device_google_zumapro/vendor
Pawan Wagh 7c85388222 Copy 16KB developer option sepolicy to zumapro
avc denials from logs:

[   51.554757][  T453] type=1400 audit(1728080571.804:3): avc:  denied  { write } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.582401][  T453] type=1400 audit(1728080571.808:4): avc:  denied  { ioctl } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.618078][  T453] type=1400 audit(1728080571.808:5): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[   51.642465][  T453] type=1400 audit(1728080571.812:6): avc:  denied  { getattr } for  comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.664388][  T453] type=1400 audit(1728080571.812:7): avc:  denied  { getattr } for  comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664405][  T453] type=1400 audit(1728080571.820:8): avc:  denied  { search } for  comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664429][  T453] type=1400 audit(1728080571.832:9): avc:  denied  { write } for  comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664448][  T453] type=1400 audit(1728080571.832:10): avc:  denied  { add_name } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.717024][  T453] type=1400 audit(1728080571.832:11): avc:  denied  { create } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.786594][  T453] type=1400 audit(1728080571.836:12): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[   51.819515][  T453] type=1400 audit(1728080571.840:13): avc:  denied  { search } for  comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[   51.841747][  T453] type=1400 audit(1728080571.840:14): avc:  denied  { read } for  comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.863729][  T453] type=1400 audit(1728080571.840:15): avc:  denied  { open } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.887882][  T453] type=1400 audit(1728080571.840:16): avc:  denied  { getattr } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.912170][  T453] type=1400 audit(1728080571.840:17): avc:  denied  { map } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.944437][  T453] type=1400 audit(1728080571.840:18): avc:  denied  { execute } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.979656][  T453] type=1400 audit(1728080571.848:19): avc:  denied  { search } for  comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[   52.009905][  T453] type=1400 audit(1728080571.848:20): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.039894][  T453] type=1400 audit(1728080571.848:21): avc:  denied  { search } for  comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[   52.075681][  T453] type=1400 audit(1728080571.848:22): avc:  denied  { getattr } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.110042][  T453] type=1400 audit(1728080571.848:23): avc:  denied  { read } for  comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.151878][  T453] type=1400 audit(1728080571.848:24): avc:  denied  { open } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.185339][  T453] type=1400 audit(1728080571.848:25): avc:  denied  { read write } for  comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225138][  T453] type=1400 audit(1728080571.848:26): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225150][  T453] type=1400 audit(1728080571.848:27): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225160][  T453] type=1400 audit(1728080571.848:28): avc:  denied  { create } for  comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225170][  T453] type=1400 audit(1728080571.848:29): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225184][  T453] type=1400 audit(1728080571.852:30): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225198][  T453] type=1400 audit(1728080571.852:31): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225213][  T453] type=1400 audit(1728080571.852:32): avc:  denied  { write } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225227][  T453] type=1400 audit(1728080571.852:33): avc:  denied  { setattr } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225240][  T453] type=1400 audit(1728080571.852:34): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.264424][  T453] type=1400 audit(1728080571.852:35): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.310613][  T453] type=1400 audit(1728080571.852:36): avc:  denied  { relabelto } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.356910][  T453] type=1400 audit(1728080571.852:37): avc:  denied  { search } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.402344][  T453] type=1400 audit(1728080571.852:38): avc:  denied  { setattr } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.446523][  T453] type=1400 audit(1728080571.868:39): avc:  denied  { write } for  comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   52.481694][  T453] type=1400 audit(1728080571.876:40): avc:  denied  { remove_name } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.534169][  T453] type=1400 audit(1728080571.876:41): avc:  denied  { rename } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.552872][  T453] type=1400 audit(1728080571.892:42): avc:  denied  { read } for  comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.586267][  T453] type=1400 audit(1728080571.892:43): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.586291][  T453] type=1400 audit(1728080571.892:44): avc:  denied  { open } for  comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.636388][  T453] type=1400 audit(1728080572.012:45): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.657184][  T453] type=1400 audit(1728080572.012:46): avc:  denied  { read write } for  comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.676513][  T453] type=1400 audit(1728080572.012:47): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.704304][  T453] type=1400 audit(1728080572.012:48): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.732919][  T453] type=1400 audit(1728080572.016:49): avc:  denied  { relabelto } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.767434][  T453] type=1400 audit(1728080572.016:50): avc:  denied  { write } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.805716][  T453] type=1400 audit(1728080572.016:51): avc:  denied  { setattr } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   53.034704][  T453] type=1400 audit(1728080572.016:52): avc:  denied  { relabelto } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066603][  T453] type=1400 audit(1728080572.016:53): avc:  denied  { search } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066613][  T453] type=1400 audit(1728080572.016:54): avc:  denied  { setattr } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066624][  T453] type=1400 audit(1728080572.020:55): avc:  denied  { rename } for  comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066649][  T453] type=1400 audit(1728080572.088:56): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100566][  T453] type=1400 audit(1728080572.088:57): avc:  denied  { read write } for  comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100577][  T453] type=1400 audit(1728080572.088:58): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170745][  T453] type=1400 audit(1728080572.088:59): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170754][  T453] type=1400 audit(1728080572.092:60): avc:  denied  { relabelto } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170765][  T453] type=1400 audit(1728080572.092:61): avc:  denied  { write } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170775][  T453] type=1400 audit(1728080572.092:62): avc:  denied  { setattr } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170785][  T453] type=1400 audit(1728080572.092:63): avc:  denied  { relabelto } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170797][  T453] type=1400 audit(1728080572.092:64): avc:  denied  { search } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170811][  T453] type=1400 audit(1728080572.092:65): avc:  denied  { setattr } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170825][  T453] type=1400 audit(1728080572.092:66): avc:  denied  { relabelto } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.170839][  T453] type=1400 audit(1728080572.092:67): avc:  denied  { search } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.207440][  T453] type=1400 audit(1728080572.092:68): avc:  denied  { setattr } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.262539][  T453] type=1400 audit(1728080572.092:69): avc:  denied  { create } for  comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.291111][  T453] type=1400 audit(1728080572.092:70): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.314133][  T453] type=1400 audit(1728080572.092:71): avc:  denied  { relabelto } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.351258][  T453] type=1400 audit(1728080572.092:72): avc:  denied  { setattr } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.418367][  T453] type=1400 audit(1728080572.092:73): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.461321][  T453] type=1400 audit(1728080572.092:74): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.467294][  T453] type=1400 audit(1728080572.092:75): avc:  denied  { write } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.484014][  T453] type=1400 audit(1728080572.092:76): avc:  denied  { setattr } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.510185][  T453] type=1400 audit(1728080572.092:77): avc:  denied  { relabelto } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.527739][  T453] type=1400 audit(1728080572.092:78): avc:  denied  { search } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.544592][  T453] type=1400 audit(1728080572.092:79): avc:  denied  { sys_admin } for  comm="dump.f2fs" capability=21  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.589553][  T453] type=1400 audit(1728080572.092:80): avc:  denied  { setattr } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.660501][  T453] type=1400 audit(1728080572.092:81): avc:  denied  { relabelto } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.706160][  T453] type=1400 audit(1728080572.092:82): avc:  denied  { search } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.750214][  T453] type=1400 audit(1728080572.092:83): avc:  denied  { setattr } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.792724][  T453] type=1400 audit(1728080572.092:84): avc:  denied  { relabelto } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.833755][  T453] type=1400 audit(1728080572.092:85): avc:  denied  { write } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.866130][  T453] type=1400 audit(1728080572.092:86): avc:  denied  { setattr } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.933950][  T453] type=1400 audit(1728080572.092:87): avc:  denied  { relabelto } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   53.977389][  T453] type=1400 audit(1728080572.092:88): avc:  denied  { search } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.007088][  T453] type=1400 audit(1728080572.092:89): avc:  denied  { setattr } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.049913][  T453] type=1400 audit(1728080572.092:90): avc:  denied  { relabelto } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.102692][  T453] type=1400 audit(1728080572.092:91): avc:  denied  { write } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.144176][  T453] type=1400 audit(1728080572.092:92): avc:  denied  { setattr } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.187937][  T453] type=1400 audit(1728080572.092:93): avc:  denied  { relabelto } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.219942][  T453] type=1400 audit(1728080572.092:94): avc:  denied  { write } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.287284][  T453] type=1400 audit(1728080572.092:95): avc:  denied  { setattr } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.332099][  T453] type=1400 audit(1728080572.092:96): avc:  denied  { relabelto } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.364108][  T453] type=1400 audit(1728080572.092:97): avc:  denied  { search } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411041][  T453] type=1400 audit(1728080572.092:98): avc:  denied  { setattr } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411050][  T453] type=1400 audit(1728080572.096:99): avc:  denied  { relabelto } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411061][  T453] type=1400 audit(1728080572.096:100): avc:  denied  { write } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411075][  T453] type=1400 audit(1728080572.096:101): avc:  denied  { setattr } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411089][  T453] type=1400 audit(1728080572.096:102): avc:  denied  { create } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411103][  T453] type=1400 audit(1728080572.096:103): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411118][  T453] type=1400 audit(1728080572.096:104): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411130][  T453] type=1400 audit(1728080572.096:105): avc:  denied  { relabelto } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411139][  T453] type=1400 audit(1728080572.096:106): avc:  denied  { search } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411148][  T453] type=1400 audit(1728080572.096:107): avc:  denied  { setattr } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411157][  T453] type=1400 audit(1728080572.100:108): avc:  denied  { relabelto } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411171][  T453] type=1400 audit(1728080572.100:109): avc:  denied  { write } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411180][  T453] type=1400 audit(1728080572.100:110): avc:  denied  { setattr } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411189][  T453] type=1400 audit(1728080572.100:111): avc:  denied  { relabelto } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411198][  T453] type=1400 audit(1728080572.100:112): avc:  denied  { search } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411207][  T453] type=1400 audit(1728080572.100:113): avc:  denied  { setattr } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411216][  T453] type=1400 audit(1728080572.100:114): avc:  denied  { relabelto } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411225][  T453] type=1400 audit(1728080572.100:115): avc:  denied  { write } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411234][  T453] type=1400 audit(1728080572.100:116): avc:  denied  { setattr } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411243][  T453] type=1400 audit(1728080572.100:117): avc:  denied  { relabelto } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411252][  T453] type=1400 audit(1728080572.100:118): avc:  denied  { search } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411262][  T453] type=1400 audit(1728080572.100:119): avc:  denied  { setattr } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411274][  T453] type=1400 audit(1728080572.120:120): avc:  denied  { rename } for  comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   54.411286][  T453] type=1400 audit(1728080572.132:121): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   58.572689][  T453] type=1400 audit(1728080578.820:122): avc:  denied  { signull } for  comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[   58.735984][  T453] type=1400 audit(1728080578.984:123): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   58.844813][  T453] type=1400 audit(1728080579.092:124): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   86.597962][  T453] type=1400 audit(1728080606.848:455): avc:  granted  { read } for  comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.616310][  T453] type=1400 audit(1728080606.848:456): avc:  granted  { read open } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.645641][  T453] type=1400 audit(1728080606.848:457): avc:  granted  { getattr } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   91.030419][  T453] type=1400 audit(1728080611.268:458): avc:  denied  { open } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.171034][  T453] type=1400 audit(1728080611.268:459): avc:  denied  { getattr } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.348507][  T453] type=1400 audit(1728080611.368:460): avc:  denied  { create } for  comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[   91.556216][  T453] type=1400 audit(1728080611.784:461): avc:  denied  { create } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.591920][  T453] type=1400 audit(1728080611.784:462): avc:  denied  { open } for  comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.610505][  T453] type=1400 audit(1728080611.824:463): avc:  denied  { add_name } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[   91.615399][  T453] type=1400 audit(1728080611.824:464): avc:  denied  { create } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668729][  T453] type=1400 audit(1728080611.824:465): avc:  denied  { write open } for  comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668788][  T453] type=1400 audit(1728080611.836:466): avc:  denied  { rename } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   92.928109][  T453] type=1400 audit(1728080613.172:471): avc:  granted  { execute } for  comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[   98.286553][  T453] type=1400 audit(1728080618.536:472): avc:  granted  { read } for  comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.288073][  T453] type=1400 audit(1728080618.536:473): avc:  granted  { read open } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.817428][  T453] type=1400 audit(1728080618.536:474): avc:  granted  { getattr } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.821639][  T453] type=1400 audit(1728080619.040:475): avc:  denied  { read } for  comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.279860][  T453] type=1400 audit(1728080619.040:476): avc:  denied  { open } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.285144][  T453] type=1400 audit(1728080619.040:477): avc:  denied  { getattr } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1275): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1276): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1277): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1291): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1292): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1297): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1298): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1299): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1300): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956  5118  5118 I IntentService[D: type=1400 audit(0.0:1301): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service

Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
..
certs Add SELiunx for camera debug app (propsetter) 2024-10-09 02:09:57 +00:00
attributes Move vendor_persist_type to vendor 2023-11-20 12:34:01 +00:00
audioserver.te Allow audioserver access /dev/snd/pcmC0D0p 2023-12-05 08:06:50 +00:00
bootanim.te Move bootanim to vendor 2023-12-05 07:23:46 +00:00
camera_propsetter_app.te Add SELiunx for camera debug app (propsetter) 2024-10-09 02:09:57 +00:00
cccdk_timesync_app.te Allow CccDkTimeSyncService to access bluetooth extension HAL 2024-01-31 02:37:19 +00:00
charger_vendor.te Move charger_vendor from legacy to vendor 2023-12-05 08:49:40 +00:00
chre.te Move chre from legacy to vendor 2023-12-05 10:47:09 +00:00
con_monitor_app.te Update sepolicy for ConnectivityMonitor 2024-01-11 20:18:20 +00:00
debug_camera_app.te Set up zumapro selinux policy for /dev/video12 access for hardware JPG encoder. 2024-01-15 02:27:34 +00:00
device.te Move euiccpixel_app to vendor 2024-09-04 15:10:03 +00:00
disable-contaminant-detection-sh.te Set SEPolicy for the disable_contaminant_detection script 2024-02-02 18:07:36 +08:00
dump_gsa.te Move dump_gsa to vendor 2023-12-05 11:10:51 +00:00
dump_power.te Allow dump_power to create thismeal.txt by executing battery_mitigation 2023-11-03 09:58:26 +00:00
dumpstate.te Move dumpstate to vendor 2023-12-05 11:14:52 +00:00
e2fs.te Move e2fs to vendor 2023-12-05 11:25:17 +00:00
euiccpixel_app.te Move euiccpixel_app to vendor 2024-09-04 15:10:03 +00:00
file.te Allow hal_fingerprint_default to access sysfs_aoc_udfps 2024-09-30 08:44:07 +00:00
file_contexts Make android.framework.stats-v2-ndk app reachable 2024-09-20 21:41:23 -07:00
fsck.te Move fsck rule to vendor 2023-12-05 11:29:51 +00:00
genfs_contexts add selinux permission for fps_touch_handler wakeup 2024-10-07 06:36:52 +00:00
google_camera_app.te Remove legacy camera HAL policy. 2024-04-12 22:32:38 +00:00
hal_bluetooth_btlinux.te Grant BT HAL to access socket file 2024-01-24 02:47:36 +00:00
hal_camera_default.te Move sepolicy about hal_radioext_default to gs-common 2024-09-01 14:25:00 +08:00
hal_contexthub_default.te sepolicy: allow hal_gnss_pixel to connect to hal_contexthub_default 2024-05-10 09:41:57 +00:00
hal_fingerprint_default.te Allow hal_fingerprint_default to access sysfs_aoc_udfps 2024-09-30 08:44:07 +00:00
hal_gnss_pixel.te gps: Move type declaration to device folder 2024-06-11 07:52:11 +00:00
hal_graphics_composer_default.te add hal_graphics_composer to access thermal temperature 2024-07-22 12:18:58 +00:00
hal_input_processor_default.te Move hal_input_processor_default to vendor 2023-12-01 03:19:30 +00:00
hal_power_default.te zumapro: sepolicy: update ospm selinux settings. 2023-11-28 00:36:38 +00:00
hal_power_stats_default.te sepolicy: allow hal_power_stats to read GPS files 2024-02-19 16:37:21 +08:00
hal_threadnetwork_default.te Grant Thread HAL service to access BT HAL folder 2024-02-04 23:00:54 +00:00
hal_usb_gadget_impl.te hal_usb_impl: Move hal_usb_impl and hal_usb_gadget_impl to vendor 2023-11-15 17:50:29 +08:00
hal_usb_impl.te Add xhci-hcd-exynos.7 wakeup paths for suspend service 2024-07-16 19:49:52 +00:00
hal_uwb_vendor_default.te uwb: add permissions for factory uwb calib file 2023-09-11 17:36:08 +00:00
hwservice_contexts fingerprint: fix SELinux denials 2024-01-18 02:12:10 +00:00
insmod-sh.te Add insmod-sh policy 2023-12-07 04:52:04 +00:00
kernel.te sepolicy: allow kernel to search vendor debugfs 2024-04-02 07:35:39 +00:00
keys.conf Add SELiunx for camera debug app (propsetter) 2024-10-09 02:09:57 +00:00
mac_permissions.xml Add SELiunx for camera debug app (propsetter) 2024-10-09 02:09:57 +00:00
pixelstats_vendor.te add sysfs access permission on Zumapro devices. 2024-05-09 11:49:19 +00:00
property.te Copy 16KB developer option sepolicy to zumapro 2024-10-15 22:53:30 +00:00
property_contexts Copy 16KB developer option sepolicy to zumapro 2024-10-15 22:53:30 +00:00
seapp_contexts Add SELiunx for camera debug app (propsetter) 2024-10-09 02:09:57 +00:00
service.te Modem ML: Add sepolicy for TFLiteService 2024-03-06 13:35:33 +08:00
service_contexts Modem ML: Add sepolicy for TFLiteService 2024-03-06 13:35:33 +08:00
servicemanager.te Allow binder call from servicemanager to composer 2024-02-05 15:40:17 +08:00
system_server.te Modem ML: Add sepolicy for TFLiteService 2024-03-06 13:35:33 +08:00
tee.te trusty: Allow linking/read tdp and td 2024-08-07 08:41:32 +00:00
twoshay.te Update SEpolicy for grilservice_app register 2024-04-03 07:08:06 +00:00
vendor_init.te Copy 16KB developer option sepolicy to zumapro 2024-10-15 22:53:30 +00:00
vendor_uwb_init.te uwb: add permissions for factory uwb calib file 2023-09-11 17:36:08 +00:00
vndservice.te Move Exynos.HWCService to vendor/ 2023-11-30 09:39:12 +00:00
vndservice_contexts Move Exynos.HWCService to vendor/ 2023-11-30 09:39:12 +00:00