Commit graph

761 commits

Author SHA1 Message Date
Mike Wang
6b1787d6f2 Merge "Update the PMS app seinfo for the certification change." into main 2024-11-27 16:25:53 +00:00
mikeyuewang
ec3dae0ee3 Update the PMS app seinfo for the certification change.
Bug: 375656221

Flag: EXEMPT selinux app context change.
Change-Id: If9bd9a3818b2f117cf26a13c2ae6940b53963b92
2024-11-27 16:23:53 +00:00
Nina Chen
81bc3731f1 Merge "Update SELinux error" into main 2024-11-26 05:28:35 +00:00
Nina Chen
0d60be5645 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 380989493
Flag: EXEMPT NDK
Change-Id: Iffaff71c72b03d58d2abcbe44007c2be469050bd
2024-11-26 05:28:21 +00:00
Treehugger Robot
dfaca94e55 Merge "Support access to radioext service over AIDL" into main 2024-11-26 05:17:15 +00:00
Julius Snipes
2bf44fa62f Merge "logger_app: allow logger_app to access persist.vendor.tcpdump.capture.len for logger_app" into main 2024-11-22 21:41:33 +00:00
Liana Kazanova (xWF)
62f34d8794 Revert "modem_svc: move shared_modem_platform related sepolicy t..."
Revert submission 30519089-move_modem_sepolicy

Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:30519089-move_modem_sepolicy

Change-Id: I74d37465d49e31c84d5e51bb0f020988a41b66ab
2024-11-21 17:54:10 +00:00
Eileen Lai
7e11c79345 modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I92d9a64c339f2b99e1fdc531145a950c3428dd82
Flag: NONE local testing only
2024-11-21 08:13:22 +00:00
Boon Jun
78eaa18cf3 Support access to radioext service over AIDL
11-13 17:08:24.418   396   396 E SELinux : avc:  denied  { find } for pid=15273 uid=1000 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0

Bug: 377991853
Bug: 371878208
Test: Open camera & observe connection to radio
Flag: EXEMPT bugfix
Change-Id: I1c53381f2aef1def44f7a717a9998acc826fe6aa
2024-11-20 10:30:05 +00:00
Nina Chen
9faa3999ef Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379245474
Bug: 379245673
Bug: 379245788
Bug: 379244519
Bug: 379245853
Flag: EXEMPT NDK
Change-Id: Ic1c8e73773ed71eea7be46187231fde6b5283e8a
2024-11-15 11:02:02 +00:00
Nina Chen
23bcb285e8 Merge "Update SELinux error" into main 2024-11-15 06:57:24 +00:00
Treehugger Robot
dcbf67714d Merge "correct frame_interval_ns and expected_present_time_ns naming" into main 2024-11-15 06:54:45 +00:00
Nina Chen
351ceac512 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379206528
Bug: 379206406
Flag: EXEMPT NDK
Change-Id: I82ca7cb985e9fd755dba5d29139a2b9a9f638f9a
2024-11-15 06:53:58 +00:00
Xiaofan Jiang
fb4abe21a2 Merge "shamp: remove fixed bug from bugmap" into main 2024-11-15 03:17:40 +00:00
Joen Chen
233610e6a4 correct frame_interval_ns and expected_present_time_ns naming
Bug: 378992900
Flag: EXEMPT bugfix
Test: scrolling/rotate phone and check if there is error log
Change-Id: I927a490cb25b3d3f69bed4d62da80b66de1ad430
2024-11-14 06:13:26 +00:00
Xin Li
f82af3d25e [automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: f3f28e80ff -s ours
am skip reason: Merged-In Id4f43ba150bd476426ace22c7d866ee87d5777a0 with SHA-1 0507349a4b is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/30284032

Change-Id: Idc022dd6855b86205416341b79df6fb63b82bf0b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-13 22:55:20 +00:00
Xiaofan Jiang
30306a34b5 shamp: remove fixed bug from bugmap
Bug: 360060705

Flag: NONE clean up bugmap

Change-Id: I7d71aefa766e870e8bccb100ed5ad796dbbab36b
2024-11-13 20:35:03 +00:00
Spade Lee
1239bde036 Merge "sepolicy: add label for logbuffer" into main 2024-11-13 17:00:10 +00:00
Spade Lee
f8891af46e sepolicy: add label for logbuffer
- Add logbuffer_device label for ln8411, dc_mains, dual_batt
- Remove from tracking_deniel

Bug: 377895720
Flag: EXEMPT bugfix
Change-Id: Ia542c089bcf0eb6bb4ea3e026d43937390720b22
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-12 01:46:58 +00:00
Nina Chen
2fe912350e Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 378004800
Flag: EXEMPT NDK
Change-Id: I5cdb5950053f291969b660758a3eac4deda3995c
2024-11-08 03:37:57 +00:00
Nina Chen
31d6e22220 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 377787445
Flag: EXEMPT NDK
Change-Id: I96db3485005cdaed405c8d117b1d50b5f29b533f
2024-11-07 06:39:17 +00:00
Xin Li
f3f28e80ff Merge 24Q4 (ab/12406339) into aosp-main-future
Bug: 370570306
Merged-In: Id4f43ba150bd476426ace22c7d866ee87d5777a0
Change-Id: Id0521170bfe46e3be668c19df7fff74b1bffa102
2024-11-06 10:31:21 -08:00
Nina Chen
d03f77df69 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 377412254
Flag: EXEMPT NDK
Change-Id: I1345afdb481e9f84f2dd5fe745ebf594cbc33c66
2024-11-05 05:25:33 +00:00
Julius Snipes
35b65db88f logger_app: allow logger_app to access persist.vendor.tcpdump.capture.len for logger_app
Bug: 330812097
Flag: EXEMPT sepolicy change only
Test: Confirm no selinux denial for persist.vendor.tcpdump.capture.len
Change-Id: Iff208dc590e923b413647725354d6650745ba7a1
2024-11-04 23:33:39 +00:00
Nina Chen
dde3987124 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 375564898
Bug: 375564818
Bug: 375563932
Bug: 375564360
Bug: 375521075
Flag: EXEMPT NDK
Change-Id: I582e58598cf0c89de4b9aa904c84cbb065eba36b
2024-10-25 09:11:49 +00:00
cwkao
f1471f5d65 Share same seinfo between propsetter app and GCA.
Bug: 375117470
Test: locally on komodo, the app functions as expected.
Flag: EXEMPT NDK
Change-Id: I60a6047835b23137391e3bd6edcfd1fb418a3e19
2024-10-23 16:58:52 +00:00
Thiébaud Weksteen
8b8ae291d4 Merge "Remove duplicate service entries" into main 2024-10-17 06:30:19 +00:00
Juan Yescas
c6c4da00d4 Merge "Copy 16KB developer option sepolicy to zumapro" into main 2024-10-17 01:38:36 +00:00
KRIS CHEN
ecc30e501a Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main 2024-10-16 08:39:00 +00:00
chenkris
0e859b87a1 Allow fingerprint HAL to access IGoodixFingerprintDaemon
Fix the following avc denial:
E SELinux : avc:  denied  { add } for pid=6578 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0

Flag: EXEMPT NDK
Bug: 368993793
Test: Tested fingerprint under enforcing mode
Change-Id: Iafed80d22d40e98cb0811ca84051066360f3dff8
2024-10-16 07:50:44 +00:00
Pawan Wagh
7c85388222 Copy 16KB developer option sepolicy to zumapro
avc denials from logs:

[   51.554757][  T453] type=1400 audit(1728080571.804:3): avc:  denied  { write } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.582401][  T453] type=1400 audit(1728080571.808:4): avc:  denied  { ioctl } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.618078][  T453] type=1400 audit(1728080571.808:5): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[   51.642465][  T453] type=1400 audit(1728080571.812:6): avc:  denied  { getattr } for  comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.664388][  T453] type=1400 audit(1728080571.812:7): avc:  denied  { getattr } for  comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664405][  T453] type=1400 audit(1728080571.820:8): avc:  denied  { search } for  comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664429][  T453] type=1400 audit(1728080571.832:9): avc:  denied  { write } for  comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664448][  T453] type=1400 audit(1728080571.832:10): avc:  denied  { add_name } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.717024][  T453] type=1400 audit(1728080571.832:11): avc:  denied  { create } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.786594][  T453] type=1400 audit(1728080571.836:12): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[   51.819515][  T453] type=1400 audit(1728080571.840:13): avc:  denied  { search } for  comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[   51.841747][  T453] type=1400 audit(1728080571.840:14): avc:  denied  { read } for  comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.863729][  T453] type=1400 audit(1728080571.840:15): avc:  denied  { open } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.887882][  T453] type=1400 audit(1728080571.840:16): avc:  denied  { getattr } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.912170][  T453] type=1400 audit(1728080571.840:17): avc:  denied  { map } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.944437][  T453] type=1400 audit(1728080571.840:18): avc:  denied  { execute } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.979656][  T453] type=1400 audit(1728080571.848:19): avc:  denied  { search } for  comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[   52.009905][  T453] type=1400 audit(1728080571.848:20): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.039894][  T453] type=1400 audit(1728080571.848:21): avc:  denied  { search } for  comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[   52.075681][  T453] type=1400 audit(1728080571.848:22): avc:  denied  { getattr } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.110042][  T453] type=1400 audit(1728080571.848:23): avc:  denied  { read } for  comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.151878][  T453] type=1400 audit(1728080571.848:24): avc:  denied  { open } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.185339][  T453] type=1400 audit(1728080571.848:25): avc:  denied  { read write } for  comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225138][  T453] type=1400 audit(1728080571.848:26): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225150][  T453] type=1400 audit(1728080571.848:27): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225160][  T453] type=1400 audit(1728080571.848:28): avc:  denied  { create } for  comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225170][  T453] type=1400 audit(1728080571.848:29): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225184][  T453] type=1400 audit(1728080571.852:30): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225198][  T453] type=1400 audit(1728080571.852:31): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225213][  T453] type=1400 audit(1728080571.852:32): avc:  denied  { write } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225227][  T453] type=1400 audit(1728080571.852:33): avc:  denied  { setattr } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225240][  T453] type=1400 audit(1728080571.852:34): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.264424][  T453] type=1400 audit(1728080571.852:35): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.310613][  T453] type=1400 audit(1728080571.852:36): avc:  denied  { relabelto } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.356910][  T453] type=1400 audit(1728080571.852:37): avc:  denied  { search } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.402344][  T453] type=1400 audit(1728080571.852:38): avc:  denied  { setattr } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.446523][  T453] type=1400 audit(1728080571.868:39): avc:  denied  { write } for  comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   52.481694][  T453] type=1400 audit(1728080571.876:40): avc:  denied  { remove_name } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.534169][  T453] type=1400 audit(1728080571.876:41): avc:  denied  { rename } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.552872][  T453] type=1400 audit(1728080571.892:42): avc:  denied  { read } for  comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.586267][  T453] type=1400 audit(1728080571.892:43): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.586291][  T453] type=1400 audit(1728080571.892:44): avc:  denied  { open } for  comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.636388][  T453] type=1400 audit(1728080572.012:45): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.657184][  T453] type=1400 audit(1728080572.012:46): avc:  denied  { read write } for  comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.676513][  T453] type=1400 audit(1728080572.012:47): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.704304][  T453] type=1400 audit(1728080572.012:48): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.732919][  T453] type=1400 audit(1728080572.016:49): avc:  denied  { relabelto } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.767434][  T453] type=1400 audit(1728080572.016:50): avc:  denied  { write } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.805716][  T453] type=1400 audit(1728080572.016:51): avc:  denied  { setattr } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   53.034704][  T453] type=1400 audit(1728080572.016:52): avc:  denied  { relabelto } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066603][  T453] type=1400 audit(1728080572.016:53): avc:  denied  { search } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066613][  T453] type=1400 audit(1728080572.016:54): avc:  denied  { setattr } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066624][  T453] type=1400 audit(1728080572.020:55): avc:  denied  { rename } for  comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066649][  T453] type=1400 audit(1728080572.088:56): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100566][  T453] type=1400 audit(1728080572.088:57): avc:  denied  { read write } for  comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100577][  T453] type=1400 audit(1728080572.088:58): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170745][  T453] type=1400 audit(1728080572.088:59): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170754][  T453] type=1400 audit(1728080572.092:60): avc:  denied  { relabelto } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170765][  T453] type=1400 audit(1728080572.092:61): avc:  denied  { write } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170775][  T453] type=1400 audit(1728080572.092:62): avc:  denied  { setattr } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170785][  T453] type=1400 audit(1728080572.092:63): avc:  denied  { relabelto } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170797][  T453] type=1400 audit(1728080572.092:64): avc:  denied  { search } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170811][  T453] type=1400 audit(1728080572.092:65): avc:  denied  { setattr } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170825][  T453] type=1400 audit(1728080572.092:66): avc:  denied  { relabelto } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.170839][  T453] type=1400 audit(1728080572.092:67): avc:  denied  { search } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.207440][  T453] type=1400 audit(1728080572.092:68): avc:  denied  { setattr } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.262539][  T453] type=1400 audit(1728080572.092:69): avc:  denied  { create } for  comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.291111][  T453] type=1400 audit(1728080572.092:70): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.314133][  T453] type=1400 audit(1728080572.092:71): avc:  denied  { relabelto } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.351258][  T453] type=1400 audit(1728080572.092:72): avc:  denied  { setattr } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.418367][  T453] type=1400 audit(1728080572.092:73): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.461321][  T453] type=1400 audit(1728080572.092:74): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.467294][  T453] type=1400 audit(1728080572.092:75): avc:  denied  { write } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.484014][  T453] type=1400 audit(1728080572.092:76): avc:  denied  { setattr } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.510185][  T453] type=1400 audit(1728080572.092:77): avc:  denied  { relabelto } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.527739][  T453] type=1400 audit(1728080572.092:78): avc:  denied  { search } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.544592][  T453] type=1400 audit(1728080572.092:79): avc:  denied  { sys_admin } for  comm="dump.f2fs" capability=21  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.589553][  T453] type=1400 audit(1728080572.092:80): avc:  denied  { setattr } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.660501][  T453] type=1400 audit(1728080572.092:81): avc:  denied  { relabelto } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.706160][  T453] type=1400 audit(1728080572.092:82): avc:  denied  { search } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.750214][  T453] type=1400 audit(1728080572.092:83): avc:  denied  { setattr } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.792724][  T453] type=1400 audit(1728080572.092:84): avc:  denied  { relabelto } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.833755][  T453] type=1400 audit(1728080572.092:85): avc:  denied  { write } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.866130][  T453] type=1400 audit(1728080572.092:86): avc:  denied  { setattr } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.933950][  T453] type=1400 audit(1728080572.092:87): avc:  denied  { relabelto } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   53.977389][  T453] type=1400 audit(1728080572.092:88): avc:  denied  { search } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.007088][  T453] type=1400 audit(1728080572.092:89): avc:  denied  { setattr } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.049913][  T453] type=1400 audit(1728080572.092:90): avc:  denied  { relabelto } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.102692][  T453] type=1400 audit(1728080572.092:91): avc:  denied  { write } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.144176][  T453] type=1400 audit(1728080572.092:92): avc:  denied  { setattr } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.187937][  T453] type=1400 audit(1728080572.092:93): avc:  denied  { relabelto } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.219942][  T453] type=1400 audit(1728080572.092:94): avc:  denied  { write } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.287284][  T453] type=1400 audit(1728080572.092:95): avc:  denied  { setattr } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.332099][  T453] type=1400 audit(1728080572.092:96): avc:  denied  { relabelto } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.364108][  T453] type=1400 audit(1728080572.092:97): avc:  denied  { search } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411041][  T453] type=1400 audit(1728080572.092:98): avc:  denied  { setattr } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411050][  T453] type=1400 audit(1728080572.096:99): avc:  denied  { relabelto } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411061][  T453] type=1400 audit(1728080572.096:100): avc:  denied  { write } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411075][  T453] type=1400 audit(1728080572.096:101): avc:  denied  { setattr } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411089][  T453] type=1400 audit(1728080572.096:102): avc:  denied  { create } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411103][  T453] type=1400 audit(1728080572.096:103): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411118][  T453] type=1400 audit(1728080572.096:104): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411130][  T453] type=1400 audit(1728080572.096:105): avc:  denied  { relabelto } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411139][  T453] type=1400 audit(1728080572.096:106): avc:  denied  { search } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411148][  T453] type=1400 audit(1728080572.096:107): avc:  denied  { setattr } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411157][  T453] type=1400 audit(1728080572.100:108): avc:  denied  { relabelto } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411171][  T453] type=1400 audit(1728080572.100:109): avc:  denied  { write } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411180][  T453] type=1400 audit(1728080572.100:110): avc:  denied  { setattr } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411189][  T453] type=1400 audit(1728080572.100:111): avc:  denied  { relabelto } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411198][  T453] type=1400 audit(1728080572.100:112): avc:  denied  { search } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411207][  T453] type=1400 audit(1728080572.100:113): avc:  denied  { setattr } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411216][  T453] type=1400 audit(1728080572.100:114): avc:  denied  { relabelto } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411225][  T453] type=1400 audit(1728080572.100:115): avc:  denied  { write } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411234][  T453] type=1400 audit(1728080572.100:116): avc:  denied  { setattr } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411243][  T453] type=1400 audit(1728080572.100:117): avc:  denied  { relabelto } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411252][  T453] type=1400 audit(1728080572.100:118): avc:  denied  { search } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411262][  T453] type=1400 audit(1728080572.100:119): avc:  denied  { setattr } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411274][  T453] type=1400 audit(1728080572.120:120): avc:  denied  { rename } for  comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   54.411286][  T453] type=1400 audit(1728080572.132:121): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   58.572689][  T453] type=1400 audit(1728080578.820:122): avc:  denied  { signull } for  comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[   58.735984][  T453] type=1400 audit(1728080578.984:123): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   58.844813][  T453] type=1400 audit(1728080579.092:124): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   86.597962][  T453] type=1400 audit(1728080606.848:455): avc:  granted  { read } for  comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.616310][  T453] type=1400 audit(1728080606.848:456): avc:  granted  { read open } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.645641][  T453] type=1400 audit(1728080606.848:457): avc:  granted  { getattr } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   91.030419][  T453] type=1400 audit(1728080611.268:458): avc:  denied  { open } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.171034][  T453] type=1400 audit(1728080611.268:459): avc:  denied  { getattr } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.348507][  T453] type=1400 audit(1728080611.368:460): avc:  denied  { create } for  comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[   91.556216][  T453] type=1400 audit(1728080611.784:461): avc:  denied  { create } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.591920][  T453] type=1400 audit(1728080611.784:462): avc:  denied  { open } for  comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.610505][  T453] type=1400 audit(1728080611.824:463): avc:  denied  { add_name } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[   91.615399][  T453] type=1400 audit(1728080611.824:464): avc:  denied  { create } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668729][  T453] type=1400 audit(1728080611.824:465): avc:  denied  { write open } for  comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668788][  T453] type=1400 audit(1728080611.836:466): avc:  denied  { rename } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   92.928109][  T453] type=1400 audit(1728080613.172:471): avc:  granted  { execute } for  comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[   98.286553][  T453] type=1400 audit(1728080618.536:472): avc:  granted  { read } for  comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.288073][  T453] type=1400 audit(1728080618.536:473): avc:  granted  { read open } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.817428][  T453] type=1400 audit(1728080618.536:474): avc:  granted  { getattr } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.821639][  T453] type=1400 audit(1728080619.040:475): avc:  denied  { read } for  comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.279860][  T453] type=1400 audit(1728080619.040:476): avc:  denied  { open } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.285144][  T453] type=1400 audit(1728080619.040:477): avc:  denied  { getattr } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1275): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1276): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1277): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1291): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1292): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1297): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1298): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1299): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1300): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956  5118  5118 I IntentService[D: type=1400 audit(0.0:1301): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service

Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
Chi-Wei Kao
e0c7545cd1 Merge "Add SELiunx for camera debug app (propsetter)" into main 2024-10-09 02:10:37 +00:00
cwkao
c5a7f8cc0d Add SELiunx for camera debug app (propsetter)
Add the following avc denial:
```
10-02 19:55:46.156   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=activity scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.258   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=netstats scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.263   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=content_capture scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=gpu scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=activity_task scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.416   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=voiceinteraction scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.417   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=autofill scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.425   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=sensitive_content_protection_service scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.427   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=performance_hint scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
10-02 19:55:48.156   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=audio scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
10-02 19:55:53.869   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=textservices scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:textservices_service:s0 tclass=service_manager permissive=1
```

Bug: 370472903
Test: locally on komodo
Flag: EXEMPT NDK
Change-Id: Ia1a8b42697e790f27a5da9aaa1f7c83fddf2a365
2024-10-09 02:09:57 +00:00
KRIS CHEN
522514f320 Merge "add selinux permission for fps_touch_handler wakeup" into main 2024-10-07 08:00:42 +00:00
chenkris
537bf14fe6 add selinux permission for fps_touch_handler wakeup
Fix the following avc denial:
avc:  denied  { read } for  name="wakeup96" dev="sysfs" ino=101698 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0

Bug: 371877715
Test: ls -lZ /sys/devices/platform/odm//odm:fps_touch_handler/wakeup
Flag: EXEMPT NDK
Change-Id: I9aff36eaaec914c7a9b4939353fe88f5c0565799
2024-10-07 06:36:52 +00:00
Nicole Lee
3c83ed0f7c Fix modem_logging_control sepolicy error
avc: denied  { call } for  scontext=u:r:modem_logging_control:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
avc: denied  { find } for pid=1124 uid=1000 name=vendor.samsung_slsi.telephony.hardware.oemservice.IOemService/dm0 scontext=u:r:modem_logging_control:s0 tcontext=u:object_r:hal_vendor_modem_logging_service:s0 tclass=service_manager permissive=0

Bug:356025857
Test:Start modem logging correctly
Flag: EXEMPT bug fix
Change-Id: I0de9622957d7b7b756b178153d63e796bf45e856
2024-10-06 17:05:16 +00:00
Mike McTernan
f43ae7b448 Revert "sepolicy:tracking_denials: add btlinux vendor_aoc_prop"
This reverts commit 55bd5b089d.

Reason for revert: Underlying bug fixed

Flag: EXEMPT bug fix
Bug: 353262026
Change-Id: Id04ffeb508ea7450449c0934bec646e8f7f1356f
2024-10-04 09:00:36 +00:00
Thiébaud Weksteen
f39431c3c8 Remove duplicate service entries
These entries are defined in the platform policy.

Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I113222c692b971c698684f762294565b96f8d0cb
2024-10-01 14:48:40 +10:00
Yen-Chao Chen
693260c964 remove b/350830796 and b/350830680 from bug map
Bug: 350830796
Bug: 350830680
Test: build pass
Flag: EXEMPT bugfix
Change-Id: Ic3c163ce4dd6b97289ec22f97a0c87052b049ea4
Signed-off-by: Yen-Chao Chen <davidycchen@google.com>
2024-09-30 09:24:36 +00:00
Treehugger Robot
0a301c6127 Merge "Allow hal_fingerprint_default to access sysfs_aoc_udfps" into main 2024-09-30 09:07:14 +00:00
Leo Hsieh
ac26d97317 Allow hal_fingerprint_default to access sysfs_aoc_udfps
Fix the following avc denial:
avc:  denied  { search } for  name="17000000.aoc" dev="sysfs" ino=26962 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=110484 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { read } for  name="udfps_get_disp_freq" dev="sysfs" ino=110486 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=109423 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc_udfps:s0 tclass=file permissive=0

Bug: 357976286
Test: Verify fingerprint HAL process can read/write to the sysfs node.
Flag: EXEMPT NDK
Change-Id: Ia8d6288812ef47dad2018d384f43374da7005a4a
2024-09-30 08:44:07 +00:00
YiKai Peng
bf729b7266 Update SELinux error
solution: Ie9f8fc5cce8e62b06931b77aa8cd16a3c9516fb5

Test: NA
Bug: 350830879
Flag: EXEMPT bugfix
Change-Id: I390af5bde405dc35f2cf37163975a851250c7dd2
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-09-27 05:11:22 +00:00
Feiyu Chen
80af57220f Merge "Remove b/340369535 hal_audio_default from bug map" into main 2024-09-27 00:41:38 +00:00
Feiyu Chen
a0407eaeae Remove b/340369535 hal_audio_default from bug map
It's fixed 4 months ago

Bug: 340369535
Flag: DOCS_ONLY
Change-Id: If4a6f41703686620dd9614a5fbcbf837127c3173
2024-09-26 19:24:00 +00:00
Xiaofan Jiang
4c1f2555d0 Merge "modem_svc: update sepolicy for UMI" into main 2024-09-26 18:12:25 +00:00
Treehugger Robot
abb1298206 Merge "Fix error in systemui when toggling airplane mode" into main 2024-09-26 16:11:38 +00:00
weichinweng
644a742ac7 Remove SELinux error tracing bug
Bug: 350830390
Bug: 350830756
Bug: 350830758
Test: None
Change-Id: Ib33ceebb66573dbb38c87b120daa481b3756090d
2024-09-26 07:51:52 +00:00
Xiaofan Jiang
81f027f9a1 modem_svc: update sepolicy for UMI
Bug: 357139752

09-12 14:58:18.412 21402 21402 W shared_modem_pl: type=1400 audit(0.0:445): avc:  denied  { write } for  name="modem_svc_socket" dev="dm-53" ino=55074 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=0

Flag: EXEMPT sepolicy change only

Change-Id: I0f465e6a3039cc9781142c2b0f3fc433eaa1c9dc
2024-09-25 23:32:04 +00:00
Wilson Sung
a59097a64a Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 369539751
Test: scanBugreport
Bug: 369539798
Bug: 369540515
Flag: EXEMPT NDK
Change-Id: Ib294a4c50801ddbd791ff3d05fe332f70bf17283
2024-09-25 12:46:13 +00:00
Wilson Sung
ad0fc36b80 Fix error in systemui when toggling airplane mode
avc:  denied  { read } for  name="u:object_r:radio_cdma_ecm_prop:s0" dev="tmpfs" ino=321 scontext=u:r:systemui_app:s0:c3,c257,c512,c768 tcontext=u:object_r:radio_cdma_ecm_prop:s0 tclass=file

Bug: 197722115
Bug: 359381748
Test: make selinux_policy
Flag: EXEMPT bugfix
Change-Id: I56021bacf311c7ce7e7e2f2b44b2078cedc16f1c
2024-09-25 08:39:17 +00:00