Xiaofan Jiang
30306a34b5
shamp: remove fixed bug from bugmap
...
Bug: 360060705
Flag: NONE clean up bugmap
Change-Id: I7d71aefa766e870e8bccb100ed5ad796dbbab36b
2024-11-13 20:35:03 +00:00
Spade Lee
1239bde036
Merge "sepolicy: add label for logbuffer" into main
2024-11-13 17:00:10 +00:00
Spade Lee
f8891af46e
sepolicy: add label for logbuffer
...
- Add logbuffer_device label for ln8411, dc_mains, dual_batt
- Remove from tracking_deniel
Bug: 377895720
Flag: EXEMPT bugfix
Change-Id: Ia542c089bcf0eb6bb4ea3e026d43937390720b22
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-12 01:46:58 +00:00
Nina Chen
2fe912350e
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 378004800
Flag: EXEMPT NDK
Change-Id: I5cdb5950053f291969b660758a3eac4deda3995c
2024-11-08 03:37:57 +00:00
Nina Chen
31d6e22220
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 377787445
Flag: EXEMPT NDK
Change-Id: I96db3485005cdaed405c8d117b1d50b5f29b533f
2024-11-07 06:39:17 +00:00
Nina Chen
d03f77df69
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 377412254
Flag: EXEMPT NDK
Change-Id: I1345afdb481e9f84f2dd5fe745ebf594cbc33c66
2024-11-05 05:25:33 +00:00
Nina Chen
dde3987124
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 375564898
Bug: 375564818
Bug: 375563932
Bug: 375564360
Bug: 375521075
Flag: EXEMPT NDK
Change-Id: I582e58598cf0c89de4b9aa904c84cbb065eba36b
2024-10-25 09:11:49 +00:00
cwkao
f1471f5d65
Share same seinfo between propsetter app and GCA.
...
Bug: 375117470
Test: locally on komodo, the app functions as expected.
Flag: EXEMPT NDK
Change-Id: I60a6047835b23137391e3bd6edcfd1fb418a3e19
2024-10-23 16:58:52 +00:00
Thiébaud Weksteen
8b8ae291d4
Merge "Remove duplicate service entries" into main
2024-10-17 06:30:19 +00:00
Juan Yescas
c6c4da00d4
Merge "Copy 16KB developer option sepolicy to zumapro" into main
2024-10-17 01:38:36 +00:00
KRIS CHEN
ecc30e501a
Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main
2024-10-16 08:39:00 +00:00
chenkris
0e859b87a1
Allow fingerprint HAL to access IGoodixFingerprintDaemon
...
Fix the following avc denial:
E SELinux : avc: denied { add } for pid=6578 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
Flag: EXEMPT NDK
Bug: 368993793
Test: Tested fingerprint under enforcing mode
Change-Id: Iafed80d22d40e98cb0811ca84051066360f3dff8
2024-10-16 07:50:44 +00:00
Pawan Wagh
7c85388222
Copy 16KB developer option sepolicy to zumapro
...
avc denials from logs:
[ 51.554757][ T453] type=1400 audit(1728080571.804:3): avc: denied { write } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.582401][ T453] type=1400 audit(1728080571.808:4): avc: denied { ioctl } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.618078][ T453] type=1400 audit(1728080571.808:5): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[ 51.642465][ T453] type=1400 audit(1728080571.812:6): avc: denied { getattr } for comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.664388][ T453] type=1400 audit(1728080571.812:7): avc: denied { getattr } for comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664405][ T453] type=1400 audit(1728080571.820:8): avc: denied { search } for comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664429][ T453] type=1400 audit(1728080571.832:9): avc: denied { write } for comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664448][ T453] type=1400 audit(1728080571.832:10): avc: denied { add_name } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.717024][ T453] type=1400 audit(1728080571.832:11): avc: denied { create } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.786594][ T453] type=1400 audit(1728080571.836:12): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[ 51.819515][ T453] type=1400 audit(1728080571.840:13): avc: denied { search } for comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[ 51.841747][ T453] type=1400 audit(1728080571.840:14): avc: denied { read } for comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.863729][ T453] type=1400 audit(1728080571.840:15): avc: denied { open } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.887882][ T453] type=1400 audit(1728080571.840:16): avc: denied { getattr } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.912170][ T453] type=1400 audit(1728080571.840:17): avc: denied { map } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.944437][ T453] type=1400 audit(1728080571.840:18): avc: denied { execute } for comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.979656][ T453] type=1400 audit(1728080571.848:19): avc: denied { search } for comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[ 52.009905][ T453] type=1400 audit(1728080571.848:20): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.039894][ T453] type=1400 audit(1728080571.848:21): avc: denied { search } for comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[ 52.075681][ T453] type=1400 audit(1728080571.848:22): avc: denied { getattr } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.110042][ T453] type=1400 audit(1728080571.848:23): avc: denied { read } for comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.151878][ T453] type=1400 audit(1728080571.848:24): avc: denied { open } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.185339][ T453] type=1400 audit(1728080571.848:25): avc: denied { read write } for comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225138][ T453] type=1400 audit(1728080571.848:26): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225150][ T453] type=1400 audit(1728080571.848:27): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225160][ T453] type=1400 audit(1728080571.848:28): avc: denied { create } for comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225170][ T453] type=1400 audit(1728080571.848:29): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225184][ T453] type=1400 audit(1728080571.852:30): avc: denied { relabelfrom } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225198][ T453] type=1400 audit(1728080571.852:31): avc: denied { relabelto } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225213][ T453] type=1400 audit(1728080571.852:32): avc: denied { write } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225227][ T453] type=1400 audit(1728080571.852:33): avc: denied { setattr } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225240][ T453] type=1400 audit(1728080571.852:34): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.264424][ T453] type=1400 audit(1728080571.852:35): avc: denied { relabelfrom } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.310613][ T453] type=1400 audit(1728080571.852:36): avc: denied { relabelto } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.356910][ T453] type=1400 audit(1728080571.852:37): avc: denied { search } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.402344][ T453] type=1400 audit(1728080571.852:38): avc: denied { setattr } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.446523][ T453] type=1400 audit(1728080571.868:39): avc: denied { write } for comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 52.481694][ T453] type=1400 audit(1728080571.876:40): avc: denied { remove_name } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.534169][ T453] type=1400 audit(1728080571.876:41): avc: denied { rename } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.552872][ T453] type=1400 audit(1728080571.892:42): avc: denied { read } for comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.586267][ T453] type=1400 audit(1728080571.892:43): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.586291][ T453] type=1400 audit(1728080571.892:44): avc: denied { open } for comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.636388][ T453] type=1400 audit(1728080572.012:45): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.657184][ T453] type=1400 audit(1728080572.012:46): avc: denied { read write } for comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.676513][ T453] type=1400 audit(1728080572.012:47): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.704304][ T453] type=1400 audit(1728080572.012:48): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.732919][ T453] type=1400 audit(1728080572.016:49): avc: denied { relabelto } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.767434][ T453] type=1400 audit(1728080572.016:50): avc: denied { write } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.805716][ T453] type=1400 audit(1728080572.016:51): avc: denied { setattr } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 53.034704][ T453] type=1400 audit(1728080572.016:52): avc: denied { relabelto } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066603][ T453] type=1400 audit(1728080572.016:53): avc: denied { search } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066613][ T453] type=1400 audit(1728080572.016:54): avc: denied { setattr } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066624][ T453] type=1400 audit(1728080572.020:55): avc: denied { rename } for comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066649][ T453] type=1400 audit(1728080572.088:56): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100566][ T453] type=1400 audit(1728080572.088:57): avc: denied { read write } for comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100577][ T453] type=1400 audit(1728080572.088:58): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170745][ T453] type=1400 audit(1728080572.088:59): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170754][ T453] type=1400 audit(1728080572.092:60): avc: denied { relabelto } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170765][ T453] type=1400 audit(1728080572.092:61): avc: denied { write } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170775][ T453] type=1400 audit(1728080572.092:62): avc: denied { setattr } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170785][ T453] type=1400 audit(1728080572.092:63): avc: denied { relabelto } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170797][ T453] type=1400 audit(1728080572.092:64): avc: denied { search } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170811][ T453] type=1400 audit(1728080572.092:65): avc: denied { setattr } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170825][ T453] type=1400 audit(1728080572.092:66): avc: denied { relabelto } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.170839][ T453] type=1400 audit(1728080572.092:67): avc: denied { search } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.207440][ T453] type=1400 audit(1728080572.092:68): avc: denied { setattr } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.262539][ T453] type=1400 audit(1728080572.092:69): avc: denied { create } for comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.291111][ T453] type=1400 audit(1728080572.092:70): avc: denied { relabelfrom } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.314133][ T453] type=1400 audit(1728080572.092:71): avc: denied { relabelto } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.351258][ T453] type=1400 audit(1728080572.092:72): avc: denied { setattr } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.418367][ T453] type=1400 audit(1728080572.092:73): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.461321][ T453] type=1400 audit(1728080572.092:74): avc: denied { relabelto } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.467294][ T453] type=1400 audit(1728080572.092:75): avc: denied { write } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.484014][ T453] type=1400 audit(1728080572.092:76): avc: denied { setattr } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.510185][ T453] type=1400 audit(1728080572.092:77): avc: denied { relabelto } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.527739][ T453] type=1400 audit(1728080572.092:78): avc: denied { search } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.544592][ T453] type=1400 audit(1728080572.092:79): avc: denied { sys_admin } for comm="dump.f2fs" capability=21 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.589553][ T453] type=1400 audit(1728080572.092:80): avc: denied { setattr } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.660501][ T453] type=1400 audit(1728080572.092:81): avc: denied { relabelto } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.706160][ T453] type=1400 audit(1728080572.092:82): avc: denied { search } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.750214][ T453] type=1400 audit(1728080572.092:83): avc: denied { setattr } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.792724][ T453] type=1400 audit(1728080572.092:84): avc: denied { relabelto } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.833755][ T453] type=1400 audit(1728080572.092:85): avc: denied { write } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.866130][ T453] type=1400 audit(1728080572.092:86): avc: denied { setattr } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.933950][ T453] type=1400 audit(1728080572.092:87): avc: denied { relabelto } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 53.977389][ T453] type=1400 audit(1728080572.092:88): avc: denied { search } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.007088][ T453] type=1400 audit(1728080572.092:89): avc: denied { setattr } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.049913][ T453] type=1400 audit(1728080572.092:90): avc: denied { relabelto } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.102692][ T453] type=1400 audit(1728080572.092:91): avc: denied { write } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.144176][ T453] type=1400 audit(1728080572.092:92): avc: denied { setattr } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.187937][ T453] type=1400 audit(1728080572.092:93): avc: denied { relabelto } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.219942][ T453] type=1400 audit(1728080572.092:94): avc: denied { write } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.287284][ T453] type=1400 audit(1728080572.092:95): avc: denied { setattr } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.332099][ T453] type=1400 audit(1728080572.092:96): avc: denied { relabelto } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.364108][ T453] type=1400 audit(1728080572.092:97): avc: denied { search } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411041][ T453] type=1400 audit(1728080572.092:98): avc: denied { setattr } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411050][ T453] type=1400 audit(1728080572.096:99): avc: denied { relabelto } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411061][ T453] type=1400 audit(1728080572.096:100): avc: denied { write } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411075][ T453] type=1400 audit(1728080572.096:101): avc: denied { setattr } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411089][ T453] type=1400 audit(1728080572.096:102): avc: denied { create } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411103][ T453] type=1400 audit(1728080572.096:103): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411118][ T453] type=1400 audit(1728080572.096:104): avc: denied { relabelfrom } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411130][ T453] type=1400 audit(1728080572.096:105): avc: denied { relabelto } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411139][ T453] type=1400 audit(1728080572.096:106): avc: denied { search } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411148][ T453] type=1400 audit(1728080572.096:107): avc: denied { setattr } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411157][ T453] type=1400 audit(1728080572.100:108): avc: denied { relabelto } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411171][ T453] type=1400 audit(1728080572.100:109): avc: denied { write } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411180][ T453] type=1400 audit(1728080572.100:110): avc: denied { setattr } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411189][ T453] type=1400 audit(1728080572.100:111): avc: denied { relabelto } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411198][ T453] type=1400 audit(1728080572.100:112): avc: denied { search } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411207][ T453] type=1400 audit(1728080572.100:113): avc: denied { setattr } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411216][ T453] type=1400 audit(1728080572.100:114): avc: denied { relabelto } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411225][ T453] type=1400 audit(1728080572.100:115): avc: denied { write } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411234][ T453] type=1400 audit(1728080572.100:116): avc: denied { setattr } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411243][ T453] type=1400 audit(1728080572.100:117): avc: denied { relabelto } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411252][ T453] type=1400 audit(1728080572.100:118): avc: denied { search } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411262][ T453] type=1400 audit(1728080572.100:119): avc: denied { setattr } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411274][ T453] type=1400 audit(1728080572.120:120): avc: denied { rename } for comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 54.411286][ T453] type=1400 audit(1728080572.132:121): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 58.572689][ T453] type=1400 audit(1728080578.820:122): avc: denied { signull } for comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[ 58.735984][ T453] type=1400 audit(1728080578.984:123): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 58.844813][ T453] type=1400 audit(1728080579.092:124): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 86.597962][ T453] type=1400 audit(1728080606.848:455): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.616310][ T453] type=1400 audit(1728080606.848:456): avc: granted { read open } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.645641][ T453] type=1400 audit(1728080606.848:457): avc: granted { getattr } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 91.030419][ T453] type=1400 audit(1728080611.268:458): avc: denied { open } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.171034][ T453] type=1400 audit(1728080611.268:459): avc: denied { getattr } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.348507][ T453] type=1400 audit(1728080611.368:460): avc: denied { create } for comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[ 91.556216][ T453] type=1400 audit(1728080611.784:461): avc: denied { create } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.591920][ T453] type=1400 audit(1728080611.784:462): avc: denied { open } for comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.610505][ T453] type=1400 audit(1728080611.824:463): avc: denied { add_name } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[ 91.615399][ T453] type=1400 audit(1728080611.824:464): avc: denied { create } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668729][ T453] type=1400 audit(1728080611.824:465): avc: denied { write open } for comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668788][ T453] type=1400 audit(1728080611.836:466): avc: denied { rename } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 92.928109][ T453] type=1400 audit(1728080613.172:471): avc: granted { execute } for comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[ 98.286553][ T453] type=1400 audit(1728080618.536:472): avc: granted { read } for comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.288073][ T453] type=1400 audit(1728080618.536:473): avc: granted { read open } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.817428][ T453] type=1400 audit(1728080618.536:474): avc: granted { getattr } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.821639][ T453] type=1400 audit(1728080619.040:475): avc: denied { read } for comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.279860][ T453] type=1400 audit(1728080619.040:476): avc: denied { open } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.285144][ T453] type=1400 audit(1728080619.040:477): avc: denied { getattr } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1275): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1276): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1277): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1291): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1292): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1297): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1298): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1299): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1300): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956 5118 5118 I IntentService[D: type=1400 audit(0.0:1301): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
Chi-Wei Kao
e0c7545cd1
Merge "Add SELiunx for camera debug app (propsetter)" into main
2024-10-09 02:10:37 +00:00
cwkao
c5a7f8cc0d
Add SELiunx for camera debug app (propsetter)
...
Add the following avc denial:
```
10-02 19:55:46.156 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=activity scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.258 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=netstats scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.263 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=content_capture scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=gpu scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=activity_task scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.416 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=voiceinteraction scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.417 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=autofill scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.425 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=sensitive_content_protection_service scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.427 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=performance_hint scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
10-02 19:55:48.156 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=audio scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
10-02 19:55:53.869 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=textservices scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:textservices_service:s0 tclass=service_manager permissive=1
```
Bug: 370472903
Test: locally on komodo
Flag: EXEMPT NDK
Change-Id: Ia1a8b42697e790f27a5da9aaa1f7c83fddf2a365
2024-10-09 02:09:57 +00:00
KRIS CHEN
522514f320
Merge "add selinux permission for fps_touch_handler wakeup" into main
2024-10-07 08:00:42 +00:00
chenkris
537bf14fe6
add selinux permission for fps_touch_handler wakeup
...
Fix the following avc denial:
avc: denied { read } for name="wakeup96" dev="sysfs" ino=101698 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
Bug: 371877715
Test: ls -lZ /sys/devices/platform/odm//odm:fps_touch_handler/wakeup
Flag: EXEMPT NDK
Change-Id: I9aff36eaaec914c7a9b4939353fe88f5c0565799
2024-10-07 06:36:52 +00:00
Nicole Lee
3c83ed0f7c
Fix modem_logging_control sepolicy error
...
avc: denied { call } for scontext=u:r:modem_logging_control:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
avc: denied { find } for pid=1124 uid=1000 name=vendor.samsung_slsi.telephony.hardware.oemservice.IOemService/dm0 scontext=u:r:modem_logging_control:s0 tcontext=u:object_r:hal_vendor_modem_logging_service:s0 tclass=service_manager permissive=0
Bug:356025857
Test:Start modem logging correctly
Flag: EXEMPT bug fix
Change-Id: I0de9622957d7b7b756b178153d63e796bf45e856
2024-10-06 17:05:16 +00:00
Mike McTernan
f43ae7b448
Revert "sepolicy:tracking_denials: add btlinux vendor_aoc_prop"
...
This reverts commit 55bd5b089d
.
Reason for revert: Underlying bug fixed
Flag: EXEMPT bug fix
Bug: 353262026
Change-Id: Id04ffeb508ea7450449c0934bec646e8f7f1356f
2024-10-04 09:00:36 +00:00
Thiébaud Weksteen
f39431c3c8
Remove duplicate service entries
...
These entries are defined in the platform policy.
Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I113222c692b971c698684f762294565b96f8d0cb
2024-10-01 14:48:40 +10:00
Yen-Chao Chen
693260c964
remove b/350830796 and b/350830680 from bug map
...
Bug: 350830796
Bug: 350830680
Test: build pass
Flag: EXEMPT bugfix
Change-Id: Ic3c163ce4dd6b97289ec22f97a0c87052b049ea4
Signed-off-by: Yen-Chao Chen <davidycchen@google.com>
2024-09-30 09:24:36 +00:00
Treehugger Robot
0a301c6127
Merge "Allow hal_fingerprint_default to access sysfs_aoc_udfps" into main
2024-09-30 09:07:14 +00:00
Leo Hsieh
ac26d97317
Allow hal_fingerprint_default to access sysfs_aoc_udfps
...
Fix the following avc denial:
avc: denied { search } for name="17000000.aoc" dev="sysfs" ino=26962 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
avc: denied { write } for name="udfps_set_clock_source" dev="sysfs" ino=110484 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc: denied { read } for name="udfps_get_disp_freq" dev="sysfs" ino=110486 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc: denied { write } for name="udfps_set_clock_source" dev="sysfs" ino=109423 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc_udfps:s0 tclass=file permissive=0
Bug: 357976286
Test: Verify fingerprint HAL process can read/write to the sysfs node.
Flag: EXEMPT NDK
Change-Id: Ia8d6288812ef47dad2018d384f43374da7005a4a
2024-09-30 08:44:07 +00:00
YiKai Peng
bf729b7266
Update SELinux error
...
solution: Ie9f8fc5cce8e62b06931b77aa8cd16a3c9516fb5
Test: NA
Bug: 350830879
Flag: EXEMPT bugfix
Change-Id: I390af5bde405dc35f2cf37163975a851250c7dd2
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-09-27 05:11:22 +00:00
Feiyu Chen
80af57220f
Merge "Remove b/340369535 hal_audio_default from bug map" into main
2024-09-27 00:41:38 +00:00
Feiyu Chen
a0407eaeae
Remove b/340369535 hal_audio_default from bug map
...
It's fixed 4 months ago
Bug: 340369535
Flag: DOCS_ONLY
Change-Id: If4a6f41703686620dd9614a5fbcbf837127c3173
2024-09-26 19:24:00 +00:00
Xiaofan Jiang
4c1f2555d0
Merge "modem_svc: update sepolicy for UMI" into main
2024-09-26 18:12:25 +00:00
Treehugger Robot
abb1298206
Merge "Fix error in systemui when toggling airplane mode" into main
2024-09-26 16:11:38 +00:00
weichinweng
644a742ac7
Remove SELinux error tracing bug
...
Bug: 350830390
Bug: 350830756
Bug: 350830758
Test: None
Change-Id: Ib33ceebb66573dbb38c87b120daa481b3756090d
2024-09-26 07:51:52 +00:00
Xiaofan Jiang
81f027f9a1
modem_svc: update sepolicy for UMI
...
Bug: 357139752
09-12 14:58:18.412 21402 21402 W shared_modem_pl: type=1400 audit(0.0:445): avc: denied { write } for name="modem_svc_socket" dev="dm-53" ino=55074 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=0
Flag: EXEMPT sepolicy change only
Change-Id: I0f465e6a3039cc9781142c2b0f3fc433eaa1c9dc
2024-09-25 23:32:04 +00:00
Wilson Sung
a59097a64a
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 369539751
Test: scanBugreport
Bug: 369539798
Bug: 369540515
Flag: EXEMPT NDK
Change-Id: Ib294a4c50801ddbd791ff3d05fe332f70bf17283
2024-09-25 12:46:13 +00:00
Wilson Sung
ad0fc36b80
Fix error in systemui when toggling airplane mode
...
avc: denied { read } for name="u:object_r:radio_cdma_ecm_prop:s0" dev="tmpfs" ino=321 scontext=u:r:systemui_app:s0:c3,c257,c512,c768 tcontext=u:object_r:radio_cdma_ecm_prop:s0 tclass=file
Bug: 197722115
Bug: 359381748
Test: make selinux_policy
Flag: EXEMPT bugfix
Change-Id: I56021bacf311c7ce7e7e2f2b44b2078cedc16f1c
2024-09-25 08:39:17 +00:00
Nina Chen
1ded01dd86
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 369475712
Flag: EXEMPT NDK
Change-Id: Ib2752c70f24cd0ea35b13836556dc634d2721413
2024-09-25 06:30:45 +00:00
Tej Singh
0507349a4b
Make android.framework.stats-v2-ndk app reachable
...
For libedgetpu
Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: Id4f43ba150bd476426ace22c7d866ee87d5777a0
2024-09-20 21:41:23 -07:00
Treehugger Robot
a1a07140ce
Merge "Update SELinux error" into main
2024-09-20 10:12:17 +00:00
chenkris
ab3bd433f8
Allow fingerprint to access /dev/fth_fd
...
Fix the following avc denial:
avc: denied { open } for path="/dev/fth_fd" dev="tmpfs" ino=1575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 368517769
Test: enroll and authenticate fingerprint.
Change-Id: I46e59d0fb4526586ce6e95e1d715b22e08b4347d
2024-09-20 09:15:44 +00:00
Nina Chen
2a4cb7b0a3
Update SELinux error
...
Test: scanBugreport
Bug: 368188020
Test: scanAvcDeniedLogRightAfterReboot
Bug: 368187536
Flag: EXEMPT NDK
Change-Id: I0cb8cf650332bf2d518871f87c2175a4f3a20678
2024-09-19 04:07:52 +00:00
Prochin Wang
90453768c7
Change vendor_fingerprint_prop to vendor_restricted_prop
...
This is to allow the fingerprint HAL to access the property.
Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: Iba81a714af741edabdb587d8e5f9d6060dd133c5
2024-09-16 02:12:26 +00:00
Nina Chen
2c4cebf4d5
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 366116096
Change-Id: I202f9031b89dbfbbce9d7fda6f8f50120df1698f
2024-09-12 14:24:29 +08:00
Neo Yu
696b8a5777
Merge "Move sepolicy about hal_radioext_default to gs-common" into main
2024-09-06 01:41:13 +00:00
Wilson Sung
42fee8809a
Move euiccpixel_app to vendor
...
Bug: 312143882
Test: make selinux_policy
Flag: EXEMPT sepolicy refactor
Change-Id: I0f6ac76860c90b8022a85cafb80350a708d278c1
2024-09-04 15:10:03 +00:00
Treehugger Robot
c5a02b45d4
Merge "Allow systemui_app to set 'debug.tracing.desktop_mode_visible_tasks' system property" into main
2024-09-04 12:20:22 +00:00
Ben Murdoch
88ed5f562f
Allow systemui_app to set 'debug.tracing.desktop_mode_visible_tasks' system property
...
See also: Iad8dc7a66765856ee7affb707f2dba6c1bbfbf49
Bug: 363893429
Flag: EXEMPT, SEPolicy
Test: Verified on device.
Change-Id: I6c68f97a7d42e635cadd2380cce7c64e812c1ffd
2024-09-04 09:39:13 +00:00
Randall Huang
21194d2dc3
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: I3fb2a9a46d00ac27931ee8c1ad7b3ceef0920cdb
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:29 +08:00
Attis Chen
2f8ab31157
Merge "Label sysfs node power_mode as sysfs_display." into main
2024-09-02 04:54:18 +00:00
Neo Yu
d5626145f3
Move sepolicy about hal_radioext_default to gs-common
...
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I618742012138123329ae47c05c958e77f5573956
2024-09-01 14:25:00 +08:00
Nattharat Jariyanuntanaet
11c0bf5839
Merge "Update sepolicy for nfc antenna selftest values" into main
2024-08-30 05:06:06 +00:00
KRIS CHEN
e1c773a1e5
Merge "Allow fingerprint to access sysfs_lhbm" into main
2024-08-29 08:40:44 +00:00
chenkris
dbc540c147
Allow fingerprint to access sysfs_lhbm
...
Fix following avc denail:
android.hardwar: type=1400 audit(0.0:17): avc: denied { write } for name="local_hbm_delay_frames" dev="sysfs" ino=83619 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0
Bug: 362149568
Test: enroll and authenticate fingerprint
Change-Id: I8c4b18b39fa5c391e9773c7780afe9e0de16e2a9
2024-08-29 05:08:49 +00:00
Wilson Sung
b5d284c3b5
Update SELinux error
...
Test: scanBugreport
Bug: 361726331
Flag: EXEMPT bugFix
Change-Id: Ib42816834dbb8258d5528a1c885a9a0945fe82d1
2024-08-23 09:49:29 +00:00