avc: denied { getattr } for pid=729 comm="ndroid.systemui" path="/system/framework/framework-res.apk" dev="mmcblk0p21" ino=30789 scontext=u:r:platform_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
<5>[ 4499.839232] type=1400 audit(1381504323.005:4341): avc: denied { open } for pid=22284 comm="IntentService[B" name="build.prop" dev="mmcblk0p21" ino=253 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:unlabeled:s0 tclass=file
<5>[ 4499.863036] type=1400 audit(1381504323.035:4342): avc: denied { write } for pid=22284 comm="IntentService[B" name=".zipping" dev="mmcblk0p23" ino=716723 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=dir
<5>[ 4499.863646] type=1400 audit(1381504323.035:4343): avc: denied { remove_name } for pid=22284 comm="IntentService[B" name="aokp.backup" dev="mmcblk0p23" ino=716724 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=dir
<5>[ 4499.864348] type=1400 audit(1381504323.035:4344): avc: denied { unlink } for pid=22284 comm="IntentService[B" name="aokp.backup" dev="mmcblk0p23" ino=716724 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=file
<5>[ 4499.866606] type=1400 audit(1381504323.035:4345): avc: denied { unlink } for pid=22284 comm="IntentService[B" name="navbar_icon_2.png" dev="mmcblk0p23" ino=716739 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0 tclass=file
<5>[ 4499.867552] type=1400 audit(1381504323.035:4346): avc: denied { rmdir } for pid=22284 comm="IntentService[B" name=".zipping" dev="mmcblk0p23" ino=716723 scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=dir
<5>[ 4499.868498] type=1400 audit(1381504323.035:4347): avc: denied { add_name } for pid=22284 comm="IntentService[B" name=".zipping" scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=dir
<5>[ 4499.869200] type=1400 audit(1381504323.035:4348): avc: denied { create } for pid=22284 comm="IntentService[B" name=".zipping" scontext=u:r:untrusted_app:s0:c247,c256 tcontext=u:object_r:system_data_file:s0:c247,c256 tclass=dir
<3>[ 4500.015502] init: untracked pid 22310 exited
<3>[ 4500.746642] init: untracked pid 22322 exited