Mike Wang
6b1787d6f2
Merge "Update the PMS app seinfo for the certification change." into main
2024-11-27 16:25:53 +00:00
mikeyuewang
ec3dae0ee3
Update the PMS app seinfo for the certification change.
...
Bug: 375656221
Flag: EXEMPT selinux app context change.
Change-Id: If9bd9a3818b2f117cf26a13c2ae6940b53963b92
2024-11-27 16:23:53 +00:00
Julius Snipes
2bf44fa62f
Merge "logger_app: allow logger_app to access persist.vendor.tcpdump.capture.len for logger_app" into main
2024-11-22 21:41:33 +00:00
Liana Kazanova (xWF)
62f34d8794
Revert "modem_svc: move shared_modem_platform related sepolicy t..."
...
Revert submission 30519089-move_modem_sepolicy
Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.
Reverted changes: /q/submissionid:30519089-move_modem_sepolicy
Change-Id: I74d37465d49e31c84d5e51bb0f020988a41b66ab
2024-11-21 17:54:10 +00:00
Eileen Lai
7e11c79345
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Change-Id: I92d9a64c339f2b99e1fdc531145a950c3428dd82
Flag: NONE local testing only
2024-11-21 08:13:22 +00:00
Julius Snipes
35b65db88f
logger_app: allow logger_app to access persist.vendor.tcpdump.capture.len for logger_app
...
Bug: 330812097
Flag: EXEMPT sepolicy change only
Test: Confirm no selinux denial for persist.vendor.tcpdump.capture.len
Change-Id: Iff208dc590e923b413647725354d6650745ba7a1
2024-11-04 23:33:39 +00:00
Pawan Wagh
7c85388222
Copy 16KB developer option sepolicy to zumapro
...
avc denials from logs:
[ 51.554757][ T453] type=1400 audit(1728080571.804:3): avc: denied { write } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.582401][ T453] type=1400 audit(1728080571.808:4): avc: denied { ioctl } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.618078][ T453] type=1400 audit(1728080571.808:5): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[ 51.642465][ T453] type=1400 audit(1728080571.812:6): avc: denied { getattr } for comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.664388][ T453] type=1400 audit(1728080571.812:7): avc: denied { getattr } for comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664405][ T453] type=1400 audit(1728080571.820:8): avc: denied { search } for comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664429][ T453] type=1400 audit(1728080571.832:9): avc: denied { write } for comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664448][ T453] type=1400 audit(1728080571.832:10): avc: denied { add_name } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.717024][ T453] type=1400 audit(1728080571.832:11): avc: denied { create } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.786594][ T453] type=1400 audit(1728080571.836:12): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[ 51.819515][ T453] type=1400 audit(1728080571.840:13): avc: denied { search } for comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[ 51.841747][ T453] type=1400 audit(1728080571.840:14): avc: denied { read } for comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.863729][ T453] type=1400 audit(1728080571.840:15): avc: denied { open } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.887882][ T453] type=1400 audit(1728080571.840:16): avc: denied { getattr } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.912170][ T453] type=1400 audit(1728080571.840:17): avc: denied { map } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.944437][ T453] type=1400 audit(1728080571.840:18): avc: denied { execute } for comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.979656][ T453] type=1400 audit(1728080571.848:19): avc: denied { search } for comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[ 52.009905][ T453] type=1400 audit(1728080571.848:20): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.039894][ T453] type=1400 audit(1728080571.848:21): avc: denied { search } for comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[ 52.075681][ T453] type=1400 audit(1728080571.848:22): avc: denied { getattr } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.110042][ T453] type=1400 audit(1728080571.848:23): avc: denied { read } for comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.151878][ T453] type=1400 audit(1728080571.848:24): avc: denied { open } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.185339][ T453] type=1400 audit(1728080571.848:25): avc: denied { read write } for comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225138][ T453] type=1400 audit(1728080571.848:26): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225150][ T453] type=1400 audit(1728080571.848:27): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225160][ T453] type=1400 audit(1728080571.848:28): avc: denied { create } for comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225170][ T453] type=1400 audit(1728080571.848:29): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225184][ T453] type=1400 audit(1728080571.852:30): avc: denied { relabelfrom } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225198][ T453] type=1400 audit(1728080571.852:31): avc: denied { relabelto } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225213][ T453] type=1400 audit(1728080571.852:32): avc: denied { write } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225227][ T453] type=1400 audit(1728080571.852:33): avc: denied { setattr } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225240][ T453] type=1400 audit(1728080571.852:34): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.264424][ T453] type=1400 audit(1728080571.852:35): avc: denied { relabelfrom } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.310613][ T453] type=1400 audit(1728080571.852:36): avc: denied { relabelto } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.356910][ T453] type=1400 audit(1728080571.852:37): avc: denied { search } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.402344][ T453] type=1400 audit(1728080571.852:38): avc: denied { setattr } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.446523][ T453] type=1400 audit(1728080571.868:39): avc: denied { write } for comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 52.481694][ T453] type=1400 audit(1728080571.876:40): avc: denied { remove_name } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.534169][ T453] type=1400 audit(1728080571.876:41): avc: denied { rename } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.552872][ T453] type=1400 audit(1728080571.892:42): avc: denied { read } for comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.586267][ T453] type=1400 audit(1728080571.892:43): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.586291][ T453] type=1400 audit(1728080571.892:44): avc: denied { open } for comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.636388][ T453] type=1400 audit(1728080572.012:45): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.657184][ T453] type=1400 audit(1728080572.012:46): avc: denied { read write } for comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.676513][ T453] type=1400 audit(1728080572.012:47): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.704304][ T453] type=1400 audit(1728080572.012:48): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.732919][ T453] type=1400 audit(1728080572.016:49): avc: denied { relabelto } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.767434][ T453] type=1400 audit(1728080572.016:50): avc: denied { write } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.805716][ T453] type=1400 audit(1728080572.016:51): avc: denied { setattr } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 53.034704][ T453] type=1400 audit(1728080572.016:52): avc: denied { relabelto } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066603][ T453] type=1400 audit(1728080572.016:53): avc: denied { search } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066613][ T453] type=1400 audit(1728080572.016:54): avc: denied { setattr } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066624][ T453] type=1400 audit(1728080572.020:55): avc: denied { rename } for comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066649][ T453] type=1400 audit(1728080572.088:56): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100566][ T453] type=1400 audit(1728080572.088:57): avc: denied { read write } for comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100577][ T453] type=1400 audit(1728080572.088:58): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170745][ T453] type=1400 audit(1728080572.088:59): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170754][ T453] type=1400 audit(1728080572.092:60): avc: denied { relabelto } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170765][ T453] type=1400 audit(1728080572.092:61): avc: denied { write } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170775][ T453] type=1400 audit(1728080572.092:62): avc: denied { setattr } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170785][ T453] type=1400 audit(1728080572.092:63): avc: denied { relabelto } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170797][ T453] type=1400 audit(1728080572.092:64): avc: denied { search } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170811][ T453] type=1400 audit(1728080572.092:65): avc: denied { setattr } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170825][ T453] type=1400 audit(1728080572.092:66): avc: denied { relabelto } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.170839][ T453] type=1400 audit(1728080572.092:67): avc: denied { search } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.207440][ T453] type=1400 audit(1728080572.092:68): avc: denied { setattr } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.262539][ T453] type=1400 audit(1728080572.092:69): avc: denied { create } for comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.291111][ T453] type=1400 audit(1728080572.092:70): avc: denied { relabelfrom } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.314133][ T453] type=1400 audit(1728080572.092:71): avc: denied { relabelto } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.351258][ T453] type=1400 audit(1728080572.092:72): avc: denied { setattr } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.418367][ T453] type=1400 audit(1728080572.092:73): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.461321][ T453] type=1400 audit(1728080572.092:74): avc: denied { relabelto } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.467294][ T453] type=1400 audit(1728080572.092:75): avc: denied { write } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.484014][ T453] type=1400 audit(1728080572.092:76): avc: denied { setattr } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.510185][ T453] type=1400 audit(1728080572.092:77): avc: denied { relabelto } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.527739][ T453] type=1400 audit(1728080572.092:78): avc: denied { search } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.544592][ T453] type=1400 audit(1728080572.092:79): avc: denied { sys_admin } for comm="dump.f2fs" capability=21 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.589553][ T453] type=1400 audit(1728080572.092:80): avc: denied { setattr } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.660501][ T453] type=1400 audit(1728080572.092:81): avc: denied { relabelto } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.706160][ T453] type=1400 audit(1728080572.092:82): avc: denied { search } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.750214][ T453] type=1400 audit(1728080572.092:83): avc: denied { setattr } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.792724][ T453] type=1400 audit(1728080572.092:84): avc: denied { relabelto } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.833755][ T453] type=1400 audit(1728080572.092:85): avc: denied { write } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.866130][ T453] type=1400 audit(1728080572.092:86): avc: denied { setattr } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.933950][ T453] type=1400 audit(1728080572.092:87): avc: denied { relabelto } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 53.977389][ T453] type=1400 audit(1728080572.092:88): avc: denied { search } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.007088][ T453] type=1400 audit(1728080572.092:89): avc: denied { setattr } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.049913][ T453] type=1400 audit(1728080572.092:90): avc: denied { relabelto } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.102692][ T453] type=1400 audit(1728080572.092:91): avc: denied { write } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.144176][ T453] type=1400 audit(1728080572.092:92): avc: denied { setattr } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.187937][ T453] type=1400 audit(1728080572.092:93): avc: denied { relabelto } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.219942][ T453] type=1400 audit(1728080572.092:94): avc: denied { write } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.287284][ T453] type=1400 audit(1728080572.092:95): avc: denied { setattr } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.332099][ T453] type=1400 audit(1728080572.092:96): avc: denied { relabelto } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.364108][ T453] type=1400 audit(1728080572.092:97): avc: denied { search } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411041][ T453] type=1400 audit(1728080572.092:98): avc: denied { setattr } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411050][ T453] type=1400 audit(1728080572.096:99): avc: denied { relabelto } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411061][ T453] type=1400 audit(1728080572.096:100): avc: denied { write } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411075][ T453] type=1400 audit(1728080572.096:101): avc: denied { setattr } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411089][ T453] type=1400 audit(1728080572.096:102): avc: denied { create } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411103][ T453] type=1400 audit(1728080572.096:103): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411118][ T453] type=1400 audit(1728080572.096:104): avc: denied { relabelfrom } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411130][ T453] type=1400 audit(1728080572.096:105): avc: denied { relabelto } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411139][ T453] type=1400 audit(1728080572.096:106): avc: denied { search } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411148][ T453] type=1400 audit(1728080572.096:107): avc: denied { setattr } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411157][ T453] type=1400 audit(1728080572.100:108): avc: denied { relabelto } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411171][ T453] type=1400 audit(1728080572.100:109): avc: denied { write } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411180][ T453] type=1400 audit(1728080572.100:110): avc: denied { setattr } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411189][ T453] type=1400 audit(1728080572.100:111): avc: denied { relabelto } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411198][ T453] type=1400 audit(1728080572.100:112): avc: denied { search } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411207][ T453] type=1400 audit(1728080572.100:113): avc: denied { setattr } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411216][ T453] type=1400 audit(1728080572.100:114): avc: denied { relabelto } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411225][ T453] type=1400 audit(1728080572.100:115): avc: denied { write } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411234][ T453] type=1400 audit(1728080572.100:116): avc: denied { setattr } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411243][ T453] type=1400 audit(1728080572.100:117): avc: denied { relabelto } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411252][ T453] type=1400 audit(1728080572.100:118): avc: denied { search } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411262][ T453] type=1400 audit(1728080572.100:119): avc: denied { setattr } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411274][ T453] type=1400 audit(1728080572.120:120): avc: denied { rename } for comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 54.411286][ T453] type=1400 audit(1728080572.132:121): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 58.572689][ T453] type=1400 audit(1728080578.820:122): avc: denied { signull } for comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[ 58.735984][ T453] type=1400 audit(1728080578.984:123): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 58.844813][ T453] type=1400 audit(1728080579.092:124): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 86.597962][ T453] type=1400 audit(1728080606.848:455): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.616310][ T453] type=1400 audit(1728080606.848:456): avc: granted { read open } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.645641][ T453] type=1400 audit(1728080606.848:457): avc: granted { getattr } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 91.030419][ T453] type=1400 audit(1728080611.268:458): avc: denied { open } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.171034][ T453] type=1400 audit(1728080611.268:459): avc: denied { getattr } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.348507][ T453] type=1400 audit(1728080611.368:460): avc: denied { create } for comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[ 91.556216][ T453] type=1400 audit(1728080611.784:461): avc: denied { create } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.591920][ T453] type=1400 audit(1728080611.784:462): avc: denied { open } for comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.610505][ T453] type=1400 audit(1728080611.824:463): avc: denied { add_name } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[ 91.615399][ T453] type=1400 audit(1728080611.824:464): avc: denied { create } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668729][ T453] type=1400 audit(1728080611.824:465): avc: denied { write open } for comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668788][ T453] type=1400 audit(1728080611.836:466): avc: denied { rename } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 92.928109][ T453] type=1400 audit(1728080613.172:471): avc: granted { execute } for comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[ 98.286553][ T453] type=1400 audit(1728080618.536:472): avc: granted { read } for comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.288073][ T453] type=1400 audit(1728080618.536:473): avc: granted { read open } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.817428][ T453] type=1400 audit(1728080618.536:474): avc: granted { getattr } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.821639][ T453] type=1400 audit(1728080619.040:475): avc: denied { read } for comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.279860][ T453] type=1400 audit(1728080619.040:476): avc: denied { open } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.285144][ T453] type=1400 audit(1728080619.040:477): avc: denied { getattr } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1275): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1276): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1277): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1291): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1292): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1297): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1298): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1299): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1300): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956 5118 5118 I IntentService[D: type=1400 audit(0.0:1301): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
Nicole Lee
3c83ed0f7c
Fix modem_logging_control sepolicy error
...
avc: denied { call } for scontext=u:r:modem_logging_control:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
avc: denied { find } for pid=1124 uid=1000 name=vendor.samsung_slsi.telephony.hardware.oemservice.IOemService/dm0 scontext=u:r:modem_logging_control:s0 tcontext=u:object_r:hal_vendor_modem_logging_service:s0 tclass=service_manager permissive=0
Bug:356025857
Test:Start modem logging correctly
Flag: EXEMPT bug fix
Change-Id: I0de9622957d7b7b756b178153d63e796bf45e856
2024-10-06 17:05:16 +00:00
Xiaofan Jiang
81f027f9a1
modem_svc: update sepolicy for UMI
...
Bug: 357139752
09-12 14:58:18.412 21402 21402 W shared_modem_pl: type=1400 audit(0.0:445): avc: denied { write } for name="modem_svc_socket" dev="dm-53" ino=55074 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=0
Flag: EXEMPT sepolicy change only
Change-Id: I0f465e6a3039cc9781142c2b0f3fc433eaa1c9dc
2024-09-25 23:32:04 +00:00
Neo Yu
696b8a5777
Merge "Move sepolicy about hal_radioext_default to gs-common" into main
2024-09-06 01:41:13 +00:00
Randall Huang
21194d2dc3
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: I3fb2a9a46d00ac27931ee8c1ad7b3ceef0920cdb
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:29 +08:00
Neo Yu
d5626145f3
Move sepolicy about hal_radioext_default to gs-common
...
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I618742012138123329ae47c05c958e77f5573956
2024-09-01 14:25:00 +08:00
Xiaofan Jiang
69e2169248
Merge "Revert^2 "modem_svc: update sepolicy for UMI"" into main
2024-08-15 20:44:27 +00:00
Xiaofan Jiang
5e80ce8f29
Revert^2 "modem_svc: update sepolicy for UMI"
...
4cc3948d52
Change-Id: I54b2b463cc98b900eb3c82d8af65efb4e3b43365
2024-08-15 19:26:21 +00:00
Priyanka Advani (xWF)
e8c57a7c6a
Merge "Revert "modem_svc: update sepolicy for UMI"" into main
2024-08-15 18:30:35 +00:00
Priyanka Advani (xWF)
4cc3948d52
Revert "modem_svc: update sepolicy for UMI"
...
Revert submission 28762313
Reason for revert: Droidmonitor created revert due to b/360059249.
Reverted changes: /q/submissionid:28762313
Change-Id: I6f4407caef36b9d86f9f5246900eb30b45504da3
2024-08-15 16:16:12 +00:00
Xiaofan Jiang
cf6aa47742
Merge "modem_svc: update sepolicy for UMI" into main
2024-08-15 04:01:13 +00:00
Xiaofan Jiang
c765607120
modem_svc: update sepolicy for UMI
...
Bug: 357139752
[ 68.189198] type=1400 audit(1722986580.568:59): avc: denied { unlink } for comm="binder:892_2" name="modem_svc_socket" dev="dm-52" ino=20239 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
[ 68.189448] type=1400 audit(1722986580.568:60): avc: denied { create } for comm="binder:892_2" name="modem_svc_socket" scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
Flag: EXEMPT sepolicy
Change-Id: Ifb8acf20628b5c4c72c1c429216dcfac9d0eda27
2024-08-15 03:52:58 +00:00
Treehugger Robot
1e60b2a664
Merge "fix bipchmgr sepolicy" into main
2024-08-14 02:28:12 +00:00
Tim Lin
89db879e0a
fix bipchmgr sepolicy
...
08-13 17:12:29.544 410 410 I auditd : type=1400 audit(0.0:4): avc: denied { call } for comm="servicemanager" scontext=u:r:servicemanager:s0 tcontext=u:r:bipchmgr:s0 tclass=binder permissive=0
Bug: 359428163
Change-Id: I49d9b02b0913b36a1cea7cf05ff2b61bee1d551f
Test: SELinuxUncheckedDenialBootTest
Flag: EXEMPT bugfix
2024-08-13 14:27:46 +00:00
mikeyuewang
2ce93afc02
Grant the MDS assess the OemRil service AIDL interface.
...
avc deny:
avc: denied { find } for pid=12125 uid=10269 name=vendor.samsung_slsi.telephony.hardware.radioExternal.IOemSlsiRadioExternal/default scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:hal_vendor_radio_external_service:s0 tclass=service_manager permissive=0
2024-08-09 19:48:22.634 12125-12138 ServiceManager com.google.mds E
Bug: 357488411
Change-Id: I0d1381a7f63679880cdeffe5fe982007691d86fe
2024-08-09 19:49:15 +00:00
Mike Wang
4bd4705847
Merge "Add the selinux policy to allow the gril get/set vendor log properties." into main
2024-07-26 01:15:34 +00:00
mikeyuewang
27b55923fb
Add the selinux policy to allow the gril get/set vendor log properties.
...
avc logs:
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:96): avc: denied { read } for name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=416 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:97): avc: denied { read } for name="u:object_r:vendor_modem_prop:s0" dev="tmpfs" ino=418 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:49.592 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:99): avc: denied { write } for name="property_service" dev="tmpfs" ino=861 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 app=com.google.android.grilservice
2024-07-17 16:46:54.748 1-1 /system/bin/init init I type=1107 audit(0.0:103): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.verbose_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=property_service permissive=1'
2024-07-17 16:49:33.256 1-1 /system/bin/init init I type=1107 audit(0.0:116): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.modem.extensive_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=1'
Bug: 293947661
Change-Id: I4c7076c9b948c8bf99a71445b4632dcd0bcb3b0b
2024-07-17 20:24:56 +00:00
Munikrishna
5ca93e9b6c
sepolicy: add rules for using aidl from GRIL Service
...
allow to find hal_vendor_radio_external_service
Enable AIDL for V requirement
AVC log in b/352465089#comment1
Flag: EXEMPT HAL interface change
Bug: 341750446
Test: Physical device with atest GoogleRilServiceUnitTests
Test: Physical device VoLTE,VoWiFi Call with handover verification on HIDL and AIDL.
Test: Physical device RIL crash, modem crash HIDL/AIDL VoLTE,VoWiFi verification.
Change-Id: I800a69d9fed026c340c2b3b935feac0e0eb38c1d
2024-07-17 05:54:45 +00:00
Tim Lin
45cf6e8e26
Revert^2 "sepolicy: sepolicy for dmd/sced AIDL HAL service"
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Forrest build result in go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
def1ba3ef0
Change-Id: If2c811627e6c85220a965d248a87e81a3a193dd0
2024-07-01 08:33:31 +00:00
Tim Lin
3950f529e1
Revert^2 "sepolicy: declare hal_vendor_radio_external_service"
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Forrest build result in go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
01d2c24a52
Change-Id: I7ed8d164b90cb035535f27d076f4ed1f2656d623
2024-07-01 08:33:04 +00:00
Tim Lin
1a213269f8
Revert^2 "sepolicy: add rules for using aidl from RCS Service"
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Forrest build result in go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
fd96edd330
Change-Id: Iab4e71a06e28fd10ae0a636b9dd38b346309f193
2024-07-01 08:31:47 +00:00
Pechetty Sravani
fd96edd330
Revert "sepolicy: add rules for using aidl from RCS Service"
...
Revert submission 27917806-v_hal_migration_phase3
Reason for revert: Droidmonitor created revert due to b/350390759. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27917806-v_hal_migration_phase3
Change-Id: I6a91a1caee3f4e506d3dd2cfad48ceaa07731409
2024-07-01 06:10:59 +00:00
Pechetty Sravani
01d2c24a52
Revert "sepolicy: declare hal_vendor_radio_external_service"
...
Revert submission 27917806-v_hal_migration_phase3
Reason for revert: Droidmonitor created revert due to b/350390759. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27917806-v_hal_migration_phase3
Change-Id: I58c1591607808e8ab152c759264186411641ecf5
2024-07-01 06:10:59 +00:00
Pechetty Sravani
def1ba3ef0
Revert "sepolicy: sepolicy for dmd/sced AIDL HAL service"
...
Revert submission 27917806-v_hal_migration_phase3
Reason for revert: Droidmonitor created revert due to b/350390759. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27917806-v_hal_migration_phase3
Change-Id: I8ce8e60548c03556fb7c28e592d911809399e054
2024-07-01 06:11:06 +00:00
Sungwoo choi
5a7d99b4a3
sepolicy: sepolicy for dmd/sced AIDL HAL service
...
declare a type of service
hal_vendor_modem_logging_service : for modem logging
hal_vendor_tcpdump_service : for tcpdump
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
Change-Id: I24374cdecd7c811ac80bb1b2670168c9cc15be31
Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
2024-06-28 12:56:22 +00:00
Sungwoo choi
8dd51f11ad
sepolicy: declare hal_vendor_radio_external_service
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
Change-Id: Id523192adf8ab2d60f1778b97274f5357d06707c
Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
2024-06-28 12:53:44 +00:00
Daniel Trofimiuk
d44695709c
sepolicy: add rules for using aidl from RCS Service
...
allow to find hal_vendor_radio_external_service
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
Change-Id: I39544e24ebe732e4ebab1044eade998ef534ebf6
Signed-off-by: Daniel Trofimiuk <d.trofimiuk@samsung.com>
2024-06-28 12:49:25 +00:00
Cheng Chang
92c5aff54d
gps: Move type declaration to device folder am: 8fa884d01c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27574819
Change-Id: I8d7cd44249f8912b9fab64d24ff53381e20fc05b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 07:27:17 +00:00
Cheng Chang
8fa884d01c
gps: Move type declaration to device folder
...
Bug: 343280252
Test: b/343280252 compile and abtd test
Change-Id: I492ea0b14953cf5b0111ac70bf82240522a15494
2024-06-11 07:52:11 +00:00
Lynn Yeh
97d62f485d
Merge "gps: maintain one solution" into 24D1-dev
2024-06-11 02:25:19 +00:00
Mike Wang
45d36ab2be
Merge "Grant the Pixel Modem Service access to the SubscriptionManager." into main
2024-06-06 22:50:03 +00:00
Shinru Han
34de4a725d
Merge "gps: maintain one solution" into main
2024-06-04 06:41:30 +00:00
mikeyuewang
785df18f1e
Grant the Pixel Modem Service access to the SubscriptionManager.
...
Bug: 344624813
avc denial: avc: denied { find } for pid=2372 uid=10303 name=isub scontext=u:r:pixel_modem_app:s0:c47,c257,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0
Change-Id: I2e74ae8b364a30895e2769504efcd604f19adfa7
2024-06-03 18:54:26 +00:00
Frank Yu
3ef50e762f
Update sepolicy for all device that use radioext 1.7 interface.
...
Bug: 340791912
Test: v2/pixel-health-guard/device-boot-health-check-extra
Change-Id: Icd7b482d88f52fbde6b281ef58857bfa6a9edea8
2024-05-20 03:17:49 +00:00
Wayne Lin
89a73294a0
gps: maintain one solution
...
Bug: 315915958
Test: build pass and GPS function works
Change-Id: I15572cbfc9bc4aa5ca966a7905c6aac63bc972d5
Merged-In: I15572cbfc9bc4aa5ca966a7905c6aac63bc972d5
2024-05-06 03:52:43 +00:00
Wayne Lin
e2546691fe
gps: maintain one solution
...
Bug: 315915958
Test: build pass and GPS function works
Change-Id: I15572cbfc9bc4aa5ca966a7905c6aac63bc972d5
2024-05-06 03:09:11 +00:00
Nicole Lee
6e4b317a71
Allows modem_svc to read the logging related properties am: fc41724a97
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27176301
Change-Id: Id7b52b03bb7e09b91e73cfe3167cb87041618254
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-03 12:16:55 +00:00
Nicole Lee
fc41724a97
Allows modem_svc to read the logging related properties
...
avc: denied { read } for comm="modem_svc_sit" name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=417 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0
Bug: 337184337
Change-Id: I806eee53b4ed0414b08f6203fb07958d6e0e4be1
2024-05-03 09:48:58 +00:00
Shawn Yang
0dd672a938
Merge "[PMS]Add context for PixelModemService and allow the access to shared modem service." into main
2024-05-02 22:20:10 +00:00
mikeyuewang
5ce4700d6f
[PMS]Add context for PixelModemService and allow the access to shared modem service.
...
Bug: 335490443
Change-Id: Ie5c6b0191775d42d402632c46c34cafe77fe5e60
2024-04-26 17:02:26 +00:00
Enzo Liao
6b1e936fd8
Merge "Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common." into 24D1-dev
2024-04-25 08:22:07 +00:00
Frank Yu
7a43933e5c
Merge "Update SEpolicy for grilservice_app register callbacks of AntennaTuningService. Remove callbacks from radioext native service to grilservice_app." into 24D1-dev am: e6295955ff
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26783005
Change-Id: If67f2b8f38c48e933628b4d411b416068a42ae8a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-22 04:03:11 +00:00
Frank Yu
e6295955ff
Merge "Update SEpolicy for grilservice_app register callbacks of AntennaTuningService. Remove callbacks from radioext native service to grilservice_app." into 24D1-dev
2024-04-22 03:49:13 +00:00
Enzo Liao
e4ceb50a9c
Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
...
New paths (ag/26620507):
RamdumpService: device/google/gs-common/ramdump_app
SSRestartDetector: device/google/gs-common/ssr_detector_app
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:2761dbe28b294be5199aba6ee73013427e8d627f )
Merged-In: I455630b347f9f234365fec371142582d2cc0640a
Change-Id: I455630b347f9f234365fec371142582d2cc0640a
2024-04-22 03:03:12 +00:00