Copy 16KB developer option sepolicy to zumapro
avc denials from logs: [ 51.554757][ T453] type=1400 audit(1728080571.804:3): avc: denied { write } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1 [ 51.582401][ T453] type=1400 audit(1728080571.808:4): avc: denied { ioctl } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1 [ 51.618078][ T453] type=1400 audit(1728080571.808:5): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1 [ 51.642465][ T453] type=1400 audit(1728080571.812:6): avc: denied { getattr } for comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1 [ 51.664388][ T453] type=1400 audit(1728080571.812:7): avc: denied { getattr } for comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 51.664405][ T453] type=1400 audit(1728080571.820:8): avc: denied { search } for comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 51.664429][ T453] type=1400 audit(1728080571.832:9): avc: denied { write } for comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 51.664448][ T453] type=1400 audit(1728080571.832:10): avc: denied { add_name } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 51.717024][ T453] type=1400 audit(1728080571.832:11): avc: denied { create } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 51.786594][ T453] type=1400 audit(1728080571.836:12): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1 [ 51.819515][ T453] type=1400 audit(1728080571.840:13): avc: denied { search } for comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1 [ 51.841747][ T453] type=1400 audit(1728080571.840:14): avc: denied { read } for comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1 [ 51.863729][ T453] type=1400 audit(1728080571.840:15): avc: denied { open } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1 [ 51.887882][ T453] type=1400 audit(1728080571.840:16): avc: denied { getattr } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1 [ 51.912170][ T453] type=1400 audit(1728080571.840:17): avc: denied { map } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1 [ 51.944437][ T453] type=1400 audit(1728080571.840:18): avc: denied { execute } for comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1 [ 51.979656][ T453] type=1400 audit(1728080571.848:19): avc: denied { search } for comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1 [ 52.009905][ T453] type=1400 audit(1728080571.848:20): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1 [ 52.039894][ T453] type=1400 audit(1728080571.848:21): avc: denied { search } for comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1 [ 52.075681][ T453] type=1400 audit(1728080571.848:22): avc: denied { getattr } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1 [ 52.110042][ T453] type=1400 audit(1728080571.848:23): avc: denied { read } for comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1 [ 52.151878][ T453] type=1400 audit(1728080571.848:24): avc: denied { open } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1 [ 52.185339][ T453] type=1400 audit(1728080571.848:25): avc: denied { read write } for comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1 [ 52.225138][ T453] type=1400 audit(1728080571.848:26): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1 [ 52.225150][ T453] type=1400 audit(1728080571.848:27): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1 [ 52.225160][ T453] type=1400 audit(1728080571.848:28): avc: denied { create } for comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 52.225170][ T453] type=1400 audit(1728080571.848:29): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 52.225184][ T453] type=1400 audit(1728080571.852:30): avc: denied { relabelfrom } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 52.225198][ T453] type=1400 audit(1728080571.852:31): avc: denied { relabelto } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1 [ 52.225213][ T453] type=1400 audit(1728080571.852:32): avc: denied { write } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1 [ 52.225227][ T453] type=1400 audit(1728080571.852:33): avc: denied { setattr } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1 [ 52.225240][ T453] type=1400 audit(1728080571.852:34): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1 [ 52.264424][ T453] type=1400 audit(1728080571.852:35): avc: denied { relabelfrom } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 52.310613][ T453] type=1400 audit(1728080571.852:36): avc: denied { relabelto } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1 [ 52.356910][ T453] type=1400 audit(1728080571.852:37): avc: denied { search } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1 [ 52.402344][ T453] type=1400 audit(1728080571.852:38): avc: denied { setattr } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1 [ 52.446523][ T453] type=1400 audit(1728080571.868:39): avc: denied { write } for comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1 [ 52.481694][ T453] type=1400 audit(1728080571.876:40): avc: denied { remove_name } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 52.534169][ T453] type=1400 audit(1728080571.876:41): avc: denied { rename } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1 [ 52.552872][ T453] type=1400 audit(1728080571.892:42): avc: denied { read } for comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 52.586267][ T453] type=1400 audit(1728080571.892:43): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1 [ 52.586291][ T453] type=1400 audit(1728080571.892:44): avc: denied { open } for comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1 [ 52.636388][ T453] type=1400 audit(1728080572.012:45): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1 [ 52.657184][ T453] type=1400 audit(1728080572.012:46): avc: denied { read write } for comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1 [ 52.676513][ T453] type=1400 audit(1728080572.012:47): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1 [ 52.704304][ T453] type=1400 audit(1728080572.012:48): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1 [ 52.732919][ T453] type=1400 audit(1728080572.016:49): avc: denied { relabelto } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1 [ 52.767434][ T453] type=1400 audit(1728080572.016:50): avc: denied { write } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1 [ 52.805716][ T453] type=1400 audit(1728080572.016:51): avc: denied { setattr } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1 [ 53.034704][ T453] type=1400 audit(1728080572.016:52): avc: denied { relabelto } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1 [ 53.066603][ T453] type=1400 audit(1728080572.016:53): avc: denied { search } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1 [ 53.066613][ T453] type=1400 audit(1728080572.016:54): avc: denied { setattr } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1 [ 53.066624][ T453] type=1400 audit(1728080572.020:55): avc: denied { rename } for comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1 [ 53.066649][ T453] type=1400 audit(1728080572.088:56): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1 [ 53.100566][ T453] type=1400 audit(1728080572.088:57): avc: denied { read write } for comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1 [ 53.100577][ T453] type=1400 audit(1728080572.088:58): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1 [ 53.170745][ T453] type=1400 audit(1728080572.088:59): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1 [ 53.170754][ T453] type=1400 audit(1728080572.092:60): avc: denied { relabelto } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1 [ 53.170765][ T453] type=1400 audit(1728080572.092:61): avc: denied { write } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1 [ 53.170775][ T453] type=1400 audit(1728080572.092:62): avc: denied { setattr } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1 [ 53.170785][ T453] type=1400 audit(1728080572.092:63): avc: denied { relabelto } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1 [ 53.170797][ T453] type=1400 audit(1728080572.092:64): avc: denied { search } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1 [ 53.170811][ T453] type=1400 audit(1728080572.092:65): avc: denied { setattr } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1 [ 53.170825][ T453] type=1400 audit(1728080572.092:66): avc: denied { relabelto } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 [ 53.170839][ T453] type=1400 audit(1728080572.092:67): avc: denied { search } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 [ 53.207440][ T453] type=1400 audit(1728080572.092:68): avc: denied { setattr } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 [ 53.262539][ T453] type=1400 audit(1728080572.092:69): avc: denied { create } for comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1 [ 53.291111][ T453] type=1400 audit(1728080572.092:70): avc: denied { relabelfrom } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1 [ 53.314133][ T453] type=1400 audit(1728080572.092:71): avc: denied { relabelto } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1 [ 53.351258][ T453] type=1400 audit(1728080572.092:72): avc: denied { setattr } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1 [ 53.418367][ T453] type=1400 audit(1728080572.092:73): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1 [ 53.461321][ T453] type=1400 audit(1728080572.092:74): avc: denied { relabelto } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1 [ 53.467294][ T453] type=1400 audit(1728080572.092:75): avc: denied { write } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1 [ 53.484014][ T453] type=1400 audit(1728080572.092:76): avc: denied { setattr } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1 [ 53.510185][ T453] type=1400 audit(1728080572.092:77): avc: denied { relabelto } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1 [ 53.527739][ T453] type=1400 audit(1728080572.092:78): avc: denied { search } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1 [ 53.544592][ T453] type=1400 audit(1728080572.092:79): avc: denied { sys_admin } for comm="dump.f2fs" capability=21 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1 [ 53.589553][ T453] type=1400 audit(1728080572.092:80): avc: denied { setattr } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1 [ 53.660501][ T453] type=1400 audit(1728080572.092:81): avc: denied { relabelto } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1 [ 53.706160][ T453] type=1400 audit(1728080572.092:82): avc: denied { search } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1 [ 53.750214][ T453] type=1400 audit(1728080572.092:83): avc: denied { setattr } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1 [ 53.792724][ T453] type=1400 audit(1728080572.092:84): avc: denied { relabelto } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1 [ 53.833755][ T453] type=1400 audit(1728080572.092:85): avc: denied { write } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1 [ 53.866130][ T453] type=1400 audit(1728080572.092:86): avc: denied { setattr } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1 [ 53.933950][ T453] type=1400 audit(1728080572.092:87): avc: denied { relabelto } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1 [ 53.977389][ T453] type=1400 audit(1728080572.092:88): avc: denied { search } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1 [ 54.007088][ T453] type=1400 audit(1728080572.092:89): avc: denied { setattr } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1 [ 54.049913][ T453] type=1400 audit(1728080572.092:90): avc: denied { relabelto } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1 [ 54.102692][ T453] type=1400 audit(1728080572.092:91): avc: denied { write } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1 [ 54.144176][ T453] type=1400 audit(1728080572.092:92): avc: denied { setattr } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1 [ 54.187937][ T453] type=1400 audit(1728080572.092:93): avc: denied { relabelto } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1 [ 54.219942][ T453] type=1400 audit(1728080572.092:94): avc: denied { write } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1 [ 54.287284][ T453] type=1400 audit(1728080572.092:95): avc: denied { setattr } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1 [ 54.332099][ T453] type=1400 audit(1728080572.092:96): avc: denied { relabelto } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1 [ 54.364108][ T453] type=1400 audit(1728080572.092:97): avc: denied { search } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1 [ 54.411041][ T453] type=1400 audit(1728080572.092:98): avc: denied { setattr } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1 [ 54.411050][ T453] type=1400 audit(1728080572.096:99): avc: denied { relabelto } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1 [ 54.411061][ T453] type=1400 audit(1728080572.096:100): avc: denied { write } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1 [ 54.411075][ T453] type=1400 audit(1728080572.096:101): avc: denied { setattr } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1 [ 54.411089][ T453] type=1400 audit(1728080572.096:102): avc: denied { create } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 54.411103][ T453] type=1400 audit(1728080572.096:103): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 54.411118][ T453] type=1400 audit(1728080572.096:104): avc: denied { relabelfrom } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1 [ 54.411130][ T453] type=1400 audit(1728080572.096:105): avc: denied { relabelto } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1 [ 54.411139][ T453] type=1400 audit(1728080572.096:106): avc: denied { search } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1 [ 54.411148][ T453] type=1400 audit(1728080572.096:107): avc: denied { setattr } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1 [ 54.411157][ T453] type=1400 audit(1728080572.100:108): avc: denied { relabelto } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1 [ 54.411171][ T453] type=1400 audit(1728080572.100:109): avc: denied { write } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1 [ 54.411180][ T453] type=1400 audit(1728080572.100:110): avc: denied { setattr } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1 [ 54.411189][ T453] type=1400 audit(1728080572.100:111): avc: denied { relabelto } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1 [ 54.411198][ T453] type=1400 audit(1728080572.100:112): avc: denied { search } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1 [ 54.411207][ T453] type=1400 audit(1728080572.100:113): avc: denied { setattr } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1 [ 54.411216][ T453] type=1400 audit(1728080572.100:114): avc: denied { relabelto } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1 [ 54.411225][ T453] type=1400 audit(1728080572.100:115): avc: denied { write } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1 [ 54.411234][ T453] type=1400 audit(1728080572.100:116): avc: denied { setattr } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1 [ 54.411243][ T453] type=1400 audit(1728080572.100:117): avc: denied { relabelto } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1 [ 54.411252][ T453] type=1400 audit(1728080572.100:118): avc: denied { search } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1 [ 54.411262][ T453] type=1400 audit(1728080572.100:119): avc: denied { setattr } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1 [ 54.411274][ T453] type=1400 audit(1728080572.120:120): avc: denied { rename } for comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 [ 54.411286][ T453] type=1400 audit(1728080572.132:121): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1 [ 58.572689][ T453] type=1400 audit(1728080578.820:122): avc: denied { signull } for comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536 [ 58.735984][ T453] type=1400 audit(1728080578.984:123): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1 [ 58.844813][ T453] type=1400 audit(1728080579.092:124): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1 [ 86.597962][ T453] type=1400 audit(1728080606.848:455): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 86.616310][ T453] type=1400 audit(1728080606.848:456): avc: granted { read open } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 86.645641][ T453] type=1400 audit(1728080606.848:457): avc: granted { getattr } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 91.030419][ T453] type=1400 audit(1728080611.268:458): avc: denied { open } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as [ 91.171034][ T453] type=1400 audit(1728080611.268:459): avc: denied { getattr } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as [ 91.348507][ T453] type=1400 audit(1728080611.368:460): avc: denied { create } for comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1 [ 91.556216][ T453] type=1400 audit(1728080611.784:461): avc: denied { create } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1 [ 91.591920][ T453] type=1400 audit(1728080611.784:462): avc: denied { open } for comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1 [ 91.610505][ T453] type=1400 audit(1728080611.824:463): avc: denied { add_name } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1 [ 91.615399][ T453] type=1400 audit(1728080611.824:464): avc: denied { create } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1 [ 91.668729][ T453] type=1400 audit(1728080611.824:465): avc: denied { write open } for comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1 [ 91.668788][ T453] type=1400 audit(1728080611.836:466): avc: denied { rename } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1 [ 92.928109][ T453] type=1400 audit(1728080613.172:471): avc: granted { execute } for comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon [ 98.286553][ T453] type=1400 audit(1728080618.536:472): avc: granted { read } for comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 98.288073][ T453] type=1400 audit(1728080618.536:473): avc: granted { read open } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 98.817428][ T453] type=1400 audit(1728080618.536:474): avc: granted { getattr } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 98.821639][ T453] type=1400 audit(1728080619.040:475): avc: denied { read } for comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox [ 99.279860][ T453] type=1400 audit(1728080619.040:476): avc: denied { open } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox [ 99.285144][ T453] type=1400 audit(1728080619.040:477): avc: denied { getattr } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox 10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1275): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1276): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1277): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1291): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service 10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1292): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1297): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1298): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1299): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1300): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service 10-04 15:23:55.956 5118 5118 I IntentService[D: type=1400 audit(0.0:1301): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service Test: atest Enable16KbTest Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION Bug: 347108593 Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
This commit is contained in:
parent
e0c7545cd1
commit
7c85388222
6 changed files with 68 additions and 0 deletions
56
radio/copy_efs_files_to_data.te
Normal file
56
radio/copy_efs_files_to_data.te
Normal file
|
@ -0,0 +1,56 @@
|
|||
# necessary permissions to copy efs to be used in 16KB mode
|
||||
type copy_efs_files_to_data, domain;
|
||||
type copy_efs_files_to_data_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
init_daemon_domain(copy_efs_files_to_data);
|
||||
|
||||
# Allow creating files on /data/vendor/copied
|
||||
allow copy_efs_files_to_data modem_efs_image_file:dir { create_dir_perms };
|
||||
allow copy_efs_files_to_data modem_efs_image_file:file { create_file_perms };
|
||||
allow copy_efs_files_to_data modem_efs_image_file:lnk_file { create_file_perms };
|
||||
|
||||
# Allow execute binaries from /vendor/bin
|
||||
allow copy_efs_files_to_data vendor_toolbox_exec:file rx_file_perms;
|
||||
allow copy_efs_files_to_data vendor_shell_exec:file rx_file_perms;
|
||||
|
||||
# Allow execute /vendor/bin/dump.f2fs
|
||||
allow copy_efs_files_to_data vendor_file:file { getattr execute_no_trans };
|
||||
|
||||
# Allow execute dump.f2fs to dump files from /dev/block/by-name/efs
|
||||
allow copy_efs_files_to_data block_device:dir search;
|
||||
allow copy_efs_files_to_data efs_block_device:blk_file r_file_perms;
|
||||
allow copy_efs_files_to_data modem_userdata_block_device:blk_file r_file_perms;
|
||||
allow copy_efs_files_to_data persist_block_device:blk_file r_file_perms;
|
||||
|
||||
# Allow checking if /data/vendor/copied/[efs/efs_backup/persist] exist
|
||||
allow copy_efs_files_to_data modem_efs_file:dir getattr;
|
||||
allow copy_efs_files_to_data modem_userdata_file:dir getattr;
|
||||
allow copy_efs_files_to_data persist_file:dir getattr;
|
||||
|
||||
allow copy_efs_files_to_data sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow copy_efs_files_to_data sysfs_scsi_devices_0000:file r_file_perms;
|
||||
|
||||
# dump.f2fs need to restore file permissions after dumping
|
||||
# files from an f2fs image
|
||||
allow copy_efs_files_to_data self:capability chown;
|
||||
allow copy_efs_files_to_data self:capability fowner;
|
||||
|
||||
allow copy_efs_files_to_data kmsg_debug_device:chr_file { w_file_perms ioctl getattr };
|
||||
|
||||
allow copy_efs_files_to_data system_bootstrap_lib_file:dir search;
|
||||
|
||||
# Should not write to any block devices. Only read from block device
|
||||
# and dump files to /data/vendor/copied
|
||||
dontaudit copy_efs_files_to_data dev_type:blk_file write;
|
||||
# Setting xattr requires sys_admin
|
||||
dontaudit copy_efs_files_to_data self:capability sys_admin;
|
||||
# dump.f2fs would attempt to restore selinux on dumped files, but we
|
||||
# will use restorecon to do the job.
|
||||
dontaudit copy_efs_files_to_data modem_efs_image_file:dir relabelfrom;
|
||||
dontaudit copy_efs_files_to_data modem_efs_image_file:file relabelfrom;
|
||||
dontaudit copy_efs_files_to_data modem_efs_file:dir relabelto;
|
||||
dontaudit copy_efs_files_to_data modem_efs_file:file relabelto;
|
||||
dontaudit copy_efs_files_to_data modem_userdata_file:dir relabelto;
|
||||
dontaudit copy_efs_files_to_data modem_userdata_file:file relabelto;
|
||||
dontaudit copy_efs_files_to_data vendor_persist_type:dir relabelto;
|
||||
dontaudit copy_efs_files_to_data vendor_persist_type:file relabelto;
|
|
@ -1,5 +1,6 @@
|
|||
# Data
|
||||
type rild_vendor_data_file, file_type, data_file_type;
|
||||
type modem_efs_image_file, file_type, data_file_type;
|
||||
type modem_ml_data_file, file_type, data_file_type;
|
||||
type modem_stat_data_file, file_type, data_file_type;
|
||||
type sysfs_gps, sysfs_type, fs_type;
|
||||
|
|
|
@ -11,6 +11,7 @@
|
|||
/vendor/bin/hw/rild_exynos u:object_r:rild_exec:s0
|
||||
/vendor/bin/liboemservice_proxy_default u:object_r:liboemservice_proxy_default_exec:s0
|
||||
/vendor/bin/shared_modem_platform u:object_r:modem_svc_sit_exec:s0
|
||||
/vendor/bin/copy_efs_files_to_data u:object_r:copy_efs_files_to_data_exec:s0
|
||||
|
||||
# Config files
|
||||
/vendor/etc/modem_ml_models\.conf u:object_r:modem_config_file:s0
|
||||
|
@ -22,6 +23,7 @@
|
|||
/data/vendor/modem_ml(/.*)? u:object_r:modem_ml_data_file:s0
|
||||
/data/vendor/modem_stat(/.*)? u:object_r:modem_stat_data_file:s0
|
||||
/data/vendor/rild(/.*)? u:object_r:rild_vendor_data_file:s0
|
||||
/data/vendor/copied(/.*)? u:object_r:modem_efs_image_file:s0
|
||||
|
||||
# vendor extra images
|
||||
/mnt/vendor/efs(/.*)? u:object_r:modem_efs_file:s0
|
||||
|
|
3
vendor/property.te
vendored
3
vendor/property.te
vendored
|
@ -18,3 +18,6 @@ vendor_internal_prop(vendor_battery_defender_prop)
|
|||
|
||||
# Mali Integration
|
||||
vendor_restricted_prop(vendor_arm_runtime_option_prop)
|
||||
|
||||
# This prop will be set to "mounted" after /mnt/vendor/persist mounts
|
||||
vendor_internal_prop(vendor_persist_prop)
|
||||
|
|
3
vendor/property_contexts
vendored
3
vendor/property_contexts
vendored
|
@ -36,3 +36,6 @@ ro.vendor.primarydisplay.vrr.expected_present.headsup_ns u:object_r:vendor
|
|||
ro.vendor.primarydisplay.vrr.expected_present.timeout_ns u:object_r:vendor_display_prop:s0 exact int
|
||||
ro.vendor.primarydisplay.powerstats.entity_name u:object_r:vendor_display_prop:s0 exact string
|
||||
ro.vendor.secondarydisplay.blocking_zone.min_refresh_rate_by_nits u:object_r:vendor_display_prop:s0 exact string
|
||||
|
||||
# For checking if persist partition is mounted
|
||||
ro.vendor.persist.status u:object_r:vendor_persist_prop:s0 exact string
|
||||
|
|
3
vendor/vendor_init.te
vendored
3
vendor/vendor_init.te
vendored
|
@ -8,3 +8,6 @@ userdebug_or_eng(`
|
|||
set_prop(vendor_init, vendor_imssvc_prop)
|
||||
')
|
||||
|
||||
# Allow vendor_init to read ro.vendor.persist.status
|
||||
# to process init.rc actions
|
||||
set_prop(vendor_init, vendor_persist_prop)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue