Advertisement
Captain_Throwback

MultiROM Superuser install

Dec 28th, 2015
81
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 170.56 KB | None | 0 0
  1. Starting TWRP 2.8.7 on Mon Dec 28 17:01:41 2015
  2. (pid 250)
  3. Setting SELinux to permissive
  4. TW_INCLUDE_DUMLOCK := true
  5. I:Lun file '/sys/devices/msm_dwc3/f9200000.dwc3/gadget/lun0/file'
  6. TW_INCLUDE_CRYPTO := true
  7. I:TW_BRIGHTNESS_PATH := /sys/class/leds/lcd-backlight/brightness
  8. I:Found brightness file at '/sys/class/leds/lcd-backlight/brightness'
  9. I:TWFunc::Set_Brightness: Setting brightness control to 255
  10. Starting the UI...Pixel format: 1080x1920 @ 32bpp
  11. Pixel format: RGBX_8888
  12. Not using qualcomm overlay, 'mdssfb_90000'
  13. framebuffer: fd 4 (1080 x 1920)
  14. minui: /sys/board_properties/virtualkeys.synaptics-rmi-touchscreen is 5 % 6
  15. => Linking mtab
  16. => Processing recovery.fstab
  17. I:Processing '/boot'
  18. I:Processing '/cache'
  19. I:Processing '/data'
  20. I:Processing '/misc'
  21. I:Processing '/recovery'
  22. I:Processing '/system'
  23. I:Processing '/devlog'
  24. I:Created '/devlog' folder.
  25. I:Processing '/carrier'
  26. I:Created '/carrier' folder.
  27. I:Processing '/reserve'
  28. I:Created '/reserve' folder.
  29. I:Processing '/external_sd'
  30. I:Created '/external_sd' folder.
  31. I:Processing '/sd_ext'
  32. I:Created '/sd_ext' folder.
  33. I:Processing '/usb_otg'
  34. I:Created '/usb_otg' folder.
  35. I:Using automatic handling for /data/media emulated storage device.
  36. I:Setting up '/data' as data/media emulated storage.
  37. I:Created '/sdcard' folder.
  38. I:mount -o bind '/data/media' '/sdcard' process ended with RC=0
  39. I:Created '/and-sec' folder.
  40. I:Creating Android Secure: /external_sd/.android_secure
  41. I:mount -o bind '/external_sd/.android_secure' '/and-sec' process ended with RC=0
  42. I:Backup folder set to '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  43. I:Settings storage is '/data/media/0'
  44. Updating partition details...
  45. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  46. I:Data backup size is 2841MB, free: 16583MB.
  47. I:Unable to mount '/usb_otg'
  48. I:Actual block device: '', current file system: 'vfat'
  49. ...done
  50. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  51. I:Unmounting main partitions...
  52.  
  53.  
  54. Partition Logs:
  55. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  56.  
  57. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  58. Primary_Block_Device: /dev/block/mmcblk0p42
  59. Display_Name: Boot
  60. Storage_Name: boot
  61. Backup_Path: /boot
  62. Backup_Name: boot
  63. Backup_Display_Name: Boot
  64. Storage_Path: /boot
  65. Current_File_System: emmc
  66. Fstab_File_System: emmc
  67. Backup_Method: dd
  68.  
  69. /cache | /dev/block/mmcblk0p46 | Size: 377MB Used: 6MB Free: 371MB Backup Size: 6MB Raw size: 402653184
  70.  
  71. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent
  72. Primary_Block_Device: /dev/block/mmcblk0p46
  73. Display_Name: Cache
  74. Storage_Name: Cache
  75. Backup_Path: /cache
  76. Backup_Name: cache
  77. Backup_Display_Name: Cache
  78. Storage_Path: /cache
  79. Current_File_System: ext4
  80. Fstab_File_System: ext4
  81. Backup_Method: files
  82.  
  83. /data | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 16583MB Backup Size: 2841MB Raw size: 27246198784
  84.  
  85. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  86. Symlink_Path: /data/media/0
  87. Symlink_Mount_Point: /sdcard
  88. Primary_Block_Device: /dev/block/mmcblk0p47
  89. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  90. Display_Name: Data
  91. Storage_Name: Internal Storage
  92. Backup_Path: /data
  93. Backup_Name: data
  94. Backup_Display_Name: Data
  95. Storage_Path: /data/media/0
  96. Current_File_System: ext4
  97. Fstab_File_System: ext4
  98. Backup_Method: files
  99. MTP_Storage_ID: 65539
  100.  
  101. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  102.  
  103. Flags: IsPresent
  104. Primary_Block_Device: /dev/block/mmcblk0p24
  105. Display_Name: misc
  106. Storage_Name: misc
  107. Backup_Path: /misc
  108. Backup_Name: misc
  109. Backup_Display_Name: misc
  110. Storage_Path: /misc
  111. Current_File_System: emmc
  112. Fstab_File_System: emmc
  113. Backup_Method: dd
  114.  
  115. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  116.  
  117. Flags: IsPresent Can_Flash_Img
  118. Primary_Block_Device: /dev/block/mmcblk0p43
  119. Display_Name: Recovery
  120. Storage_Name: recovery
  121. Backup_Path: /recovery
  122. Backup_Name: recovery
  123. Backup_Display_Name: Recovery
  124. Storage_Path: /recovery
  125. Current_File_System: emmc
  126. Fstab_File_System: emmc
  127. Backup_Method: dd
  128.  
  129. /system | /dev/block/mmcblk0p45 | Size: 2641MB Used: 1164MB Free: 1477MB Backup Size: 1164MB Raw size: 2818572288
  130.  
  131. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent
  132. Primary_Block_Device: /dev/block/mmcblk0p45
  133. Display_Name: System
  134. Storage_Name: System
  135. Backup_Path: /system
  136. Backup_Name: system
  137. Backup_Display_Name: System
  138. Storage_Path: /system
  139. Current_File_System: ext4
  140. Fstab_File_System: ext4
  141. Backup_Method: files
  142.  
  143. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  144.  
  145. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  146. Primary_Block_Device: /dev/block/mmcblk0p39
  147. Display_Name: devlog
  148. Storage_Name: devlog
  149. Backup_Path: /devlog
  150. Backup_Name: devlog
  151. Backup_Display_Name: devlog
  152. Storage_Path: /devlog
  153. Current_File_System: ext4
  154. Fstab_File_System: ext4
  155. Backup_Method: files
  156.  
  157. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  158.  
  159. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  160. Primary_Block_Device: /dev/block/mmcblk0p37
  161. Display_Name: carrier
  162. Storage_Name: carrier
  163. Backup_Path: /carrier
  164. Backup_Name: carrier
  165. Backup_Display_Name: carrier
  166. Storage_Path: /carrier
  167. Current_File_System: ext4
  168. Fstab_File_System: ext4
  169. Backup_Method: files
  170.  
  171. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  172.  
  173. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  174. Primary_Block_Device: /dev/block/mmcblk0p41
  175. Display_Name: reserve
  176. Storage_Name: reserve
  177. Backup_Path: /reserve
  178. Backup_Name: reserve
  179. Backup_Display_Name: reserve
  180. Storage_Path: /reserve
  181. Current_File_System: vfat
  182. Fstab_File_System: vfat
  183. Backup_Method: files
  184.  
  185. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
  186.  
  187. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  188. Symlink_Path: /external_sd/.android_secure
  189. Symlink_Mount_Point: /and-sec
  190. Primary_Block_Device: /dev/block/mmcblk1p1
  191. Alternate_Block_Device: /dev/block/mmcblk1
  192. Display_Name: Micro SDcard
  193. Storage_Name: Micro SDcard
  194. Backup_Path: /and-sec
  195. Backup_Name: and-sec
  196. Backup_Display_Name: Android Secure
  197. Storage_Path: /external_sd
  198. Current_File_System: exfat
  199. Fstab_File_System: vfat
  200. Backup_Method: files
  201. MTP_Storage_ID: 65537
  202.  
  203. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  204.  
  205. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  206. Primary_Block_Device: /dev/block/mmcblk1p2
  207. Display_Name: SD-Ext
  208. Storage_Name: SD-Ext
  209. Backup_Path: /sd_ext
  210. Backup_Name: sd_ext
  211. Backup_Display_Name: SD-Ext
  212. Storage_Path: /sd_ext
  213. Current_File_System: ext4
  214. Fstab_File_System: ext4
  215. Backup_Method: files
  216.  
  217. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  218.  
  219. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  220. Primary_Block_Device: /dev/block/sda1
  221. Alternate_Block_Device: /dev/block/sda
  222. Display_Name: USB-OTG
  223. Storage_Name: USB-OTG
  224. Backup_Path: /usb_otg
  225. Backup_Name: usb_otg
  226. Backup_Display_Name: USB-OTG
  227. Storage_Path: /usb_otg
  228. Current_File_System: vfat
  229. Fstab_File_System: vfat
  230. Backup_Method: files
  231. MTP_Storage_ID: 65538
  232.  
  233. MultiROM Recovery version: 2015-12-28 p1
  234. I:Loading package: TWRP (/script/ui.xml)
  235. I:Load XML directly
  236. I:Loading package: TWRP (/data/media/0/TWRP/theme/ui.zip)
  237. I:Loading zip theme
  238. I:Loading package: TWRP (/twres/ui.xml)
  239. I:Load XML directly
  240. I:Checking resolution...
  241. I:Loading resources...
  242. open_png /twres/images/statusbar.png
  243. open_png /twres/images/actionbar.png
  244. open_png /twres/images/actionbar_tab.png
  245. open_png /twres/images/actionbar_ex.png
  246. open_png /twres/images/actionbar_logo.png
  247. open_png /twres/images/actionbar_back.png
  248. open_png /twres/images/actionbar_back_hl.png
  249. open_png /twres/images/actionbar_settings.png
  250. open_png /twres/images/actionbar_settings_hl.png
  251. open_png /twres/images/actionbar_overflow.png
  252. open_png /twres/images/actionbar_overflow_hl.png
  253. open_png /twres/images/actionbar_pin.png
  254. open_png /twres/images/actionbar_pin_hl.png
  255. open_png /twres/images/actionbar_pinned.png
  256. open_png /twres/images/actionbar_pinned_hl.png
  257. open_png /twres/images/actionbar_refresh.png
  258. open_png /twres/images/actionbar_refresh_hl.png
  259. open_png /twres/images/actionbar_sort.png
  260. open_png /twres/images/actionbar_sort_hl.png
  261. open_png /twres/images/actionbar_reset.png
  262. open_png /twres/images/actionbar_reset_hl.png
  263. open_png /twres/images/actionbar_font_big.png
  264. open_png /twres/images/actionbar_font_big_hl.png
  265. open_png /twres/images/actionbar_font_small.png
  266. open_png /twres/images/actionbar_font_small_hl.png
  267. open_png /twres/images/actionbar_theme.png
  268. open_png /twres/images/actionbar_theme_hl.png
  269. open_png /twres/images/actionbar_encr_dis.png
  270. open_png /twres/images/actionbar_encr_dis_hl.png
  271. open_png /twres/images/actionbar_encr_ena.png
  272. open_png /twres/images/actionbar_encr_ena_hl.png
  273. open_png /twres/images/actionbar_delete.png
  274. open_png /twres/images/actionbar_delete_hl.png
  275. open_png /twres/images/actionbar_edit.png
  276. open_png /twres/images/actionbar_edit_hl.png
  277. open_png /twres/images/actionbar_close.png
  278. open_png /twres/images/actionbar_close_hl.png
  279. open_png /twres/images/btn_float_addtoqueue.png
  280. open_png /twres/images/btn_float_addtoqueue_hl.png
  281. open_png /twres/images/btn_float_flashifyinfo.png
  282. open_png /twres/images/btn_float_flashifyinfo_hl.png
  283. open_png /twres/images/btn_float_accept.png
  284. open_png /twres/images/btn_float_folder.png
  285. open_png /twres/images/btn_menu_zip.png
  286. open_png /twres/images/btn_menu_zip_sel.png
  287. open_png /twres/images/btn_menu_img.png
  288. open_png /twres/images/btn_menu_img_sel.png
  289. open_png /twres/images/btn_menu_name_a.png
  290. open_png /twres/images/btn_menu_name_a_sel.png
  291. open_png /twres/images/btn_menu_name_d.png
  292. open_png /twres/images/btn_menu_name_d_sel.png
  293. open_png /twres/images/btn_menu_date_a.png
  294. open_png /twres/images/btn_menu_date_a_sel.png
  295. open_png /twres/images/btn_menu_date_d.png
  296. open_png /twres/images/btn_menu_date_d_sel.png
  297. open_png /twres/images/btn_menu_size_a.png
  298. open_png /twres/images/btn_menu_size_a_sel.png
  299. open_png /twres/images/btn_menu_size_d.png
  300. open_png /twres/images/btn_menu_size_d_sel.png
  301. open_png /twres/images/btn_menu_inject.png
  302. open_png /twres/images/btn_menu_settings.png
  303. open_png /twres/images/btn_flat_less.png
  304. open_png /twres/images/btn_flat_more.png
  305. open_png /twres/images/btn_flat_ext3.png
  306. open_png /twres/images/btn_flat_ext4.png
  307. open_png /twres/images/btn_flat_installdumlock.png
  308. open_png /twres/images/btn_flat_reflashrecovery.png
  309. open_png /twres/images/btn_flat_restoreboot.png
  310. open_png /twres/images/btn_flat_injectbootsector.png
  311. open_png /twres/images/btn_flat_rot0.png
  312. open_png /twres/images/btn_flat_rot90.png
  313. open_png /twres/images/btn_flat_rot180.png
  314. open_png /twres/images/btn_flat_rot270.png
  315. open_png /twres/images/btn_raised_clearqueue.png
  316. open_png /twres/images/btn_raised_viewqueue.png
  317. open_png /twres/images/btn_raised_installscript.png
  318. open_png /twres/images/btn_raised_wipecaches.png
  319. open_png /twres/images/btn_raised_rebootsystem.png
  320. open_png /twres/images/btn_raised_rebootrecovery.png
  321. open_png /twres/images/btn_raised_formatdata.png
  322. open_png /twres/images/btn_raised_filesystem.png
  323. open_png /twres/images/btn_raised_fsoptions.png
  324. open_png /twres/images/btn_raised_fsrepair.png
  325. open_png /twres/images/btn_raised_fschange.png
  326. open_png /twres/images/btn_raised_fsresize.png
  327. open_png /twres/images/btn_raised_keepreadonly.png
  328. open_png /twres/images/btn_raised_disconnect.png
  329. open_png /twres/images/btn_raised_advancedwipe.png
  330. open_png /twres/images/btn_raised_back.png
  331. open_png /twres/images/btn_raised_decryptdata.png
  332. open_png /twres/images/btn_raised_enablemtp.png
  333. open_png /twres/images/btn_raised_disablemtp.png
  334. open_png /twres/images/btn_raised_usbstorage.png
  335. open_png /twres/images/btn_raised_cancel.png
  336. open_png /twres/images/btn_raised_noinstall.png
  337. open_png /twres/images/btn_raised_changetheme.png
  338. open_png /twres/images/btn_raised_changesplash.png
  339. open_png /twres/images/btn_raised_wipeencryption.png
  340. open_png /twres/images/btn_raised_mr_addrom.png
  341. open_png /twres/images/btn_raised_mr_swaproms.png
  342. open_png /twres/images/btn_raised_mr_delete.png
  343. open_png /twres/images/btn_raised_mr_rename.png
  344. open_png /twres/images/btn_raised_mr_backup.png
  345. open_png /twres/images/btn_raised_mr_wipedata.png
  346. open_png /twres/images/btn_raised_mr_wipedalvik.png
  347. open_png /twres/images/btn_raised_mr_wipecache.png
  348. open_png /twres/images/btn_raised_mr_addboot.png
  349. open_png /twres/images/btn_raised_mr_remboot.png
  350. open_png /twres/images/btn_raised_mr_addradio.png
  351. open_png /twres/images/btn_raised_mr_remradio.png
  352. open_png /twres/images/btn_raised_mr_flashzip.png
  353. open_png /twres/images/btn_raised_mr_sideload.png
  354. open_png /twres/images/btn_raised_mr_repatchinit.png
  355. open_png /twres/images/btn_raised_mr_next.png
  356. open_png /twres/images/btn_raised_mr_zipfile.png
  357. open_png /twres/images/btn_raised_mr_addfile.png
  358. open_png /twres/images/btn_raised_mr_selectimage.png
  359. open_png /twres/images/btn_raised_mr_restorecon.png
  360. open_png /twres/images/btn_appenddate.png
  361. open_png /twres/images/clr_red.png
  362. open_png /twres/images/clr_pink.png
  363. open_png /twres/images/clr_indigo.png
  364. open_png /twres/images/clr_blue.png
  365. open_png /twres/images/clr_lightblue.png
  366. open_png /twres/images/clr_teal.png
  367. open_png /twres/images/clr_green.png
  368. open_png /twres/images/clr_lightgreen.png
  369. open_png /twres/images/clr_lime.png
  370. open_png /twres/images/clr_amber.png
  371. open_png /twres/images/clr_orange.png
  372. open_png /twres/images/clr_deeporange.png
  373. open_png /twres/images/clr_brown.png
  374. open_png /twres/images/clr_grey.png
  375. open_png /twres/images/clr_bluegrey.png
  376. open_png /twres/images/background.png
  377. open_png /twres/images/divider.png
  378. open_png /twres/images/divider_list.png
  379. open_png /twres/images/divider_wide.png
  380. open_png /twres/images/hider_ab_ex.png
  381. open_png /twres/images/dialog_bg.png
  382. open_png /twres/images/dialog_label_storage.png
  383. open_png /twres/images/dialog_label_bookmark.png
  384. open_png /twres/images/dialog_label_restoresettings.png
  385. open_png /twres/images/dialog_label_settheme.png
  386. open_png /twres/images/dialog_label_color.png
  387. open_png /twres/images/dialog_label_encryption.png
  388. open_png /twres/images/dialog_label_decryption.png
  389. open_png /twres/images/dialog_label_offset.png
  390. open_png /twres/images/dialog_label_removetheme.png
  391. open_png /twres/images/dialog_label_warning.png
  392. open_png /twres/images/menu_install.png
  393. open_png /twres/images/menu_sort.png
  394. open_png /twres/images/db_ok.png
  395. open_png /twres/images/db_ok_hl.png
  396. open_png /twres/images/db_cancel.png
  397. open_png /twres/images/db_cancel_hl.png
  398. open_png /twres/images/bs_bg.png
  399. open_png /twres/images/bs_btn_copy.png
  400. open_png /twres/images/bs_btn_cut.png
  401. open_png /twres/images/bs_btn_chmod755.png
  402. open_png /twres/images/bs_btn_chmod644.png
  403. open_png /twres/images/bs_btn_chmod.png
  404. open_png /twres/images/bs_btn_delete.png
  405. open_png /twres/images/bs_btn_rename.png
  406. open_png /twres/images/bs_close.png
  407. open_png /twres/images/bc_install.png
  408. open_png /twres/images/bc_install_zip.png
  409. open_png /twres/images/bc_install_zip_m.png
  410. open_png /twres/images/bc_install_image.png
  411. open_png /twres/images/bc_install_image_m.png
  412. open_png /twres/images/bc_wipe.png
  413. open_png /twres/images/bc_backup.png
  414. open_png /twres/images/bc_restore.png
  415. open_png /twres/images/bc_mount.png
  416. open_png /twres/images/bc_advanced.png
  417. open_png /twres/images/bc_filemanager.png
  418. open_png /twres/images/bc_restart.png
  419. open_png /twres/images/bc_confirmaction.png
  420. open_png /twres/images/bc_working.png
  421. open_png /twres/images/bc_done.png
  422. open_png /twres/images/bc_settings.png
  423. open_png /twres/images/bc_settings_theme.png
  424. open_png /twres/images/bc_terminal.png
  425. open_png /twres/images/bc_sideload.png
  426. open_png /twres/images/bc_installsu.png
  427. open_png /twres/images/bc_about.png
  428. open_png /twres/images/bc_partsdcard.png
  429. open_png /twres/images/bc_dumlock.png
  430. open_png /twres/images/bc_multirom.png
  431. open_png /twres/images/bc_multiromsettings.png
  432. open_png /twres/images/mb_empty.png
  433. open_png /twres/images/mb_empty_s.png
  434. open_png /twres/images/mb_install.png
  435. open_png /twres/images/mb_wipe.png
  436. open_png /twres/images/mb_backup.png
  437. open_png /twres/images/mb_restore.png
  438. open_png /twres/images/mb_mount.png
  439. open_png /twres/images/mb_filemanager.png
  440. open_png /twres/images/mb_advanced.png
  441. open_png /twres/images/mb_restart.png
  442. open_png /twres/images/mb_system.png
  443. open_png /twres/images/mb_recovery.png
  444. open_png /twres/images/mb_bootloader.png
  445. open_png /twres/images/mb_theme.png
  446. open_png /twres/images/mb_poweroff.png
  447. open_png /twres/images/mb_download.png
  448. open_png /twres/images/mb_logtosd.png
  449. open_png /twres/images/mb_fixpermissions.png
  450. open_png /twres/images/mb_terminalcommand.png
  451. open_png /twres/images/mb_adbsideload.png
  452. open_png /twres/images/mb_dumlock.png
  453. open_png /twres/images/mb_reinjecttwrp.png
  454. open_png /twres/images/mb_partsdcard.png
  455. open_png /twres/images/mb_multirom.png
  456. open_png /twres/images/mb_install_color.png
  457. open_png /twres/images/mb_wipe_color.png
  458. open_png /twres/images/mb_backup_color.png
  459. open_png /twres/images/mb_restore_color.png
  460. open_png /twres/images/mb_mount_color.png
  461. open_png /twres/images/mb_filemanager_color.png
  462. open_png /twres/images/mb_advanced_color.png
  463. open_png /twres/images/mb_restart_color.png
  464. open_png /twres/images/mb_system_color.png
  465. open_png /twres/images/mb_recovery_color.png
  466. open_png /twres/images/mb_bootloader_color.png
  467. open_png /twres/images/mb_theme_color.png
  468. open_png /twres/images/mb_poweroff_color.png
  469. open_png /twres/images/mb_download_color.png
  470. open_png /twres/images/mb_logtosd_color.png
  471. open_png /twres/images/mb_fixpermissions_color.png
  472. open_png /twres/images/mb_terminalcommand_color.png
  473. open_png /twres/images/mb_adbsideload_color.png
  474. open_png /twres/images/mb_dumlock_color.png
  475. open_png /twres/images/mb_reinjecttwrp_color.png
  476. open_png /twres/images/mb_partsdcard_color.png
  477. open_png /twres/images/mb_multirom_color.png
  478. open_png /twres/images/icon_info.png
  479. open_png /twres/images/icon_warning.png
  480. open_png /twres/images/icon_person.png
  481. open_png /twres/images/icon_mail.png
  482. open_png /twres/images/icon_palette.png
  483. open_png /twres/images/icon_cake.png
  484. open_png /twres/images/icon_color.png
  485. open_png /twres/images/icon_confirm.png
  486. open_png /twres/images/file.png
  487. open_png /twres/images/folder.png
  488. open_png /twres/images/unlock_icon.png
  489. open_png /twres/images/folder_mr.png
  490. open_png /twres/images/indeterminate001.png
  491. open_png /twres/images/indeterminate002.png
  492. open_png /twres/images/indeterminate003.png
  493. open_png /twres/images/indeterminate004.png
  494. open_png /twres/images/indeterminate005.png
  495. open_png /twres/images/indeterminate006.png
  496. open_png /twres/images/indeterminate007.png
  497. open_png /twres/images/indeterminate008.png
  498. open_png /twres/images/indeterminate009.png
  499. open_png /twres/images/indeterminate010.png
  500. open_png /twres/images/indeterminate011.png
  501. open_png /twres/images/indeterminate012.png
  502. open_png /twres/images/indeterminate013.png
  503. open_png /twres/images/indeterminate014.png
  504. open_png /twres/images/indeterminate015.png
  505. open_png /twres/images/indeterminate016.png
  506. open_png /twres/images/indeterminate017.png
  507. open_png /twres/images/indeterminate018.png
  508. open_png /twres/images/indeterminate019.png
  509. open_png /twres/images/indeterminate020.png
  510. open_png /twres/images/indeterminate021.png
  511. open_png /twres/images/indeterminate022.png
  512. open_png /twres/images/indeterminate023.png
  513. open_png /twres/images/indeterminate024.png
  514. open_png /twres/images/indeterminate025.png
  515. open_png /twres/images/progress_empty.png
  516. open_png /twres/images/progress_fill.png
  517. open_png /twres/images/checkbox_false.png
  518. open_png /twres/images/checkbox_true.png
  519. open_png /twres/images/checkbox_false_d.png
  520. open_png /twres/images/checkbox_true_d.png
  521. open_png /twres/images/radio_false.png
  522. open_png /twres/images/radio_true.png
  523. open_png /twres/images/radio_false_d.png
  524. open_png /twres/images/radio_true_d.png
  525. open_png /twres/images/home.png
  526. open_png /twres/images/home_hl.png
  527. open_png /twres/images/back.png
  528. open_png /twres/images/back_hl.png
  529. open_png /twres/images/slideout.png
  530. open_png /twres/images/slideout_hl.png
  531. open_png /twres/images/slider.png
  532. open_png /twres/images/slider_used.png
  533. open_png /twres/images/slider_lock.png
  534. open_png /twres/images/slider_lock_used.png
  535. open_png /twres/images/slider_lock_handle.png
  536. open_png /twres/images/handle.png
  537. open_png /twres/images/handle_h.png
  538. open_png /twres/images/keyboard1.png
  539. open_png /twres/images/keyboard2.png
  540. open_png /twres/images/keyboard3.png
  541. open_png /twres/images/keyboard4.png
  542. open_png /twres/images/keyboard_shadow.png
  543. open_png /twres/images/usb.png
  544. open_png /twres/images/input_line.png
  545. open_png /twres/images/input_line_dialog.png
  546. open_png /twres/images/input_line_fail_backupname.png
  547. open_png /twres/images/input_line_fail_dialog_encr.png
  548. open_png /twres/images/input_line_fail_decr.png
  549. open_png /twres/images/input_line_fail_romname.png
  550. open_png /twres/images/tab_misc.png
  551. open_png /twres/images/tab_misc_a.png
  552. open_png /twres/images/tab_display.png
  553. open_png /twres/images/tab_display_a.png
  554. open_png /twres/images/tab_time.png
  555. open_png /twres/images/tab_time_a.png
  556. open_png /twres/images/tab_vibration.png
  557. open_png /twres/images/tab_vibration_a.png
  558. open_png /twres/images/tab_mr_bootmenu.png
  559. open_png /twres/images/tab_mr_bootmenu_a.png
  560. open_png /twres/images/tab_mr_autoboot.png
  561. open_png /twres/images/tab_mr_autoboot_a.png
  562. open_png /twres/images/cursor.png
  563. I:Loading variables...
  564. I:Loading mouse cursor...
  565. I:Loading pages...
  566. I:PageSet::CheckInclude loading filename: '/twres/light_mr.xml'
  567. I:Loading included resources...
  568. I:Loading included variables...
  569. I:Loading mouse cursor...
  570. I:Loading included pages...
  571. I:Loading page main
  572. I:Loading page main2
  573. I:Loading page settings
  574. I:Loading page timezone
  575. I:Loading page screen
  576. I:Loading page vibrate
  577. I:Loading page theme_settings
  578. I:Loading page theme_color
  579. I:Loading page set_color
  580. I:Loading page theme_swap
  581. I:Loading page theme_splash
  582. I:Loading page theme_splash_info
  583. I:Loading page theme_splash_select_img
  584. I:Loading page theme_splash_select_jpg
  585. I:Loading page theme_splash_flash
  586. I:Loading page theme_splash_flash_done
  587. I:Loading page install
  588. I:Loading page install_image
  589. I:Loading page flash_confirm
  590. I:Loading page queueview
  591. I:Loading page flash_aromafm_confirm
  592. I:Loading page flash_image_confirm
  593. I:Loading page flash_image_confirm_f
  594. I:Loading page flash_image_info
  595. I:Loading page add_zip
  596. I:Loading page flash_zip
  597. I:Loading page flash_image
  598. I:Loading page flash_done
  599. I:Loading page flash_image_done
  600. I:Loading page clear_vars
  601. I:Loading page confirm_action
  602. I:Loading page action_page
  603. I:Loading page singleaction_page
  604. I:Loading page action_complete
  605. I:Loading page reboot
  606. I:Loading page filecheck
  607. I:Loading page themecheck
  608. I:Loading page rebootcheck
  609. I:Loading page wipe
  610. I:Loading page advancedwipe
  611. I:Loading page formatdata
  612. I:Loading page formatdata_confirm
  613. I:Loading page checkpartitionlist
  614. I:Loading page partitionoptions
  615. I:Loading page refreshfilesystem
  616. I:Loading page selectfilesystem
  617. I:Loading page wipe_confirm_action
  618. I:Loading page wipe_action_page
  619. I:Loading page wipe_action_complete
  620. I:Loading page backup
  621. I:Loading page backupname1
  622. I:Loading page backupname2
  623. I:Loading page checkbackuppassword
  624. I:Loading page backup_run
  625. I:Loading page backup_action_complete
  626. I:Loading page restore
  627. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  628. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  629. I:Loading page restore_read
  630. I:Loading page restore_decrypt
  631. I:Loading page try_restore_decrypt
  632. I:Loading page restore_select
  633. I:Loading page renamebackup
  634. I:Loading page deletebackup
  635. I:Loading page restore_run
  636. I:Loading page restore_confirm_action
  637. I:Loading page restore_action_page
  638. I:Loading page restore_action_complete
  639. I:Loading page mount
  640. I:Loading page usb_mount
  641. I:Loading page usb_umount
  642. I:Loading page system_readonly_check
  643. I:Loading page system_readonly
  644. I:Loading page decrypt
  645. I:Loading page decrypt_pattern
  646. I:Loading page trydecrypt
  647. I:Loading page filemanagerlist
  648. I:Loading page filemanageroptions
  649. I:Loading page choosedestinationfolder
  650. I:Loading page filemanagerrenamefile
  651. I:Loading page filemanagerrenamefolder
  652. I:Loading page filemanagerchmod
  653. I:Loading page filemanagerconfirm
  654. I:Loading page filemanageraction
  655. I:Loading page filemanagercomplete
  656. I:Loading page advanced
  657. I:Loading page fixpermissions
  658. I:Loading page partsdcard
  659. I:Loading page htcdumlock
  660. I:Loading page terminalfolder
  661. I:Loading page terminalcommand
  662. I:Loading page sideload
  663. I:Loading page installsu
  664. I:Loading page lock
  665. I:Loading page about
  666. I:Loading page console
  667. I:Loading page menu_install
  668. I:Loading page menu_sort
  669. I:Loading page dialog_storage
  670. I:Loading page dialog_color
  671. I:Loading page dialog_encryption1
  672. I:Loading page dialog_encryption2
  673. I:Loading page dialog_folder
  674. I:Loading page dialog_settheme
  675. I:Loading page dialog_offset
  676. I:Loading page dialog_reset
  677. I:Loading page dialog_reset_theme
  678. I:Loading page dialog_remove_theme
  679. I:Loading page dialog_warning
  680. I:Loading page multirom_msg
  681. I:Loading page multirom_main
  682. I:Loading page multirom_list
  683. I:Unable to open ''
  684. I:Loading page multirom_manage
  685. I:Loading page multirom_manage_inject_select
  686. I:Loading page multirom_manage_flash_select
  687. I:Loading page multirom_manage_flash_confirm
  688. I:Loading page multirom_manage_confirm_action
  689. I:Loading page multirom_rename
  690. I:Loading page multirom_do_rename
  691. I:Loading page multirom_settings
  692. I:Loading page multirom_settings_autoboot
  693. I:Loading page multirom_settings_rename_internal
  694. I:Loading page multirom_inject
  695. I:Loading page multirom_inject_select
  696. I:Loading page multirom_add
  697. I:Loading page multirom_add_sailfish
  698. I:Loading page multirom_add_source
  699. I:Loading page multirom_add_select
  700. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  701. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  702. I:Loading page multirom_add_start_process
  703. I:Loading page multirom_add_confirm_action
  704. I:Loading page multirom_add_image_size
  705. I:Loading page multirom_change_img_size
  706. I:Loading page multirom_confirm_action
  707. I:Loading page multirom_action_page
  708. I:Loading page multirom_action_complete
  709. I:Loading page multirom_sideload_complete
  710. I:Loading page multirom_swap
  711. I:Loading page multirom_swap_set_internal_name
  712. I:Loading page multirom_swap_space_info
  713. I:Loading page multirom_set_list_loc
  714. I:Loading page menu_multirom
  715. I:Loading page dialog_storage_mr
  716. I:Set page: 'clear_vars'
  717. I:Set page: 'main2'
  718. I:Switching packages (TWRP)
  719. SELinux contexts loaded from /file_contexts
  720. Full SELinux support is present.
  721. Startup Commands:
  722. ro.com.google.clientidbase=android-google
  723. ro.com.android.dateformat=MM-dd-yyyy
  724. ro.com.android.dataroaming=true
  725. ro.com.android.wifi-watchlist=GoogleGuest
  726. ro.ril.oem.ecclist=911
  727. ro.ril.set.mtusize=1422
  728. ro.ril.svdo=true
  729. ro.ril.hsdpa.category=14
  730. ro.ril.hsxpa=4
  731. ro.ril.enable.a53=1
  732. ro.ril.enable.sdr=0
  733. ro.ril.enable.gea3=1
  734. ro.ril.enable.r8fd=1
  735. ro.ril.disable.fd.plmn.prefix=23402,23410,23411,23420
  736. ro.ril.disable.cpc=1
  737. ro.url.legal=http://www.google.com/intl/%s/mobile/android/basic/phone-legal.html
  738. ro.boot.dq=PASS
  739. ro.boot.lb=1
  740. ro.boot.cid=22222222
  741. ro.boot.mid=0P6B70000
  742. ro.boot.emmc=true
  743. ro.boot.mode=recovery
  744. ro.boot.podt=0x3E8
  745. ro.boot.engid=0
  746. ro.boot.ddrmid=(0x1)
  747. ro.boot.carrier=COMMON
  748. ro.boot.keycaps=qwerty
  749. ro.boot.selinux=permissive
  750. ro.boot.baseband=1.09.20.0209
  751. ro.boot.hardware=qcom
  752. ro.boot.pagesize=2048
  753. ro.boot.rom_type=NORMAL
  754. ro.boot.serialno=HT444SF01255
  755. ro.boot.devicerev=5
  756. ro.boot.bootloader=3.19.0.0000
  757. ro.boot.efuse_info=SL
  758. ro.boot.batt_poweron=good_battery
  759. ro.cdma.home.operator.alpha=Sprint
  760. ro.cdma.home.operator.numeric=310120
  761. ro.hwui.path_cache_size=32
  762. ro.hwui.layer_cache_size=48
  763. ro.hwui.texture_cache_size=72
  764. ro.hwui.gradient_cache_size=1
  765. ro.hwui.r_buffer_cache_size=8
  766. ro.hwui.drop_shadow_cache_size=6
  767. ro.hwui.text_large_cache_width=2048
  768. ro.hwui.text_small_cache_width=1024
  769. ro.hwui.text_large_cache_height=1024
  770. ro.hwui.text_small_cache_height=1024
  771. ro.hwui.texture_cache_flushrate=0.4
  772. ro.omni.device=m8
  773. ro.omni.version=5.1.1-20151228-m8-HOMEMADE
  774. ro.twrp.boot=1
  775. ro.twrp.version=2.8.7
  776. ro.wifi.channels=
  777. ro.allow.mock.location=1
  778. ro.board.platform=msm8974
  779. ro.build.id=LYZ28J
  780. ro.build.date=Mon Dec 28 10:53:57 EST 2015
  781. ro.build.date.utc=0
  782. ro.build.host=QuadCore-SSD-BuildBox
  783. ro.build.tags=test-keys
  784. ro.build.type=eng
  785. ro.build.user=throwback
  786. ro.build.flavor=omni_m8-eng
  787. ro.build.display.id=omni_m8-eng 5.1.1 LYZ28J eng.throwback.20151228.105339 test-keys
  788. ro.build.product=m8
  789. ro.build.version.sdk=22
  790. ro.build.version.base_os=
  791. ro.build.version.release=5.1.1
  792. ro.build.version.codename=REL
  793. ro.build.version.incremental=eng.throwback.20151228.105339
  794. ro.build.version.all_codenames=REL
  795. ro.build.version.security_patch=2015-11-01
  796. ro.build.description=4.20.651.10 CL476182 release-keys
  797. ro.build.fingerprint=htc/sprint_wwe/htc_m8whl:5.0.1/LRX22C/476182.10:user/release-keys
  798. ro.build.characteristics=default
  799. ro.config.ringtone=Orion.ogg
  800. ro.config.alarm_alert=Argon.ogg
  801. ro.config.notification_sound=pixiedust.ogg
  802. ro.dalvik.vm.native.bridge=0
  803. ro.kernel.android.checkjni=1
  804. ro.secure=0
  805. ro.zygote=zygote32
  806. ro.carrier=unknown
  807. ro.product.cpu.abi=armeabi-v7a
  808. ro.product.cpu.abi2=armeabi
  809. ro.product.cpu.abilist=armeabi-v7a,armeabi
  810. ro.product.cpu.abilist32=armeabi-v7a,armeabi
  811. ro.product.cpu.abilist64=
  812. ro.product.board=MSM8974
  813. ro.product.brand=htc
  814. ro.product.model=831C
  815. ro.product.device=htc_m8whl
  816. ro.product.locale.region=US
  817. ro.product.locale.language=en
  818. ro.product.manufacturer=htc
  819. ro.baseband=1.09.20.0209
  820. ro.bootmode=recovery
  821. ro.hardware=qcom
  822. ro.revision=0
  823. ro.serialno=HT444SF01255
  824. ro.9kramdump=0
  825. ro.telephony.ril_class=m8sprRIL
  826. ro.telephony.default_network=8
  827. ro.telephony.default_cdma_sub=1
  828. ro.alarm_boot=false
  829. ro.bootloader=3.19.0.0000
  830. ro.debuggable=1
  831. ro.modversion=OmniROM-5.1.1-20151228-m8-HOMEMADE
  832. ro.factorytest=0
  833. ro.setupwizard.enterprise_mode=1
  834. gsm.sim.operator.alpha=Sprint
  835. gsm.sim.operator.numeric=310120
  836. gsm.operator.alpha=310120
  837. gsm.operator.numeric=310120
  838. net.bt.name=Android
  839. net.change=net.bt.name
  840. init.svc.adbd=running
  841. init.svc.healthd=running
  842. init.svc.ueventd=running
  843. init.svc.recovery=running
  844. init.svc.chargeled=running
  845. init.svc.choice_fn=stopped
  846. init.svc.set_permissive=stopped
  847. rild.libargs=-d /dev/smd0
  848. twrp.crash_counter=0
  849. dalvik.vm.isa.arm.features=div
  850. dalvik.vm.dex2oat-Xms=64m
  851. dalvik.vm.dex2oat-Xmx=512m
  852. dalvik.vm.dex2oat-filter=interpret-only
  853. dalvik.vm.stack-trace-file=/data/anr/traces.txt
  854. dalvik.vm.image-dex2oat-Xms=64m
  855. dalvik.vm.image-dex2oat-Xmx=64m
  856. dalvik.vm.image-dex2oat-filter=verify-none
  857. persist.sys.usb.config=adb
  858. persist.sys.dalvik.vm.lib.2=libart.so
  859. persist.sys.root_access=1
  860. persist.radio.snapshot_timer=22
  861. persist.radio.snapshot_enabled=1
  862. service.adb.root=1
  863. keyguard.no_require_sim=true
  864. telephony.sms.pseudo_multipart=1
  865. telephony.lteOnCdmaDevice=1
  866.  
  867. I:Copying file /cache/recovery/log to /cache/recovery/last_log
  868. tw_get_context got selinux context: u:object_r:media_rw_data_file:s0
  869. I:Got default contexts and file mode for storage files.
  870. I:Attempt to load settings from settings file...
  871. I:Loading settings from '/data/media/0/TWRP/.twrps'.
  872. I:Backup folder set to '/external_sd/TWRP/BACKUPS/HT444SF01255'
  873. I:Copying file /etc/recovery.fstab to /cache/recovery/recovery.fstab
  874. I:Version number saved to '/cache/recovery/.version'
  875. I:Unable to mount '/usb_otg'
  876. I:Actual block device: '', current file system: 'vfat'
  877. I:TWFunc::Set_Brightness: Setting brightness control to 114
  878. I:TWFunc::Fixup_Time: Pre-fix date and time: 2015-12-28--12-01-46
  879. I:TWFunc::Fixup_Time: Setting time offset from file /sys/class/rtc/rtc0/since_epoch
  880. I:TWFunc::Fixup_Time: Date and time corrected: 2015-12-28--12-01-46
  881. I:Enabling MTP during startup
  882. I:Starting MTP
  883. Starting MTP
  884. I:Get_Max_FileSize::maxFileSize: 17592186044416
  885. I:sending message to add 65539 '/data/media/0' 'Internal Storage'
  886. I:Message sent, add storage ID: 65539
  887. I:Get_Max_FileSize::maxFileSize: 18014398509481984
  888. I:sending message to add 65537 '/external_sd' 'Micro SDcard'
  889. I:Message sent, add storage ID: 65537
  890. MTP Enabled
  891. I:Switching packages (TWRP)
  892. created new mtpserver object
  893. MtpServer::run fd: 20
  894. mtppipe add storage 65539 '/data/media/0'
  895. MtpStorage id: 65539 path: /data/media/0
  896. mtppipe add storage 65537 '/external_sd'
  897. MtpStorage id: 65537 path: /external_sd
  898. I:Set page: 'multirom_main'
  899. I:Set page: 'multirom_list'
  900. I:Set page: 'multirom_add'
  901. I:Set page: 'multirom_add_source'
  902. I:Set page: 'multirom_add_select'
  903. I:MROMInstaller: base folder: data (min: 150MB def: 1024MB)
  904. I:MROMInstaller: base folder: system (min: 450MB def: 2688MB)
  905. I:MROMInstaller: base folder: cache (min: 50MB def: 436MB)
  906. I:Set page: 'multirom_add_start_process'
  907. I:Set page: 'multirom_add_confirm_action'
  908. I:Set page: 'multirom_action_page'
  909. I:operation_start: 'Installing'
  910. Installing ROM M8_GPE_5.07.1700.8_stock_C...
  911. Creating folders and images for type 1
  912. I:Running cmd "chcon u:object_r:system_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/system";chcon u:object_r:system_data_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/data";chcon u:object_r:cache_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/cache";"
  913. Flashing ZIP file /external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip
  914. ROM: M8_GPE_5.07.1700.8_stock_C
  915. Preparing ZIP file...
  916. rm: can't remove '/tmp/mr_update.zip': No such file or directory
  917. I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
  918. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
  919. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
  920. I:ZIP size limit for /tmp: 779.50 MB
  921. Copying ZIP to /tmp...
  922. I:Running cmd "cp "/external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip" /tmp/mr_update.zip"
  923. I:Running cmd "cd /tmp && zip "/tmp/mr_update.zip" META-INF/com/google/android/updater-script"
  924. updating: META-INF/com/google/android/updater-script (deflated 69%)
  925. Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
  926. I:sending message to remove 65539
  927. I:Message sent, remove storage ID: 65539
  928. mtppipe remove storage 65539
  929. I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
  930. I:Processing '/data_t'
  931. I:Created '/data_t' folder.
  932. I:Processing '/system'
  933. I:Processing '/cache'
  934. I:Recreating /cache/recovery folder.
  935.  
  936.  
  937. Partition Logs:
  938. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  939.  
  940. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  941. Primary_Block_Device: /dev/block/mmcblk0p42
  942. Display_Name: Boot
  943. Storage_Name: boot
  944. Backup_Path: /boot
  945. Backup_Name: boot
  946. Backup_Display_Name: Boot
  947. Storage_Path: /boot
  948. Current_File_System: emmc
  949. Fstab_File_System: emmc
  950. Backup_Method: dd
  951.  
  952. /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 16583MB Backup Size: 2841MB Raw size: 27246198784
  953.  
  954. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  955. Symlink_Path: /realdata/media/0
  956. Symlink_Mount_Point: /sdcard
  957. Primary_Block_Device: /dev/block/mmcblk0p47
  958. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  959. Display_Name: Realdata
  960. Storage_Name: Internal Storage
  961. Backup_Path: /data
  962. Backup_Name: data
  963. Backup_Display_Name: Data
  964. Storage_Path: /realdata/media/0
  965. Current_File_System: ext4
  966. Fstab_File_System: ext4
  967. Backup_Method: files
  968. MTP_Storage_ID: 65539
  969.  
  970. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  971.  
  972. Flags: IsPresent
  973. Primary_Block_Device: /dev/block/mmcblk0p24
  974. Display_Name: misc
  975. Storage_Name: misc
  976. Backup_Path: /misc
  977. Backup_Name: misc
  978. Backup_Display_Name: misc
  979. Storage_Path: /misc
  980. Current_File_System: emmc
  981. Fstab_File_System: emmc
  982. Backup_Method: dd
  983.  
  984. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  985.  
  986. Flags: IsPresent Can_Flash_Img
  987. Primary_Block_Device: /dev/block/mmcblk0p43
  988. Display_Name: Recovery
  989. Storage_Name: recovery
  990. Backup_Path: /recovery
  991. Backup_Name: recovery
  992. Backup_Display_Name: Recovery
  993. Storage_Path: /recovery
  994. Current_File_System: emmc
  995. Fstab_File_System: emmc
  996. Backup_Method: dd
  997.  
  998. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  999.  
  1000. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1001. Primary_Block_Device: /dev/block/mmcblk0p39
  1002. Display_Name: devlog
  1003. Storage_Name: devlog
  1004. Backup_Path: /devlog
  1005. Backup_Name: devlog
  1006. Backup_Display_Name: devlog
  1007. Storage_Path: /devlog
  1008. Current_File_System: ext4
  1009. Fstab_File_System: ext4
  1010. Backup_Method: files
  1011.  
  1012. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  1013.  
  1014. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1015. Primary_Block_Device: /dev/block/mmcblk0p37
  1016. Display_Name: carrier
  1017. Storage_Name: carrier
  1018. Backup_Path: /carrier
  1019. Backup_Name: carrier
  1020. Backup_Display_Name: carrier
  1021. Storage_Path: /carrier
  1022. Current_File_System: ext4
  1023. Fstab_File_System: ext4
  1024. Backup_Method: files
  1025.  
  1026. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  1027.  
  1028. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1029. Primary_Block_Device: /dev/block/mmcblk0p41
  1030. Display_Name: reserve
  1031. Storage_Name: reserve
  1032. Backup_Path: /reserve
  1033. Backup_Name: reserve
  1034. Backup_Display_Name: reserve
  1035. Storage_Path: /reserve
  1036. Current_File_System: vfat
  1037. Fstab_File_System: vfat
  1038. Backup_Method: files
  1039.  
  1040. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
  1041.  
  1042. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  1043. Symlink_Path: /external_sd/.android_secure
  1044. Symlink_Mount_Point: /and-sec
  1045. Primary_Block_Device: /dev/block/mmcblk1p1
  1046. Alternate_Block_Device: /dev/block/mmcblk1
  1047. Display_Name: Micro SDcard
  1048. Storage_Name: Micro SDcard
  1049. Backup_Path: /and-sec
  1050. Backup_Name: and-sec
  1051. Backup_Display_Name: Android Secure
  1052. Storage_Path: /external_sd
  1053. Current_File_System: exfat
  1054. Fstab_File_System: vfat
  1055. Backup_Method: files
  1056. MTP_Storage_ID: 65537
  1057.  
  1058. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  1059.  
  1060. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  1061. Primary_Block_Device: /dev/block/mmcblk1p2
  1062. Display_Name: SD-Ext
  1063. Storage_Name: SD-Ext
  1064. Backup_Path: /sd_ext
  1065. Backup_Name: sd_ext
  1066. Backup_Display_Name: SD-Ext
  1067. Storage_Path: /sd_ext
  1068. Current_File_System: ext4
  1069. Fstab_File_System: ext4
  1070. Backup_Method: files
  1071.  
  1072. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1073.  
  1074. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  1075. Primary_Block_Device: /dev/block/sda1
  1076. Alternate_Block_Device: /dev/block/sda
  1077. Display_Name: USB-OTG
  1078. Storage_Name: USB-OTG
  1079. Backup_Path: /usb_otg
  1080. Backup_Name: usb_otg
  1081. Backup_Display_Name: USB-OTG
  1082. Storage_Path: /usb_otg
  1083. Current_File_System: vfat
  1084. Fstab_File_System: vfat
  1085. Backup_Method: files
  1086. MTP_Storage_ID: 65538
  1087.  
  1088. /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1089.  
  1090. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
  1091. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
  1092. Display_Name: Data
  1093. Storage_Name: data_t
  1094. Backup_Path: /data
  1095. Backup_Name: data
  1096. Backup_Display_Name: Data
  1097. Storage_Path: /data_t
  1098. Current_File_System: ext4
  1099. Fstab_File_System: ext4
  1100. Bind_Of: /realdata
  1101. Backup_Method: files
  1102.  
  1103. /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1104.  
  1105. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1106. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
  1107. Display_Name: System
  1108. Storage_Name: System
  1109. Backup_Path: /system
  1110. Backup_Name: system
  1111. Backup_Display_Name: System
  1112. Storage_Path: /system
  1113. Current_File_System: ext4
  1114. Fstab_File_System: ext4
  1115. Bind_Of: /realdata
  1116. Backup_Method: files
  1117.  
  1118. /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1119.  
  1120. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1121. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
  1122. Display_Name: Cache
  1123. Storage_Name: Cache
  1124. Backup_Path: /cache
  1125. Backup_Name: cache
  1126. Backup_Display_Name: Cache
  1127. Storage_Path: /cache
  1128. Current_File_System: ext4
  1129. Fstab_File_System: ext4
  1130. Bind_Of: /realdata
  1131. Backup_Method: files
  1132.  
  1133. I:Running cmd "dd if="/dev/block/mmcblk0p42" of="/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img""
  1134. 32768+0 records in
  1135. 32768+0 records out
  1136. 16777216 bytes (16.0MB) copied, 0.740771 seconds, 21.6MB/s
  1137. Current boot sector was used as base for fake boot.img!
  1138. I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
  1139. I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
  1140. I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
  1141. ZIP uses block updates
  1142. Creating system.img...
  1143. I:Creating image with cmd: make_ext4fs -l 2720M -a "/system" -S /file_contexts "/realdata/media/0/multirom/system.img"
  1144. Creating filesystem with parameters:
  1145. Size: 2852126720
  1146. Block size: 4096
  1147. Blocks per group: 32768
  1148. Inodes per group: 7920
  1149. Inode size: 256
  1150. Journal blocks: 10880
  1151. Label:
  1152. Blocks: 696320
  1153. Block groups: 22
  1154. Reserved block group size: 175
  1155. Created filesystem with 11/174240 inodes and 22879/696320 blocks
  1156. I:Running cmd "losetup "/dev/block/loop0" "/realdata/media/0/multirom/system.img""
  1157. I:Running cmd "mv "/dev/block/mmcblk0p45" "/dev/block/mmcblk0p45-orig" && ln -s "/dev/block/loop0" "/dev/block/mmcblk0p45""
  1158. I:Running cmd "rm "/realdata/media/0/multirom/system.img""
  1159. I:Running cmd "echo "/dev/block/mmcblk0p45" > /tmp/mrom_fakesyspart"
  1160. Installing '/tmp/mr_update.zip'...
  1161. Checking for MD5 file...
  1162. Skipping MD5 check: no MD5 file found
  1163. I:Zip contains SELinux file_contexts file in its root. Extracting to /file_contexts
  1164. I:Legacy property environment initialized.
  1165.  
  1166.  
  1167.  
  1168. M8 GPE 5.07.1700.8 stock - CDMA Edition Installer
  1169. Built with SuperR's Kitchen
  1170.  
  1171.  
  1172.  
  1173.  
  1174.  
  1175. minzip: Extracted 2 file(s)
  1176.  
  1177. about to run program [/tmp/install/bin/backuptool.sh] with 2 args
  1178.  
  1179. Extracting system...
  1180.  
  1181. blockimg version is 1
  1182. erasing 688128 blocks
  1183. writing 247628 blocks of new data
  1184. wrote 247628 blocks; expected 247628
  1185. max alloc needed was 0
  1186. about to run program [/sbin/sh] with 3 args
  1187. chattr: stat /system/*: No such file or directory
  1188. about to run program [/tmp/install/bin/backuptool.sh] with 2 args
  1189.  
  1190.  
  1191. Extracting boot image...
  1192.  
  1193. M8 GPE 5.07.1700.8 stock - CDMA Edition Installed
  1194. script succeeded: result was [M8 GPE 5.07.1700.8 stock - CDMA Edition Installed]I:Legacy property environment disabled.
  1195. rm: can't remove 'META-INF/com/google/android': No such file or directory
  1196. ZIP successfully installed
  1197. I:Running cmd "busybox umount -d /tmpsystem"
  1198. I:Running cmd "rm "/dev/block/mmcblk0p45""
  1199. I:Running cmd "mv "/dev/block/mmcblk0p45"-orig "/dev/block/mmcblk0p45""
  1200. I:Running cmd "rm "/dev/block/mmcblk0p42""
  1201. I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
  1202. Restoring mounts...
  1203. losetup: /dev/block/loop0: No such device or address
  1204. losetup: /dev/block/loop1: No such device or address
  1205. losetup: /dev/block/loop2: No such device or address
  1206. losetup: /dev/block/loop3: No such device or address
  1207. losetup: /dev/block/loop4: No such device or address
  1208. losetup: /dev/block/loop5: No such device or address
  1209. losetup: /dev/block/loop6: No such device or address
  1210. losetup: /dev/block/loop7: No such device or address
  1211. I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
  1212. Updating partition details...
  1213. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  1214. I:Data backup size is 2841MB, free: 15600MB.
  1215. I:sending message to remove 65539
  1216. mtppipe remove storage 65539
  1217. I:Message sent, remove storage ID: 65539
  1218. I:Unable to mount '/usb_otg'
  1219. I:Actual block device: '', current file system: 'vfat'
  1220. ...done
  1221. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  1222. Extracting contents of boot.img...
  1223. I:Running cmd "rm -r "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/"*"
  1224. rm: can't remove '/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/*': No such file or directory
  1225. rm: can't remove '/tmp/boot': No such file or directory
  1226. Ramdisk uses GZIP compression
  1227. 4444 blocks
  1228. I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1229. I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1230. I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1231. I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1232. cp: can't stat '/tmp/boot/main_init': No such file or directory
  1233. I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1234. I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1235. I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1236. I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1237. I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1238. I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1239. I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1240. I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1241. cp: can't stat '/tmp/boot/cache': No such file or directory
  1242. I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1243. I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1244. I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1245. cp: can't stat '/tmp/boot//cache': No such file or directory
  1246. I:Running cmd "mkdir "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
  1247. I:Running cmd "cp -a /tmp/boot//sbin/su "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
  1248. cp: can't stat '/tmp/boot//sbin/su': No such file or directory
  1249. I:Running cmd "mv "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/init" "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/main_init""
  1250. I:Running cmd "cd "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
  1251. rm: can't remove 'cmdline': No such file or directory
  1252. rm: can't remove 'ramdisk.gz': No such file or directory
  1253. rm: can't remove 'zImage': No such file or directory
  1254. Injecting boot.img..
  1255. I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
  1256. I:Set page: 'multirom_action_complete'
  1257. I:operation_end - status=0
  1258. I:Set page: 'clear_vars'
  1259. I:Set page: 'multirom_add'
  1260. I:Set page: 'multirom_main'
  1261. I:Set page: 'multirom_list'
  1262. I:Set page: 'multirom_manage'
  1263. I:Set page: 'multirom_manage_flash_select'
  1264. I:Set page: 'multirom_manage_flash_confirm'
  1265. I:Set page: 'multirom_action_page'
  1266. I:operation_start: 'Flashing'
  1267. Flashing ZIP file /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
  1268. ROM: M8_GPE_5.07.1700.8_stock_C
  1269. Preparing ZIP file...
  1270. rm: can't remove '/tmp/mr_update.zip': No such file or directory
  1271. I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
  1272. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
  1273. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
  1274. No need to change ZIP.
  1275. Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
  1276. I:sending message to remove 65539
  1277. I:Message sent, remove storage ID: 65539
  1278. mtppipe remove storage 65539
  1279. I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
  1280. I:Processing '/data_t'
  1281. I:Processing '/system'
  1282. I:Processing '/cache'
  1283.  
  1284.  
  1285. Partition Logs:
  1286. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  1287.  
  1288. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  1289. Primary_Block_Device: /dev/block/mmcblk0p42
  1290. Display_Name: Boot
  1291. Storage_Name: boot
  1292. Backup_Path: /boot
  1293. Backup_Name: boot
  1294. Backup_Display_Name: Boot
  1295. Storage_Path: /boot
  1296. Current_File_System: emmc
  1297. Fstab_File_System: emmc
  1298. Backup_Method: dd
  1299.  
  1300. /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 15600MB Backup Size: 2841MB Raw size: 27246198784
  1301.  
  1302. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  1303. Symlink_Path: /realdata/media/0
  1304. Symlink_Mount_Point: /sdcard
  1305. Primary_Block_Device: /dev/block/mmcblk0p47
  1306. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  1307. Display_Name: Realdata
  1308. Storage_Name: Internal Storage
  1309. Backup_Path: /data
  1310. Backup_Name: data
  1311. Backup_Display_Name: Data
  1312. Storage_Path: /realdata/media/0
  1313. Current_File_System: ext4
  1314. Fstab_File_System: ext4
  1315. Backup_Method: files
  1316. MTP_Storage_ID: 65539
  1317.  
  1318. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  1319.  
  1320. Flags: IsPresent
  1321. Primary_Block_Device: /dev/block/mmcblk0p24
  1322. Display_Name: misc
  1323. Storage_Name: misc
  1324. Backup_Path: /misc
  1325. Backup_Name: misc
  1326. Backup_Display_Name: misc
  1327. Storage_Path: /misc
  1328. Current_File_System: emmc
  1329. Fstab_File_System: emmc
  1330. Backup_Method: dd
  1331.  
  1332. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  1333.  
  1334. Flags: IsPresent Can_Flash_Img
  1335. Primary_Block_Device: /dev/block/mmcblk0p43
  1336. Display_Name: Recovery
  1337. Storage_Name: recovery
  1338. Backup_Path: /recovery
  1339. Backup_Name: recovery
  1340. Backup_Display_Name: Recovery
  1341. Storage_Path: /recovery
  1342. Current_File_System: emmc
  1343. Fstab_File_System: emmc
  1344. Backup_Method: dd
  1345.  
  1346. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  1347.  
  1348. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1349. Primary_Block_Device: /dev/block/mmcblk0p39
  1350. Display_Name: devlog
  1351. Storage_Name: devlog
  1352. Backup_Path: /devlog
  1353. Backup_Name: devlog
  1354. Backup_Display_Name: devlog
  1355. Storage_Path: /devlog
  1356. Current_File_System: ext4
  1357. Fstab_File_System: ext4
  1358. Backup_Method: files
  1359.  
  1360. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  1361.  
  1362. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1363. Primary_Block_Device: /dev/block/mmcblk0p37
  1364. Display_Name: carrier
  1365. Storage_Name: carrier
  1366. Backup_Path: /carrier
  1367. Backup_Name: carrier
  1368. Backup_Display_Name: carrier
  1369. Storage_Path: /carrier
  1370. Current_File_System: ext4
  1371. Fstab_File_System: ext4
  1372. Backup_Method: files
  1373.  
  1374. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  1375.  
  1376. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1377. Primary_Block_Device: /dev/block/mmcblk0p41
  1378. Display_Name: reserve
  1379. Storage_Name: reserve
  1380. Backup_Path: /reserve
  1381. Backup_Name: reserve
  1382. Backup_Display_Name: reserve
  1383. Storage_Path: /reserve
  1384. Current_File_System: vfat
  1385. Fstab_File_System: vfat
  1386. Backup_Method: files
  1387.  
  1388. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
  1389.  
  1390. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  1391. Symlink_Path: /external_sd/.android_secure
  1392. Symlink_Mount_Point: /and-sec
  1393. Primary_Block_Device: /dev/block/mmcblk1p1
  1394. Alternate_Block_Device: /dev/block/mmcblk1
  1395. Display_Name: Micro SDcard
  1396. Storage_Name: Micro SDcard
  1397. Backup_Path: /and-sec
  1398. Backup_Name: and-sec
  1399. Backup_Display_Name: Android Secure
  1400. Storage_Path: /external_sd
  1401. Current_File_System: exfat
  1402. Fstab_File_System: vfat
  1403. Backup_Method: files
  1404. MTP_Storage_ID: 65537
  1405.  
  1406. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  1407.  
  1408. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  1409. Primary_Block_Device: /dev/block/mmcblk1p2
  1410. Display_Name: SD-Ext
  1411. Storage_Name: SD-Ext
  1412. Backup_Path: /sd_ext
  1413. Backup_Name: sd_ext
  1414. Backup_Display_Name: SD-Ext
  1415. Storage_Path: /sd_ext
  1416. Current_File_System: ext4
  1417. Fstab_File_System: ext4
  1418. Backup_Method: files
  1419.  
  1420. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1421.  
  1422. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  1423. Primary_Block_Device: /dev/block/sda1
  1424. Alternate_Block_Device: /dev/block/sda
  1425. Display_Name: USB-OTG
  1426. Storage_Name: USB-OTG
  1427. Backup_Path: /usb_otg
  1428. Backup_Name: usb_otg
  1429. Backup_Display_Name: USB-OTG
  1430. Storage_Path: /usb_otg
  1431. Current_File_System: vfat
  1432. Fstab_File_System: vfat
  1433. Backup_Method: files
  1434. MTP_Storage_ID: 65538
  1435.  
  1436. /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1437.  
  1438. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
  1439. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
  1440. Display_Name: Data
  1441. Storage_Name: data_t
  1442. Backup_Path: /data
  1443. Backup_Name: data
  1444. Backup_Display_Name: Data
  1445. Storage_Path: /data_t
  1446. Current_File_System: ext4
  1447. Fstab_File_System: ext4
  1448. Bind_Of: /realdata
  1449. Backup_Method: files
  1450.  
  1451. /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1452.  
  1453. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1454. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
  1455. Display_Name: System
  1456. Storage_Name: System
  1457. Backup_Path: /system
  1458. Backup_Name: system
  1459. Backup_Display_Name: System
  1460. Storage_Path: /system
  1461. Current_File_System: ext4
  1462. Fstab_File_System: ext4
  1463. Bind_Of: /realdata
  1464. Backup_Method: files
  1465.  
  1466. /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1467.  
  1468. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1469. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
  1470. Display_Name: Cache
  1471. Storage_Name: Cache
  1472. Backup_Path: /cache
  1473. Backup_Name: cache
  1474. Backup_Display_Name: Cache
  1475. Storage_Path: /cache
  1476. Current_File_System: ext4
  1477. Fstab_File_System: ext4
  1478. Bind_Of: /realdata
  1479. Backup_Method: files
  1480.  
  1481. I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
  1482. I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
  1483. I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
  1484. Installing '/external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip'...
  1485. Checking for MD5 file...
  1486. Skipping MD5 check: no MD5 file found
  1487. I:Zip does not contain SELinux file_contexts file in its root.
  1488. I:Legacy property environment initialized.
  1489. + fd=24
  1490. + zip=/external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
  1491. + rm -Rf /tmp/superuser
  1492. + mkdir -p /tmp/superuser
  1493. + unzip -o /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip -d /tmp/superuser/
  1494. Archive: /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
  1495. creating: scripts/
  1496. inflating: scripts/bootimg.sh
  1497. inflating: scripts/.gitignore
  1498. creating: scripts/su/
  1499. inflating: scripts/su/changes.sh
  1500. inflating: scripts/su/su-communication.sh
  1501. inflating: scripts/su/rights.sh
  1502. inflating: scripts/README.md
  1503. inflating: scripts/gitversion
  1504. creating: scripts/keystore_tools/
  1505. inflating: scripts/keystore_tools/README
  1506. inflating: scripts/keystore_tools/make_key
  1507. inflating: scripts/keystore_tools/BootKeystoreSigner.jar
  1508. inflating: scripts/keystore_tools/BootSignature.jar
  1509. creating: scripts/havealoha/
  1510. inflating: scripts/havealoha/changes.sh
  1511. creating: scripts/bin/
  1512. inflating: scripts/bin/su-x86
  1513. inflating: scripts/bin/sepolicy-inject
  1514. inflating: scripts/bin/bootimg-repack
  1515. inflating: scripts/bin/su-arm
  1516. inflating: scripts/bin/bootimg-extract
  1517. creating: META-INF/
  1518. creating: META-INF/com/
  1519. creating: META-INF/com/google/
  1520. creating: META-INF/com/google/android/
  1521. inflating: META-INF/com/google/android/updater-script
  1522. inflating: META-INF/com/google/android/update-binary
  1523. + cd /tmp/superuser/scripts/su/
  1524. + fstab=/etc/recovery.fstab
  1525. + [ ! -f /etc/recovery.fstab ]
  1526. + fstab=/etc/recovery.fstab.bak
  1527. + grep -E \b/boot\b /etc/recovery.fstab.bak
  1528. + grep -oE /dev/[a-zA-Z0-9_./-]*
  1529. + bootimg=/dev/block/platform/msm_sdcc.1/by-name/boot
  1530. + [ -z /dev/block/platform/msm_sdcc.1/by-name/boot ]
  1531. + ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
  1532. + echo ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
  1533. + sh -x ../bootimg.sh /dev/block/platform/msm_sdcc.1/by-name/boot eng
  1534. Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot+ export TMPDIR=/tmp/
  1535. + which mktemp
  1536. /sbin/mktemp
  1537. + [ 2 == 0 ]
  1538. + set -e
  1539. + [ -f eng ]
  1540. + scr=/tmp/superuser/scripts/su/changes.sh
  1541. + trap cleanup EXIT
  1542. + readlink -f ../bootimg.sh
  1543. + dirname /tmp/superuser/scripts/bootimg.sh
  1544. + scriptdir=/tmp/superuser/scripts
  1545. + chmod 0755 /tmp/superuser/scripts/bin/sepolicy-inject
  1546. + chmod 0755 /tmp/superuser/scripts/bin/bootimg-repack
  1547. + chmod 0755 /tmp/superuser/scripts/bin/bootimg-extract
  1548. + [[ toto2 =~ toto ]]
  1549. sh: =~: unknown operand
  1550. + r_file_perms=getattr open read ioctl lock
  1551. + x_file_perms=getattr execute execute_no_trans
  1552. + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1553. + w_file_perms=open append write
  1554. + rw_file_perms=getattr open read ioctl lock open append write
  1555. + rwx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1556. + rw_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  1557. + create_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  1558. + rw_stream_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  1559. + create_stream_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  1560. + r_dir_perms=open getattr read search ioctl
  1561. + w_dir_perms=open search write add_name remove_name
  1562. + ra_dir_perms=open getattr read search ioctl add name write
  1563. + rw_dir_perms=open getattr read search ioctl open search write add_name remove_name
  1564. + create_dir_perms=create reparent rename rmdir setattr open getattr read search ioctl open search write add_name remove_name
  1565. + startBootImgEdit /dev/block/platform/msm_sdcc.1/by-name/boot
  1566. + readlink -f /dev/block/platform/msm_sdcc.1/by-name/boot
  1567. + f=/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  1568. + homedir=/tmp/superuser/scripts/su
  1569. + mktemp -d
  1570. + bootimg_extract=/tmp/tmp.DXhiiE
  1571. + cd /tmp/tmp.DXhiiE
  1572. + /tmp/superuser/scripts/bin/bootimg-extract /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  1573. + mktemp -d
  1574. + d2=/tmp/tmp.08nCro
  1575. + cd /tmp/tmp.08nCro
  1576. + [ -f /tmp/tmp.DXhiiE/ramdisk.gz ]
  1577. + gunzip -c
  1578. + cpio -i
  1579. 11039 blocks
  1580. + gunzip -c
  1581. + INITRAMFS_FILES=
  1582. + file init
  1583. ../bootimg.sh: line 1: file: not found
  1584. + grep -q Intel
  1585. + DST_ARCH=arm
  1586. + /tmp/superuser/scripts/bin/sepolicy-inject -e -s gatekeeper_service -P sepolicy
  1587. libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
  1588. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1589. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1590. + ANDROID=23
  1591. + shift
  1592. + [ -n ]
  1593. + . /tmp/superuser/scripts/su/changes.sh
  1594. + dirname /tmp/superuser/scripts/su/changes.sh
  1595. + . /tmp/superuser/scripts/su/su-communication.sh
  1596. + dirname /tmp/superuser/scripts/su/changes.sh
  1597. + . /tmp/superuser/scripts/su/rights.sh
  1598. + r_file_perms=getattr open read ioctl lock
  1599. + x_file_perms=getattr execute execute_no_trans
  1600. + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1601. + w_file_perms=open append write
  1602. + cp /tmp/superuser/scripts/bin/su-arm sbin/su
  1603. + addFile sbin/su
  1604. + [ -n ]
  1605. + echo
  1606. + grep -qE \bsbin/su\b
  1607. + INITRAMFS_FILES= sbin/su
  1608. + chmod 0755 sbin/su
  1609. + [ -f sepolicy ]
  1610. + /tmp/superuser/scripts/bin/sepolicy-inject -z su -P sepolicy
  1611. source type su does not exist: 0,1007
  1612. libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
  1613. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1614. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1615. libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
  1616. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1617. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1618. + /tmp/superuser/scripts/bin/sepolicy-inject -z su_device -P sepolicy
  1619. source type su_device does not exist: 0,1008
  1620. libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
  1621. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1622. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1623. libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
  1624. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1625. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1626. + /tmp/superuser/scripts/bin/sepolicy-inject -z su_daemon -P sepolicy
  1627. source type su_daemon does not exist: 0,1009
  1628. libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
  1629. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1630. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1631. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1632. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1633. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1634. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy
  1635. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1636. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1637. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1638. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c dir -t su_device -P sepolicy
  1639. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1640. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1641. libsepol.policydb_index_others: security: 87 classes, 9678 rules, 0 cond rules
  1642. + allow su_device tmpfs filesystem associate
  1643. + addFile sepolicy
  1644. + [ -n ]
  1645. + echo sbin/su
  1646. + grep -qE \bsepolicy\b
  1647. + INITRAMFS_FILES= sbin/su sepolicy
  1648. + [ -z su_device -o -z tmpfs -o -z filesystem -o -z associate ]
  1649. + echo associate
  1650. + tr ,
  1651. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_device -t tmpfs -c filesystem -p associate -P sepolicy
  1652. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1653. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1654. libsepol.policydb_index_others: security: 87 classes, 9679 rules, 0 cond rules
  1655. + allowSuClient shell
  1656. + allow shell rootfs file execute_no_trans execute
  1657. + addFile sepolicy
  1658. + [ -n ]
  1659. + echo sbin/su sepolicy
  1660. + grep -qE \bsepolicy\b
  1661. + [ -z shell -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1662. + echo execute_no_trans execute
  1663. + tr ,
  1664. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1665. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1666. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1667. libsepol.policydb_index_others: security: 87 classes, 9680 rules, 0 cond rules
  1668. + allow shell su_daemon unix_stream_socket connectto getopt
  1669. + addFile sepolicy
  1670. + [ -n ]
  1671. + echo sbin/su sepolicy
  1672. + grep -qE \bsepolicy\b
  1673. + [ -z shell -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1674. + echo connectto getopt
  1675. + tr ,
  1676. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1677. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1678. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1679. libsepol.policydb_index_others: security: 87 classes, 9681 rules, 0 cond rules
  1680. + allow shell su_device dir search read
  1681. + addFile sepolicy
  1682. + [ -n ]
  1683. + echo sbin/su sepolicy
  1684. + grep -qE \bsepolicy\b
  1685. + [ -z shell -o -z su_device -o -z dir -o -z search read ]
  1686. + echo search read
  1687. + tr ,
  1688. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c dir -p search,read -P sepolicy
  1689. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1690. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1691. libsepol.policydb_index_others: security: 87 classes, 9682 rules, 0 cond rules
  1692. + allow shell su_device sock_file read write
  1693. + addFile sepolicy
  1694. + [ -n ]
  1695. + echo sbin/su sepolicy
  1696. + grep -qE \bsepolicy\b
  1697. + [ -z shell -o -z su_device -o -z sock_file -o -z read write ]
  1698. + echo read write
  1699. + tr ,
  1700. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c sock_file -p read,write -P sepolicy
  1701. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1702. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1703. libsepol.policydb_index_others: security: 87 classes, 9683 rules, 0 cond rules
  1704. + allow su_daemon shell fd use
  1705. + addFile sepolicy
  1706. + [ -n ]
  1707. + echo sbin/su sepolicy
  1708. + grep -qE \bsepolicy\b
  1709. + [ -z su_daemon -o -z shell -o -z fd -o -z use ]
  1710. + echo use
  1711. + tr ,
  1712. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fd -p use -P sepolicy
  1713. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1714. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1715. libsepol.policydb_index_others: security: 87 classes, 9684 rules, 0 cond rules
  1716. + allow su_daemon shell fifo_file read write getattr ioctl
  1717. + addFile sepolicy
  1718. + [ -n ]
  1719. + echo sbin/su sepolicy
  1720. + grep -qE \bsepolicy\b
  1721. + [ -z su_daemon -o -z shell -o -z fifo_file -o -z read write getattr ioctl ]
  1722. + echo read write getattr ioctl
  1723. + tr ,
  1724. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  1725. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1726. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1727. libsepol.policydb_index_others: security: 87 classes, 9685 rules, 0 cond rules
  1728. + allow su_daemon shell dir search
  1729. + addFile sepolicy
  1730. + [ -n ]
  1731. + echo sbin/su sepolicy
  1732. + grep -qE \bsepolicy\b
  1733. + [ -z su_daemon -o -z shell -o -z dir -o -z search ]
  1734. + echo search
  1735. + tr ,
  1736. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c dir -p search -P sepolicy
  1737. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1738. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1739. libsepol.policydb_index_others: security: 87 classes, 9686 rules, 0 cond rules
  1740. + allow su_daemon shell file read open
  1741. + addFile sepolicy
  1742. + [ -n ]
  1743. + echo sbin/su sepolicy
  1744. + grep -qE \bsepolicy\b
  1745. + [ -z su_daemon -o -z shell -o -z file -o -z read open ]
  1746. + echo read open
  1747. + tr ,
  1748. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c file -p read,open -P sepolicy
  1749. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1750. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1751. libsepol.policydb_index_others: security: 87 classes, 9687 rules, 0 cond rules
  1752. + allow su_daemon shell lnk_file read
  1753. + addFile sepolicy
  1754. + [ -n ]
  1755. + echo sbin/su sepolicy
  1756. + grep -qE \bsepolicy\b
  1757. + [ -z su_daemon -o -z shell -o -z lnk_file -o -z read ]
  1758. + echo read
  1759. + tr ,
  1760. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c lnk_file -p read -P sepolicy
  1761. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1762. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1763. libsepol.policydb_index_others: security: 87 classes, 9688 rules, 0 cond rules
  1764. + allow su_daemon su_daemon capability sys_ptrace
  1765. + addFile sepolicy
  1766. + [ -n ]
  1767. + echo sbin/su sepolicy
  1768. + grep -qE \bsepolicy\b
  1769. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  1770. + echo sys_ptrace
  1771. + tr ,
  1772. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  1773. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1774. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1775. libsepol.policydb_index_others: security: 87 classes, 9689 rules, 0 cond rules
  1776. + allow su shell fd use
  1777. + addFile sepolicy
  1778. + [ -n ]
  1779. + echo sbin/su sepolicy
  1780. + grep -qE \bsepolicy\b
  1781. + [ -z su -o -z shell -o -z fd -o -z use ]
  1782. + echo use
  1783. + tr ,
  1784. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fd -p use -P sepolicy
  1785. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1786. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1787. libsepol.policydb_index_others: security: 87 classes, 9690 rules, 0 cond rules
  1788. + allow su shell fifo_file read write
  1789. + addFile sepolicy
  1790. + [ -n ]
  1791. + echo sbin/su sepolicy
  1792. + grep -qE \bsepolicy\b
  1793. + [ -z su -o -z shell -o -z fifo_file -o -z read write ]
  1794. + echo read write
  1795. + tr ,
  1796. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fifo_file -p read,write -P sepolicy
  1797. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1798. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1799. libsepol.policydb_index_others: security: 87 classes, 9691 rules, 0 cond rules
  1800. + allowSuClient untrusted_app
  1801. + allow untrusted_app rootfs file execute_no_trans execute
  1802. + addFile sepolicy
  1803. + [ -n ]
  1804. + echo sbin/su sepolicy
  1805. + grep -qE \bsepolicy\b
  1806. + [ -z untrusted_app -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1807. + echo execute_no_trans execute
  1808. + tr ,
  1809. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1810. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1811. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1812. libsepol.policydb_index_others: security: 87 classes, 9692 rules, 0 cond rules
  1813. + allow untrusted_app su_daemon unix_stream_socket connectto getopt
  1814. + addFile sepolicy
  1815. + [ -n ]
  1816. + echo sbin/su sepolicy
  1817. + grep -qE \bsepolicy\b
  1818. + [ -z untrusted_app -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1819. + echo connectto getopt
  1820. + tr ,
  1821. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1822. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1823. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1824. libsepol.policydb_index_others: security: 87 classes, 9693 rules, 0 cond rules
  1825. + allow untrusted_app su_device dir search read
  1826. + addFile sepolicy
  1827. + [ -n ]
  1828. + echo sbin/su sepolicy
  1829. + grep -qE \bsepolicy\b
  1830. + [ -z untrusted_app -o -z su_device -o -z dir -o -z search read ]
  1831. + echo search read
  1832. + tr ,
  1833. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c dir -p search,read -P sepolicy
  1834. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1835. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1836. libsepol.policydb_index_others: security: 87 classes, 9694 rules, 0 cond rules
  1837. + allow untrusted_app su_device sock_file read write
  1838. + addFile sepolicy
  1839. + [ -n ]
  1840. + echo sbin/su sepolicy
  1841. + grep -qE \bsepolicy\b
  1842. + [ -z untrusted_app -o -z su_device -o -z sock_file -o -z read write ]
  1843. + echo read write
  1844. + tr ,
  1845. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c sock_file -p read,write -P sepolicy
  1846. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1847. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1848. libsepol.policydb_index_others: security: 87 classes, 9695 rules, 0 cond rules
  1849. + allow su_daemon untrusted_app fd use
  1850. + addFile sepolicy
  1851. + [ -n ]
  1852. + echo sbin/su sepolicy
  1853. + grep -qE \bsepolicy\b
  1854. + [ -z su_daemon -o -z untrusted_app -o -z fd -o -z use ]
  1855. + echo use
  1856. + tr ,
  1857. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fd -p use -P sepolicy
  1858. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1859. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1860. libsepol.policydb_index_others: security: 87 classes, 9696 rules, 0 cond rules
  1861. + allow su_daemon untrusted_app fifo_file read write getattr ioctl
  1862. + addFile sepolicy
  1863. + [ -n ]
  1864. + echo sbin/su sepolicy
  1865. + grep -qE \bsepolicy\b
  1866. + [ -z su_daemon -o -z untrusted_app -o -z fifo_file -o -z read write getattr ioctl ]
  1867. + echo read write getattr ioctl
  1868. + tr ,
  1869. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  1870. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1871. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1872. libsepol.policydb_index_others: security: 87 classes, 9697 rules, 0 cond rules
  1873. + allow su_daemon untrusted_app dir search
  1874. + addFile sepolicy
  1875. + [ -n ]
  1876. + echo sbin/su sepolicy
  1877. + grep -qE \bsepolicy\b
  1878. + [ -z su_daemon -o -z untrusted_app -o -z dir -o -z search ]
  1879. + echo search
  1880. + tr ,
  1881. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c dir -p search -P sepolicy
  1882. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1883. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1884. libsepol.policydb_index_others: security: 87 classes, 9698 rules, 0 cond rules
  1885. + allow su_daemon untrusted_app file read open
  1886. + addFile sepolicy
  1887. + [ -n ]
  1888. + echo sbin/su sepolicy
  1889. + grep -qE \bsepolicy\b
  1890. + [ -z su_daemon -o -z untrusted_app -o -z file -o -z read open ]
  1891. + echo read open
  1892. + tr ,
  1893. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c file -p read,open -P sepolicy
  1894. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1895. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1896. libsepol.policydb_index_others: security: 87 classes, 9699 rules, 0 cond rules
  1897. + allow su_daemon untrusted_app lnk_file read
  1898. + addFile sepolicy
  1899. + [ -n ]
  1900. + echo sbin/su sepolicy
  1901. + grep -qE \bsepolicy\b
  1902. + [ -z su_daemon -o -z untrusted_app -o -z lnk_file -o -z read ]
  1903. + echo read
  1904. + tr ,
  1905. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c lnk_file -p read -P sepolicy
  1906. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1907. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1908. libsepol.policydb_index_others: security: 87 classes, 9700 rules, 0 cond rules
  1909. + allow su_daemon su_daemon capability sys_ptrace
  1910. + addFile sepolicy
  1911. + [ -n ]
  1912. + echo sbin/su sepolicy
  1913. + grep -qE \bsepolicy\b
  1914. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  1915. + echo sys_ptrace
  1916. + tr ,
  1917. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  1918. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1919. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1920. libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
  1921. + allow su untrusted_app fd use
  1922. + addFile sepolicy
  1923. + [ -n ]
  1924. + echo sbin/su sepolicy
  1925. + grep -qE \bsepolicy\b
  1926. + [ -z su -o -z untrusted_app -o -z fd -o -z use ]
  1927. + echo use
  1928. + tr ,
  1929. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fd -p use -P sepolicy
  1930. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1931. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1932. libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
  1933. + allow su untrusted_app fifo_file read write
  1934. + addFile sepolicy
  1935. + [ -n ]
  1936. + echo sbin/su sepolicy
  1937. + grep -qE \bsepolicy\b
  1938. + [ -z su -o -z untrusted_app -o -z fifo_file -o -z read write ]
  1939. + echo read write
  1940. + tr ,
  1941. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p read,write -P sepolicy
  1942. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1943. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1944. libsepol.policydb_index_others: security: 87 classes, 9702 rules, 0 cond rules
  1945. + allowSuClient su
  1946. + allow su rootfs file execute_no_trans execute
  1947. + addFile sepolicy
  1948. + [ -n ]
  1949. + echo sbin/su sepolicy
  1950. + grep -qE \bsepolicy\b
  1951. + [ -z su -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1952. + echo execute_no_trans execute
  1953. + tr ,
  1954. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1955. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1956. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1957. libsepol.policydb_index_others: security: 87 classes, 9703 rules, 0 cond rules
  1958. + allow su su_daemon unix_stream_socket connectto getopt
  1959. + addFile sepolicy
  1960. + [ -n ]
  1961. + echo sbin/su sepolicy
  1962. + grep -qE \bsepolicy\b
  1963. + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1964. + echo connectto getopt
  1965. + tr ,
  1966. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1967. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1968. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1969. libsepol.policydb_index_others: security: 87 classes, 9704 rules, 0 cond rules
  1970. + allow su su_device dir search read
  1971. + addFile sepolicy
  1972. + [ -n ]
  1973. + echo sbin/su sepolicy
  1974. + grep -qE \bsepolicy\b
  1975. + [ -z su -o -z su_device -o -z dir -o -z search read ]
  1976. + echo search read
  1977. + tr ,
  1978. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c dir -p search,read -P sepolicy
  1979. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1980. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1981. libsepol.policydb_index_others: security: 87 classes, 9705 rules, 0 cond rules
  1982. + allow su su_device sock_file read write
  1983. + addFile sepolicy
  1984. + [ -n ]
  1985. + echo sbin/su sepolicy
  1986. + grep -qE \bsepolicy\b
  1987. + [ -z su -o -z su_device -o -z sock_file -o -z read write ]
  1988. + echo read write
  1989. + tr ,
  1990. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c sock_file -p read,write -P sepolicy
  1991. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1992. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1993. libsepol.policydb_index_others: security: 87 classes, 9706 rules, 0 cond rules
  1994. + allow su_daemon su fd use
  1995. + addFile sepolicy
  1996. + [ -n ]
  1997. + echo sbin/su sepolicy
  1998. + grep -qE \bsepolicy\b
  1999. + [ -z su_daemon -o -z su -o -z fd -o -z use ]
  2000. + echo use
  2001. + tr ,
  2002. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fd -p use -P sepolicy
  2003. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2004. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2005. libsepol.policydb_index_others: security: 87 classes, 9707 rules, 0 cond rules
  2006. + allow su_daemon su fifo_file read write getattr ioctl
  2007. + addFile sepolicy
  2008. + [ -n ]
  2009. + echo sbin/su sepolicy
  2010. + grep -qE \bsepolicy\b
  2011. + [ -z su_daemon -o -z su -o -z fifo_file -o -z read write getattr ioctl ]
  2012. + echo read write getattr ioctl
  2013. + tr ,
  2014. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  2015. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2016. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2017. libsepol.policydb_index_others: security: 87 classes, 9708 rules, 0 cond rules
  2018. + allow su_daemon su dir search
  2019. + addFile sepolicy
  2020. + [ -n ]
  2021. + echo sbin/su sepolicy
  2022. + grep -qE \bsepolicy\b
  2023. + [ -z su_daemon -o -z su -o -z dir -o -z search ]
  2024. + echo search
  2025. + tr ,
  2026. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c dir -p search -P sepolicy
  2027. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2028. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2029. libsepol.policydb_index_others: security: 87 classes, 9709 rules, 0 cond rules
  2030. + allow su_daemon su file read open
  2031. + addFile sepolicy
  2032. + [ -n ]
  2033. + echo sbin/su sepolicy
  2034. + grep -qE \bsepolicy\b
  2035. + [ -z su_daemon -o -z su -o -z file -o -z read open ]
  2036. + echo read open
  2037. + tr ,
  2038. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c file -p read,open -P sepolicy
  2039. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2040. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2041. libsepol.policydb_index_others: security: 87 classes, 9710 rules, 0 cond rules
  2042. + allow su_daemon su lnk_file read
  2043. + addFile sepolicy
  2044. + [ -n ]
  2045. + echo sbin/su sepolicy
  2046. + grep -qE \bsepolicy\b
  2047. + [ -z su_daemon -o -z su -o -z lnk_file -o -z read ]
  2048. + echo read
  2049. + tr ,
  2050. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c lnk_file -p read -P sepolicy
  2051. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2052. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2053. libsepol.policydb_index_others: security: 87 classes, 9711 rules, 0 cond rules
  2054. + allow su_daemon su_daemon capability sys_ptrace
  2055. + addFile sepolicy
  2056. + [ -n ]
  2057. + echo sbin/su sepolicy
  2058. + grep -qE \bsepolicy\b
  2059. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  2060. + echo sys_ptrace
  2061. + tr ,
  2062. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  2063. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2064. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2065. libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
  2066. + allow su su fd use
  2067. + addFile sepolicy
  2068. + [ -n ]
  2069. + echo sbin/su sepolicy
  2070. + grep -qE \bsepolicy\b
  2071. + [ -z su -o -z su -o -z fd -o -z use ]
  2072. + echo use
  2073. + tr ,
  2074. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fd -p use -P sepolicy
  2075. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2076. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2077. libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
  2078. + allow su su fifo_file read write
  2079. + addFile sepolicy
  2080. + [ -n ]
  2081. + echo sbin/su sepolicy
  2082. + grep -qE \bsepolicy\b
  2083. + [ -z su -o -z su -o -z fifo_file -o -z read write ]
  2084. + echo read write
  2085. + tr ,
  2086. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p read,write -P sepolicy
  2087. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2088. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2089. libsepol.policydb_index_others: security: 87 classes, 9713 rules, 0 cond rules
  2090. + /tmp/superuser/scripts/bin/sepolicy-inject -e -s ssd_tool -P sepolicy
  2091. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2092. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2093. libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
  2094. + allow init su_daemon process transition
  2095. + addFile sepolicy
  2096. + [ -n ]
  2097. + echo sbin/su sepolicy
  2098. + grep -qE \bsepolicy\b
  2099. + [ -z init -o -z su_daemon -o -z process -o -z transition ]
  2100. + echo transition
  2101. + tr ,
  2102. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p transition -P sepolicy
  2103. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2104. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2105. libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
  2106. + noaudit init su_daemon process rlimitinh siginh noatsecure
  2107. + addFile sepolicy
  2108. + [ -n ]
  2109. + echo sbin/su sepolicy
  2110. + grep -qE \bsepolicy\b
  2111. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p rlimitinh -P sepolicy
  2112. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2113. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2114. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2115. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p siginh -P sepolicy
  2116. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2117. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2118. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2119. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p noatsecure -P sepolicy
  2120. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2121. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2122. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2123. + suDaemonRights
  2124. + allow su_daemon rootfs file entrypoint
  2125. + addFile sepolicy
  2126. + [ -n ]
  2127. + echo sbin/su sepolicy
  2128. + grep -qE \bsepolicy\b
  2129. + [ -z su_daemon -o -z rootfs -o -z file -o -z entrypoint ]
  2130. + echo entrypoint
  2131. + tr ,
  2132. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t rootfs -c file -p entrypoint -P sepolicy
  2133. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2134. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2135. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2136. + allow su_daemon su_daemon dir search read
  2137. + addFile sepolicy
  2138. + [ -n ]
  2139. + echo sbin/su sepolicy
  2140. + grep -qE \bsepolicy\b
  2141. + [ -z su_daemon -o -z su_daemon -o -z dir -o -z search read ]
  2142. + echo search read
  2143. + tr ,
  2144. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p search,read -P sepolicy
  2145. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2146. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2147. libsepol.policydb_index_others: security: 87 classes, 9716 rules, 0 cond rules
  2148. + allow su_daemon su_daemon file read write open
  2149. + addFile sepolicy
  2150. + [ -n ]
  2151. + echo sbin/su sepolicy
  2152. + grep -qE \bsepolicy\b
  2153. + [ -z su_daemon -o -z su_daemon -o -z file -o -z read write open ]
  2154. + echo read write open
  2155. + tr ,
  2156. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p read,write,open -P sepolicy
  2157. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2158. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2159. libsepol.policydb_index_others: security: 87 classes, 9717 rules, 0 cond rules
  2160. + allow su_daemon su_daemon lnk_file read
  2161. + addFile sepolicy
  2162. + [ -n ]
  2163. + echo sbin/su sepolicy
  2164. + grep -qE \bsepolicy\b
  2165. + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read ]
  2166. + echo read
  2167. + tr ,
  2168. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read -P sepolicy
  2169. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2170. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2171. libsepol.policydb_index_others: security: 87 classes, 9718 rules, 0 cond rules
  2172. + allow su_daemon su_daemon unix_dgram_socket create connect write
  2173. + addFile sepolicy
  2174. + [ -n ]
  2175. + echo sbin/su sepolicy
  2176. + grep -qE \bsepolicy\b
  2177. + [ -z su_daemon -o -z su_daemon -o -z unix_dgram_socket -o -z create connect write ]
  2178. + echo create connect write
  2179. + tr ,
  2180. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_dgram_socket -p create,connect,write -P sepolicy
  2181. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2182. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2183. libsepol.policydb_index_others: security: 87 classes, 9719 rules, 0 cond rules
  2184. + allow su_daemon su_daemon unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2185. + addFile sepolicy
  2186. + [ -n ]
  2187. + echo sbin/su sepolicy
  2188. + grep -qE \bsepolicy\b
  2189. + [ -z su_daemon -o -z su_daemon -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  2190. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2191. + tr ,
  2192. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  2193. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2194. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2195. libsepol.policydb_index_others: security: 87 classes, 9720 rules, 0 cond rules
  2196. + allow su_daemon devpts chr_file read write open
  2197. + addFile sepolicy
  2198. + [ -n ]
  2199. + echo sbin/su sepolicy
  2200. + grep -qE \bsepolicy\b
  2201. + [ -z su_daemon -o -z devpts -o -z chr_file -o -z read write open ]
  2202. + echo read write open
  2203. + tr ,
  2204. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t devpts -c chr_file -p read,write,open -P sepolicy
  2205. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2206. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2207. libsepol.policydb_index_others: security: 87 classes, 9721 rules, 0 cond rules
  2208. + allow su_daemon untrusted_app_devpts chr_file read write open
  2209. + addFile sepolicy
  2210. + [ -n ]
  2211. + echo sbin/su sepolicy
  2212. + grep -qE \bsepolicy\b
  2213. + [ -z su_daemon -o -z untrusted_app_devpts -o -z chr_file -o -z read write open ]
  2214. + echo read write open
  2215. + tr ,
  2216. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app_devpts -c chr_file -p read,write,open -P sepolicy
  2217. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2218. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2219. libsepol.policydb_index_others: security: 87 classes, 9722 rules, 0 cond rules
  2220. + allow su_daemon su_daemon capability setuid setgid
  2221. + addFile sepolicy
  2222. + [ -n ]
  2223. + echo sbin/su sepolicy
  2224. + grep -qE \bsepolicy\b
  2225. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z setuid setgid ]
  2226. + echo setuid setgid
  2227. + tr ,
  2228. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p setuid,setgid -P sepolicy
  2229. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2230. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2231. libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
  2232. + allow su_daemon app_data_file dir getattr search write add_name
  2233. + addFile sepolicy
  2234. + [ -n ]
  2235. + echo sbin/su sepolicy
  2236. + grep -qE \bsepolicy\b
  2237. + [ -z su_daemon -o -z app_data_file -o -z dir -o -z getattr search write add_name ]
  2238. + echo getattr search write add_name
  2239. + tr ,
  2240. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c dir -p getattr,search,write,add_name -P sepolicy
  2241. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2242. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2243. libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
  2244. + allow su_daemon app_data_file file getattr read open lock
  2245. + addFile sepolicy
  2246. + [ -n ]
  2247. + echo sbin/su sepolicy
  2248. + grep -qE \bsepolicy\b
  2249. + [ -z su_daemon -o -z app_data_file -o -z file -o -z getattr read open lock ]
  2250. + echo getattr read open lock
  2251. + tr ,
  2252. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c file -p getattr,read,open,lock -P sepolicy
  2253. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2254. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2255. libsepol.policydb_index_others: security: 87 classes, 9724 rules, 0 cond rules
  2256. + allow su_daemon su_daemon capability dac_override
  2257. + addFile sepolicy
  2258. + [ -n ]
  2259. + echo sbin/su sepolicy
  2260. + grep -qE \bsepolicy\b
  2261. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z dac_override ]
  2262. + echo dac_override
  2263. + tr ,
  2264. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p dac_override -P sepolicy
  2265. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2266. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2267. libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
  2268. + allow su_daemon su_daemon process fork sigchld
  2269. + addFile sepolicy
  2270. + [ -n ]
  2271. + echo sbin/su sepolicy
  2272. + grep -qE \bsepolicy\b
  2273. + [ -z su_daemon -o -z su_daemon -o -z process -o -z fork sigchld ]
  2274. + echo fork sigchld
  2275. + tr ,
  2276. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p fork,sigchld -P sepolicy
  2277. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2278. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2279. libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
  2280. + allow su_daemon toolbox_exec file execute read open execute_no_trans
  2281. + addFile sepolicy
  2282. + [ -n ]
  2283. + echo sbin/su sepolicy
  2284. + grep -qE \bsepolicy\b
  2285. + [ -z su_daemon -o -z toolbox_exec -o -z file -o -z execute read open execute_no_trans ]
  2286. + echo execute read open execute_no_trans
  2287. + tr ,
  2288. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t toolbox_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
  2289. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2290. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2291. libsepol.policydb_index_others: security: 87 classes, 9726 rules, 0 cond rules
  2292. + allow su_daemon device dir write add_name
  2293. + addFile sepolicy
  2294. + [ -n ]
  2295. + echo sbin/su sepolicy
  2296. + grep -qE \bsepolicy\b
  2297. + [ -z su_daemon -o -z device -o -z dir -o -z write add_name ]
  2298. + echo write add_name
  2299. + tr ,
  2300. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t device -c dir -p write,add_name -P sepolicy
  2301. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2302. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2303. libsepol.policydb_index_others: security: 87 classes, 9727 rules, 0 cond rules
  2304. + allow su_daemon su_device dir create setattr remove_name add_name
  2305. + addFile sepolicy
  2306. + [ -n ]
  2307. + echo sbin/su sepolicy
  2308. + grep -qE \bsepolicy\b
  2309. + [ -z su_daemon -o -z su_device -o -z dir -o -z create setattr remove_name add_name ]
  2310. + echo create setattr remove_name add_name
  2311. + tr ,
  2312. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p create,setattr,remove_name,add_name -P sepolicy
  2313. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2314. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2315. libsepol.policydb_index_others: security: 87 classes, 9728 rules, 0 cond rules
  2316. + allow su_daemon su_device sock_file create unlink
  2317. + addFile sepolicy
  2318. + [ -n ]
  2319. + echo sbin/su sepolicy
  2320. + grep -qE \bsepolicy\b
  2321. + [ -z su_daemon -o -z su_device -o -z sock_file -o -z create unlink ]
  2322. + echo create unlink
  2323. + tr ,
  2324. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c sock_file -p create,unlink -P sepolicy
  2325. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2326. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2327. libsepol.policydb_index_others: security: 87 classes, 9729 rules, 0 cond rules
  2328. + allow su_daemon zygote_exec file execute read open execute_no_trans
  2329. + addFile sepolicy
  2330. + [ -n ]
  2331. + echo sbin/su sepolicy
  2332. + grep -qE \bsepolicy\b
  2333. + [ -z su_daemon -o -z zygote_exec -o -z file -o -z execute read open execute_no_trans ]
  2334. + echo execute read open execute_no_trans
  2335. + tr ,
  2336. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t zygote_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
  2337. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2338. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2339. libsepol.policydb_index_others: security: 87 classes, 9730 rules, 0 cond rules
  2340. + allow su_daemon su_device dir search write add_name
  2341. + addFile sepolicy
  2342. + [ -n ]
  2343. + echo sbin/su sepolicy
  2344. + grep -qE \bsepolicy\b
  2345. + [ -z su_daemon -o -z su_device -o -z dir -o -z search write add_name ]
  2346. + echo search write add_name
  2347. + tr ,
  2348. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p search,write,add_name -P sepolicy
  2349. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2350. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2351. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2352. + allow su_daemon su_daemon process setexec
  2353. + addFile sepolicy
  2354. + [ -n ]
  2355. + echo sbin/su sepolicy
  2356. + grep -qE \bsepolicy\b
  2357. + [ -z su_daemon -o -z su_daemon -o -z process -o -z setexec ]
  2358. + echo setexec
  2359. + tr ,
  2360. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setexec -P sepolicy
  2361. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2362. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2363. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2364. + allow su_daemon shell_exec file execute read open
  2365. + addFile sepolicy
  2366. + [ -n ]
  2367. + echo sbin/su sepolicy
  2368. + grep -qE \bsepolicy\b
  2369. + [ -z su_daemon -o -z shell_exec -o -z file -o -z execute read open ]
  2370. + echo execute read open
  2371. + tr ,
  2372. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell_exec -c file -p execute,read,open -P sepolicy
  2373. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2374. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2375. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2376. + allow su_daemon su_daemon capability chown
  2377. + addFile sepolicy
  2378. + [ -n ]
  2379. + echo sbin/su sepolicy
  2380. + grep -qE \bsepolicy\b
  2381. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z chown ]
  2382. + echo chown
  2383. + tr ,
  2384. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p chown -P sepolicy
  2385. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2386. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2387. libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
  2388. + suDaemonTo su
  2389. + allow su_daemon su process transition
  2390. + addFile sepolicy
  2391. + [ -n ]
  2392. + echo sbin/su sepolicy
  2393. + grep -qE \bsepolicy\b
  2394. + [ -z su_daemon -o -z su -o -z process -o -z transition ]
  2395. + echo transition
  2396. + tr ,
  2397. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p transition -P sepolicy
  2398. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2399. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2400. libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
  2401. + noaudit su_daemon su process siginh rlimitinh noatsecure
  2402. + addFile sepolicy
  2403. + [ -n ]
  2404. + echo sbin/su sepolicy
  2405. + grep -qE \bsepolicy\b
  2406. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p siginh -P sepolicy
  2407. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2408. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2409. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2410. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p rlimitinh -P sepolicy
  2411. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2412. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2413. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2414. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p noatsecure -P sepolicy
  2415. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2416. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2417. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2418. + allowLog su
  2419. + allow su logdw_socket sock_file write
  2420. + addFile sepolicy
  2421. + [ -n ]
  2422. + echo sbin/su sepolicy
  2423. + grep -qE \bsepolicy\b
  2424. + [ -z su -o -z logdw_socket -o -z sock_file -o -z write ]
  2425. + echo write
  2426. + tr ,
  2427. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdw_socket -c sock_file -p write -P sepolicy
  2428. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2429. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2430. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2431. + allow su logd unix_dgram_socket sendto
  2432. + addFile sepolicy
  2433. + [ -n ]
  2434. + echo sbin/su sepolicy
  2435. + grep -qE \bsepolicy\b
  2436. + [ -z su -o -z logd -o -z unix_dgram_socket -o -z sendto ]
  2437. + echo sendto
  2438. + tr ,
  2439. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_dgram_socket -p sendto -P sepolicy
  2440. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2441. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2442. libsepol.policydb_index_others: security: 87 classes, 9734 rules, 0 cond rules
  2443. + allow logd su dir search
  2444. + addFile sepolicy
  2445. + [ -n ]
  2446. + echo sbin/su sepolicy
  2447. + grep -qE \bsepolicy\b
  2448. + [ -z logd -o -z su -o -z dir -o -z search ]
  2449. + echo search
  2450. + tr ,
  2451. + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c dir -p search -P sepolicy
  2452. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2453. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2454. libsepol.policydb_index_others: security: 87 classes, 9735 rules, 0 cond rules
  2455. + allow logd su file read open getattr
  2456. + addFile sepolicy
  2457. + [ -n ]
  2458. + echo sbin/su sepolicy
  2459. + grep -qE \bsepolicy\b
  2460. + [ -z logd -o -z su -o -z file -o -z read open getattr ]
  2461. + echo read open getattr
  2462. + tr ,
  2463. + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c file -p read,open,getattr -P sepolicy
  2464. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2465. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2466. libsepol.policydb_index_others: security: 87 classes, 9736 rules, 0 cond rules
  2467. + allow su su dir search read
  2468. + addFile sepolicy
  2469. + [ -n ]
  2470. + echo sbin/su sepolicy
  2471. + grep -qE \bsepolicy\b
  2472. + [ -z su -o -z su -o -z dir -o -z search read ]
  2473. + echo search read
  2474. + tr ,
  2475. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c dir -p search,read -P sepolicy
  2476. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2477. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2478. libsepol.policydb_index_others: security: 87 classes, 9737 rules, 0 cond rules
  2479. + allow su su unix_dgram_socket create connect write
  2480. + addFile sepolicy
  2481. + [ -n ]
  2482. + echo sbin/su sepolicy
  2483. + grep -qE \bsepolicy\b
  2484. + [ -z su -o -z su -o -z unix_dgram_socket -o -z create connect write ]
  2485. + echo create connect write
  2486. + tr ,
  2487. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_dgram_socket -p create,connect,write -P sepolicy
  2488. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2489. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2490. libsepol.policydb_index_others: security: 87 classes, 9738 rules, 0 cond rules
  2491. + allow su su lnk_file read
  2492. + addFile sepolicy
  2493. + [ -n ]
  2494. + echo sbin/su sepolicy
  2495. + grep -qE \bsepolicy\b
  2496. + [ -z su -o -z su -o -z lnk_file -o -z read ]
  2497. + echo read
  2498. + tr ,
  2499. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c lnk_file -p read -P sepolicy
  2500. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2501. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2502. libsepol.policydb_index_others: security: 87 classes, 9739 rules, 0 cond rules
  2503. + allow su su file read
  2504. + addFile sepolicy
  2505. + [ -n ]
  2506. + echo sbin/su sepolicy
  2507. + grep -qE \bsepolicy\b
  2508. + [ -z su -o -z su -o -z file -o -z read ]
  2509. + echo read
  2510. + tr ,
  2511. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p read -P sepolicy
  2512. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2513. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2514. libsepol.policydb_index_others: security: 87 classes, 9740 rules, 0 cond rules
  2515. + allow su toolbox_exec file read
  2516. + addFile sepolicy
  2517. + [ -n ]
  2518. + echo sbin/su sepolicy
  2519. + grep -qE \bsepolicy\b
  2520. + [ -z su -o -z toolbox_exec -o -z file -o -z read ]
  2521. + echo read
  2522. + tr ,
  2523. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p read -P sepolicy
  2524. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2525. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2526. libsepol.policydb_index_others: security: 87 classes, 9741 rules, 0 cond rules
  2527. + allow su devpts chr_file read write open
  2528. + addFile sepolicy
  2529. + [ -n ]
  2530. + echo sbin/su sepolicy
  2531. + grep -qE \bsepolicy\b
  2532. + [ -z su -o -z devpts -o -z chr_file -o -z read write open ]
  2533. + echo read write open
  2534. + tr ,
  2535. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p read,write,open -P sepolicy
  2536. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2537. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2538. libsepol.policydb_index_others: security: 87 classes, 9742 rules, 0 cond rules
  2539. + suRights su
  2540. + allow su su_daemon fd use
  2541. + addFile sepolicy
  2542. + [ -n ]
  2543. + echo sbin/su sepolicy
  2544. + grep -qE \bsepolicy\b
  2545. + [ -z su -o -z su_daemon -o -z fd -o -z use ]
  2546. + echo use
  2547. + tr ,
  2548. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c fd -p use -P sepolicy
  2549. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2550. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2551. libsepol.policydb_index_others: security: 87 classes, 9743 rules, 0 cond rules
  2552. + allow su su_daemon process sigchld
  2553. + addFile sepolicy
  2554. + [ -n ]
  2555. + echo sbin/su sepolicy
  2556. + grep -qE \bsepolicy\b
  2557. + [ -z su -o -z su_daemon -o -z process -o -z sigchld ]
  2558. + echo sigchld
  2559. + tr ,
  2560. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c process -p sigchld -P sepolicy
  2561. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2562. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2563. libsepol.policydb_index_others: security: 87 classes, 9744 rules, 0 cond rules
  2564. + allow su su_daemon unix_stream_socket read write
  2565. + addFile sepolicy
  2566. + [ -n ]
  2567. + echo sbin/su sepolicy
  2568. + grep -qE \bsepolicy\b
  2569. + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z read write ]
  2570. + echo read write
  2571. + tr ,
  2572. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p read,write -P sepolicy
  2573. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2574. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2575. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2576. + allow su_daemon su_daemon capability sys_admin
  2577. + addFile sepolicy
  2578. + [ -n ]
  2579. + echo sbin/su sepolicy
  2580. + grep -qE \bsepolicy\b
  2581. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_admin ]
  2582. + echo sys_admin
  2583. + tr ,
  2584. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_admin -P sepolicy
  2585. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2586. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2587. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2588. + allow servicemanager su dir search read
  2589. + addFile sepolicy
  2590. + [ -n ]
  2591. + echo sbin/su sepolicy
  2592. + grep -qE \bsepolicy\b
  2593. + [ -z servicemanager -o -z su -o -z dir -o -z search read ]
  2594. + echo search read
  2595. + tr ,
  2596. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c dir -p search,read -P sepolicy
  2597. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2598. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2599. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2600. + allow servicemanager su file open read
  2601. + addFile sepolicy
  2602. + [ -n ]
  2603. + echo sbin/su sepolicy
  2604. + grep -qE \bsepolicy\b
  2605. + [ -z servicemanager -o -z su -o -z file -o -z open read ]
  2606. + echo open read
  2607. + tr ,
  2608. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c file -p open,read -P sepolicy
  2609. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2610. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2611. libsepol.policydb_index_others: security: 87 classes, 9746 rules, 0 cond rules
  2612. + allow servicemanager su process getattr
  2613. + addFile sepolicy
  2614. + [ -n ]
  2615. + echo sbin/su sepolicy
  2616. + grep -qE \bsepolicy\b
  2617. + [ -z servicemanager -o -z su -o -z process -o -z getattr ]
  2618. + echo getattr
  2619. + tr ,
  2620. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c process -p getattr -P sepolicy
  2621. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2622. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2623. libsepol.policydb_index_others: security: 87 classes, 9747 rules, 0 cond rules
  2624. + allow servicemanager su binder transfer
  2625. + addFile sepolicy
  2626. + [ -n ]
  2627. + echo sbin/su sepolicy
  2628. + grep -qE \bsepolicy\b
  2629. + [ -z servicemanager -o -z su -o -z binder -o -z transfer ]
  2630. + echo transfer
  2631. + tr ,
  2632. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c binder -p transfer -P sepolicy
  2633. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2634. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2635. libsepol.policydb_index_others: security: 87 classes, 9748 rules, 0 cond rules
  2636. + [ 23 -ge 20 ]
  2637. + allow system_server su binder call
  2638. + addFile sepolicy
  2639. + [ -n ]
  2640. + echo sbin/su sepolicy
  2641. + grep -qE \bsepolicy\b
  2642. + [ -z system_server -o -z su -o -z binder -o -z call ]
  2643. + echo call
  2644. + tr ,
  2645. + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call -P sepolicy
  2646. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2647. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2648. libsepol.policydb_index_others: security: 87 classes, 9749 rules, 0 cond rules
  2649. + allow su shell_exec zygote_exec dalvikcache_data_file rootfs system_file file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2650. + addFile sepolicy
  2651. + [ -n ]
  2652. + echo sbin/su sepolicy
  2653. + grep -qE \bsepolicy\b
  2654. + [ -z su -o -z shell_exec zygote_exec dalvikcache_data_file rootfs system_file -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
  2655. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2656. + tr ,
  2657. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2658. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2659. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2660. libsepol.policydb_index_others: security: 87 classes, 9750 rules, 0 cond rules
  2661. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2662. + tr ,
  2663. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t zygote_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2664. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2665. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2666. libsepol.policydb_index_others: security: 87 classes, 9751 rules, 0 cond rules
  2667. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2668. + tr ,
  2669. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2670. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2671. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2672. libsepol.policydb_index_others: security: 87 classes, 9752 rules, 0 cond rules
  2673. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2674. + tr ,
  2675. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2676. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2677. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2678. libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
  2679. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2680. + tr ,
  2681. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2682. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2683. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2684. libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
  2685. + allow su dalvikcache_data_file rootfs system_file lnk_file read getattr
  2686. + addFile sepolicy
  2687. + [ -n ]
  2688. + echo sbin/su sepolicy
  2689. + grep -qE \bsepolicy\b
  2690. + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z lnk_file -o -z read getattr ]
  2691. + echo read getattr
  2692. + tr ,
  2693. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c lnk_file -p read,getattr -P sepolicy
  2694. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2695. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2696. libsepol.policydb_index_others: security: 87 classes, 9754 rules, 0 cond rules
  2697. + echo read getattr
  2698. + tr ,
  2699. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c lnk_file -p read,getattr -P sepolicy
  2700. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2701. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2702. libsepol.policydb_index_others: security: 87 classes, 9755 rules, 0 cond rules
  2703. + echo read getattr
  2704. + tr ,
  2705. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c lnk_file -p read,getattr -P sepolicy
  2706. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2707. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2708. libsepol.policydb_index_others: security: 87 classes, 9756 rules, 0 cond rules
  2709. + allow su dalvikcache_data_file rootfs system_file dir open getattr read search ioctl
  2710. + addFile sepolicy
  2711. + [ -n ]
  2712. + echo sbin/su sepolicy
  2713. + grep -qE \bsepolicy\b
  2714. + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z dir -o -z open getattr read search ioctl ]
  2715. + echo open getattr read search ioctl
  2716. + tr ,
  2717. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2718. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2719. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2720. libsepol.policydb_index_others: security: 87 classes, 9757 rules, 0 cond rules
  2721. + echo open getattr read search ioctl
  2722. + tr ,
  2723. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2724. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2725. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2726. libsepol.policydb_index_others: security: 87 classes, 9758 rules, 0 cond rules
  2727. + echo open getattr read search ioctl
  2728. + tr ,
  2729. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2730. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2731. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2732. libsepol.policydb_index_others: security: 87 classes, 9759 rules, 0 cond rules
  2733. + [ 23 -ge 23 ]
  2734. + allow su toolbox_exec file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2735. + addFile sepolicy
  2736. + [ -n ]
  2737. + echo sbin/su sepolicy
  2738. + grep -qE \bsepolicy\b
  2739. + [ -z su -o -z toolbox_exec -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
  2740. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2741. + tr ,
  2742. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2743. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2744. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2745. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2746. + allow su devpts chr_file getattr ioctl
  2747. + addFile sepolicy
  2748. + [ -n ]
  2749. + echo sbin/su sepolicy
  2750. + grep -qE \bsepolicy\b
  2751. + [ -z su -o -z devpts -o -z chr_file -o -z getattr ioctl ]
  2752. + echo getattr ioctl
  2753. + tr ,
  2754. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p getattr,ioctl -P sepolicy
  2755. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2756. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2757. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2758. + [ 23 -ge 20 ]
  2759. + allow su system_server servicemanager binder call transfer
  2760. + addFile sepolicy
  2761. + [ -n ]
  2762. + echo sbin/su sepolicy
  2763. + grep -qE \bsepolicy\b
  2764. + [ -z su -o -z system_server servicemanager -o -z binder -o -z call transfer ]
  2765. + echo call transfer
  2766. + tr ,
  2767. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_server -c binder -p call,transfer -P sepolicy
  2768. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2769. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2770. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2771. + echo call transfer
  2772. + tr ,
  2773. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c binder -p call,transfer -P sepolicy
  2774. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2775. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2776. libsepol.policydb_index_others: security: 87 classes, 9761 rules, 0 cond rules
  2777. + [ 23 -ge 23 ]
  2778. + allow su activity_service service_manager find
  2779. + addFile sepolicy
  2780. + [ -n ]
  2781. + echo sbin/su sepolicy
  2782. + grep -qE \bsepolicy\b
  2783. + [ -z su -o -z activity_service -o -z service_manager -o -z find ]
  2784. + echo find
  2785. + tr ,
  2786. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t activity_service -c service_manager -p find -P sepolicy
  2787. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2788. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2789. libsepol.policydb_index_others: security: 87 classes, 9762 rules, 0 cond rules
  2790. + [ 23 -ge 20 ]
  2791. + allow su untrusted_app_devpts chr_file read write open getattr ioctl
  2792. + addFile sepolicy
  2793. + [ -n ]
  2794. + echo sbin/su sepolicy
  2795. + grep -qE \bsepolicy\b
  2796. + [ -z su -o -z untrusted_app_devpts -o -z chr_file -o -z read write open getattr ioctl ]
  2797. + echo read write open getattr ioctl
  2798. + tr ,
  2799. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app_devpts -c chr_file -p read,write,open,getattr,ioctl -P sepolicy
  2800. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2801. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2802. libsepol.policydb_index_others: security: 87 classes, 9763 rules, 0 cond rules
  2803. + allow su su file getattr open read ioctl lock getattr execute execute_no_trans
  2804. + addFile sepolicy
  2805. + [ -n ]
  2806. + echo sbin/su sepolicy
  2807. + grep -qE \bsepolicy\b
  2808. + [ -z su -o -z su -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans ]
  2809. + echo getattr open read ioctl lock getattr execute execute_no_trans
  2810. + tr ,
  2811. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans -P sepolicy
  2812. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2813. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2814. libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
  2815. + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2816. + addFile sepolicy
  2817. + [ -n ]
  2818. + echo sbin/su sepolicy
  2819. + grep -qE \bsepolicy\b
  2820. + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  2821. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2822. + tr ,
  2823. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  2824. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2825. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2826. libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
  2827. + allow su su process sigchld setpgid setsched fork signal execmem getsched
  2828. + addFile sepolicy
  2829. + [ -n ]
  2830. + echo sbin/su sepolicy
  2831. + grep -qE \bsepolicy\b
  2832. + [ -z su -o -z su -o -z process -o -z sigchld setpgid setsched fork signal execmem getsched ]
  2833. + echo sigchld setpgid setsched fork signal execmem getsched
  2834. + tr ,
  2835. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p sigchld,setpgid,setsched,fork,signal,execmem,getsched -P sepolicy
  2836. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2837. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2838. libsepol.policydb_index_others: security: 87 classes, 9765 rules, 0 cond rules
  2839. + allow su su fifo_file getattr open read ioctl lock open append write
  2840. + addFile sepolicy
  2841. + [ -n ]
  2842. + echo sbin/su sepolicy
  2843. + grep -qE \bsepolicy\b
  2844. + [ -z su -o -z su -o -z fifo_file -o -z getattr open read ioctl lock open append write ]
  2845. + echo getattr open read ioctl lock open append write
  2846. + tr ,
  2847. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
  2848. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2849. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2850. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2851. + suL0 su
  2852. + suBackL0 su
  2853. + [ 23 -ge 20 ]
  2854. + allow system_server su binder call transfer
  2855. + addFile sepolicy
  2856. + [ -n ]
  2857. + echo sbin/su sepolicy
  2858. + grep -qE \bsepolicy\b
  2859. + [ -z system_server -o -z su -o -z binder -o -z call transfer ]
  2860. + echo call transfer
  2861. + tr ,
  2862. + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call,transfer -P sepolicy
  2863. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2864. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2865. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2866. + allow untrusted_app su unix_stream_socket ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
  2867. + addFile sepolicy
  2868. + [ -n ]
  2869. + echo sbin/su sepolicy
  2870. + grep -qE \bsepolicy\b
  2871. + [ -z untrusted_app -o -z su -o -z unix_stream_socket -o -z ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto ]
  2872. + echo ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
  2873. + tr ,
  2874. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su -c unix_stream_socket -p ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,connectto -P sepolicy
  2875. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2876. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2877. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2878. + allow surfaceflinger su process sigchld
  2879. + addFile sepolicy
  2880. + [ -n ]
  2881. + echo sbin/su sepolicy
  2882. + grep -qE \bsepolicy\b
  2883. + [ -z surfaceflinger -o -z su -o -z process -o -z sigchld ]
  2884. + echo sigchld
  2885. + tr ,
  2886. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t su -c process -p sigchld -P sepolicy
  2887. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2888. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2889. libsepol.policydb_index_others: security: 87 classes, 9767 rules, 0 cond rules
  2890. + suMiscL0 su
  2891. + allow su su capability sys_nice
  2892. + addFile sepolicy
  2893. + [ -n ]
  2894. + echo sbin/su sepolicy
  2895. + grep -qE \bsepolicy\b
  2896. + [ -z su -o -z su -o -z capability -o -z sys_nice ]
  2897. + echo sys_nice
  2898. + tr ,
  2899. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_nice -P sepolicy
  2900. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2901. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2902. libsepol.policydb_index_others: security: 87 classes, 9768 rules, 0 cond rules
  2903. + suReadLogs su
  2904. + allow su kernel system syslog_read syslog_mod
  2905. + addFile sepolicy
  2906. + [ -n ]
  2907. + echo sbin/su sepolicy
  2908. + grep -qE \bsepolicy\b
  2909. + [ -z su -o -z kernel -o -z system -o -z syslog_read syslog_mod ]
  2910. + echo syslog_read syslog_mod
  2911. + tr ,
  2912. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t kernel -c system -p syslog_read,syslog_mod -P sepolicy
  2913. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2914. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2915. libsepol.policydb_index_others: security: 87 classes, 9769 rules, 0 cond rules
  2916. + allow su su capability2 syslog
  2917. + addFile sepolicy
  2918. + [ -n ]
  2919. + echo sbin/su sepolicy
  2920. + grep -qE \bsepolicy\b
  2921. + [ -z su -o -z su -o -z capability2 -o -z syslog ]
  2922. + echo syslog
  2923. + tr ,
  2924. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability2 -p syslog -P sepolicy
  2925. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2926. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2927. libsepol.policydb_index_others: security: 87 classes, 9770 rules, 0 cond rules
  2928. + [ 23 -ge 20 ]
  2929. + allow su logdr_socket sock_file write
  2930. + addFile sepolicy
  2931. + [ -n ]
  2932. + echo sbin/su sepolicy
  2933. + grep -qE \bsepolicy\b
  2934. + [ -z su -o -z logdr_socket -o -z sock_file -o -z write ]
  2935. + echo write
  2936. + tr ,
  2937. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdr_socket -c sock_file -p write -P sepolicy
  2938. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2939. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2940. libsepol.policydb_index_others: security: 87 classes, 9771 rules, 0 cond rules
  2941. + allow su logd unix_stream_socket connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  2942. + addFile sepolicy
  2943. + [ -n ]
  2944. + echo sbin/su sepolicy
  2945. + grep -qE \bsepolicy\b
  2946. + [ -z su -o -z logd -o -z unix_stream_socket -o -z connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  2947. + echo connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  2948. + tr ,
  2949. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_stream_socket -p connectto,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  2950. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2951. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2952. libsepol.policydb_index_others: security: 87 classes, 9772 rules, 0 cond rules
  2953. + suNetworkL0 su
  2954. + /tmp/superuser/scripts/bin/sepolicy-inject -a netdomain -s su -P sepolicy
  2955. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2956. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2957. libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
  2958. + /tmp/superuser/scripts/bin/sepolicy-inject -a bluetoothdomain -s su -P sepolicy
  2959. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2960. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2961. libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
  2962. + suL1 su
  2963. + suMiscL1 su
  2964. + allowFSRWX su shell_data_file
  2965. + allowFSRW su shell_data_file
  2966. + allow su shell_data_file dir open getattr read search ioctl open search write add_name remove_name create
  2967. + addFile sepolicy
  2968. + [ -n ]
  2969. + echo sbin/su sepolicy
  2970. + grep -qE \bsepolicy\b
  2971. + [ -z su -o -z shell_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  2972. + echo open getattr read search ioctl open search write add_name remove_name create
  2973. + tr ,
  2974. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  2975. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2976. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2977. libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
  2978. + allow su shell_data_file file getattr open read ioctl lock open append write create setattr
  2979. + addFile sepolicy
  2980. + [ -n ]
  2981. + echo sbin/su sepolicy
  2982. + grep -qE \bsepolicy\b
  2983. + [ -z su -o -z shell_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  2984. + echo getattr open read ioctl lock open append write create setattr
  2985. + tr ,
  2986. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  2987. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2988. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2989. libsepol.policydb_index_others: security: 87 classes, 9774 rules, 0 cond rules
  2990. + allow su shell_data_file lnk_file read getattr
  2991. + addFile sepolicy
  2992. + [ -n ]
  2993. + echo sbin/su sepolicy
  2994. + grep -qE \bsepolicy\b
  2995. + [ -z su -o -z shell_data_file -o -z lnk_file -o -z read getattr ]
  2996. + echo read getattr
  2997. + tr ,
  2998. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c lnk_file -p read,getattr -P sepolicy
  2999. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3000. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3001. libsepol.policydb_index_others: security: 87 classes, 9775 rules, 0 cond rules
  3002. + allow su shell_data_file file getattr execute execute_no_trans
  3003. + addFile sepolicy
  3004. + [ -n ]
  3005. + echo sbin/su sepolicy
  3006. + grep -qE \bsepolicy\b
  3007. + [ -z su -o -z shell_data_file -o -z file -o -z getattr execute execute_no_trans ]
  3008. + echo getattr execute execute_no_trans
  3009. + tr ,
  3010. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
  3011. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3012. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3013. libsepol.policydb_index_others: security: 87 classes, 9776 rules, 0 cond rules
  3014. + [ 23 -ge 20 ]
  3015. + [ 23 -ge 23 ]
  3016. + allowFSR su storage_file mnt_user_file
  3017. + allow su storage_file mnt_user_file dir open getattr read search ioctl
  3018. + addFile sepolicy
  3019. + [ -n ]
  3020. + echo sbin/su sepolicy
  3021. + grep -qE \bsepolicy\b
  3022. + [ -z su -o -z storage_file mnt_user_file -o -z dir -o -z open getattr read search ioctl ]
  3023. + echo open getattr read search ioctl
  3024. + tr ,
  3025. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3026. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3027. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3028. libsepol.policydb_index_others: security: 87 classes, 9776 rules, 0 cond rules
  3029. + echo open getattr read search ioctl
  3030. + tr ,
  3031. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3032. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3033. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3034. libsepol.policydb_index_others: security: 87 classes, 9777 rules, 0 cond rules
  3035. + allow su storage_file mnt_user_file file getattr open read ioctl lock
  3036. + addFile sepolicy
  3037. + [ -n ]
  3038. + echo sbin/su sepolicy
  3039. + grep -qE \bsepolicy\b
  3040. + [ -z su -o -z storage_file mnt_user_file -o -z file -o -z getattr open read ioctl lock ]
  3041. + echo getattr open read ioctl lock
  3042. + tr ,
  3043. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3044. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3045. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3046. libsepol.policydb_index_others: security: 87 classes, 9778 rules, 0 cond rules
  3047. + echo getattr open read ioctl lock
  3048. + tr ,
  3049. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3050. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3051. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3052. libsepol.policydb_index_others: security: 87 classes, 9779 rules, 0 cond rules
  3053. + allow su storage_file mnt_user_file lnk_file read getattr
  3054. + addFile sepolicy
  3055. + [ -n ]
  3056. + echo sbin/su sepolicy
  3057. + grep -qE \bsepolicy\b
  3058. + [ -z su -o -z storage_file mnt_user_file -o -z lnk_file -o -z read getattr ]
  3059. + echo read getattr
  3060. + tr ,
  3061. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c lnk_file -p read,getattr -P sepolicy
  3062. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3063. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3064. libsepol.policydb_index_others: security: 87 classes, 9780 rules, 0 cond rules
  3065. + echo read getattr
  3066. + tr ,
  3067. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c lnk_file -p read,getattr -P sepolicy
  3068. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3069. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3070. libsepol.policydb_index_others: security: 87 classes, 9781 rules, 0 cond rules
  3071. + [ 23 -ge 20 ]
  3072. + allowFSR su fuse
  3073. + allow su fuse dir open getattr read search ioctl
  3074. + addFile sepolicy
  3075. + [ -n ]
  3076. + echo sbin/su sepolicy
  3077. + grep -qE \bsepolicy\b
  3078. + [ -z su -o -z fuse -o -z dir -o -z open getattr read search ioctl ]
  3079. + echo open getattr read search ioctl
  3080. + tr ,
  3081. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3082. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3083. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3084. libsepol.policydb_index_others: security: 87 classes, 9782 rules, 0 cond rules
  3085. + allow su fuse file getattr open read ioctl lock
  3086. + addFile sepolicy
  3087. + [ -n ]
  3088. + echo sbin/su sepolicy
  3089. + grep -qE \bsepolicy\b
  3090. + [ -z su -o -z fuse -o -z file -o -z getattr open read ioctl lock ]
  3091. + echo getattr open read ioctl lock
  3092. + tr ,
  3093. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3094. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3095. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3096. libsepol.policydb_index_others: security: 87 classes, 9783 rules, 0 cond rules
  3097. + allow su fuse lnk_file read getattr
  3098. + addFile sepolicy
  3099. + [ -n ]
  3100. + echo sbin/su sepolicy
  3101. + grep -qE \bsepolicy\b
  3102. + [ -z su -o -z fuse -o -z lnk_file -o -z read getattr ]
  3103. + echo read getattr
  3104. + tr ,
  3105. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c lnk_file -p read,getattr -P sepolicy
  3106. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3107. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3108. libsepol.policydb_index_others: security: 87 classes, 9784 rules, 0 cond rules
  3109. + allow su su process ptrace
  3110. + addFile sepolicy
  3111. + [ -n ]
  3112. + echo sbin/su sepolicy
  3113. + grep -qE \bsepolicy\b
  3114. + [ -z su -o -z su -o -z process -o -z ptrace ]
  3115. + echo ptrace
  3116. + tr ,
  3117. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p ptrace -P sepolicy
  3118. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3119. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3120. libsepol.policydb_index_others: security: 87 classes, 9785 rules, 0 cond rules
  3121. + suServicesL1 su
  3122. + [ 23 -ge 20 ]
  3123. + allow su servicemanager service_manager list
  3124. + addFile sepolicy
  3125. + [ -n ]
  3126. + echo sbin/su sepolicy
  3127. + grep -qE \bsepolicy\b
  3128. + [ -z su -o -z servicemanager -o -z service_manager -o -z list ]
  3129. + echo list
  3130. + tr ,
  3131. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c service_manager -p list -P sepolicy
  3132. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3133. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3134. libsepol.policydb_index_others: security: 87 classes, 9785 rules, 0 cond rules
  3135. + [ 23 -ge 23 ]
  3136. + allow su =service_manager_type-gatekeeper_service service_manager find
  3137. + addFile sepolicy
  3138. + [ -n ]
  3139. + echo sbin/su sepolicy
  3140. + grep -qE \bsepolicy\b
  3141. + [ -z su -o -z =service_manager_type-gatekeeper_service -o -z service_manager -o -z find ]
  3142. + echo find
  3143. + tr ,
  3144. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t =service_manager_type-gatekeeper_service -c service_manager -p find -P sepolicy
  3145. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3146. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3147. libsepol.policydb_index_others: security: 87 classes, 9786 rules, 0 cond rules
  3148. + suNetworkL1 su
  3149. + allow su su netlink_route_socket create setopt bind getattr write nlmsg_read read
  3150. + addFile sepolicy
  3151. + [ -n ]
  3152. + echo sbin/su sepolicy
  3153. + grep -qE \bsepolicy\b
  3154. + [ -z su -o -z su -o -z netlink_route_socket -o -z create setopt bind getattr write nlmsg_read read ]
  3155. + echo create setopt bind getattr write nlmsg_read read
  3156. + tr ,
  3157. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p create,setopt,bind,getattr,write,nlmsg_read,read -P sepolicy
  3158. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3159. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3160. libsepol.policydb_index_others: security: 87 classes, 9909 rules, 0 cond rules
  3161. + [ 23 -ge 20 ]
  3162. + allowFSR su net_data_file
  3163. + allow su net_data_file dir open getattr read search ioctl
  3164. + addFile sepolicy
  3165. + [ -n ]
  3166. + echo sbin/su sepolicy
  3167. + grep -qE \bsepolicy\b
  3168. + [ -z su -o -z net_data_file -o -z dir -o -z open getattr read search ioctl ]
  3169. + echo open getattr read search ioctl
  3170. + tr ,
  3171. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3172. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3173. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3174. libsepol.policydb_index_others: security: 87 classes, 9910 rules, 0 cond rules
  3175. + allow su net_data_file file getattr open read ioctl lock
  3176. + addFile sepolicy
  3177. + [ -n ]
  3178. + echo sbin/su sepolicy
  3179. + grep -qE \bsepolicy\b
  3180. + [ -z su -o -z net_data_file -o -z file -o -z getattr open read ioctl lock ]
  3181. + echo getattr open read ioctl lock
  3182. + tr ,
  3183. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3184. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3185. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3186. libsepol.policydb_index_others: security: 87 classes, 9911 rules, 0 cond rules
  3187. + allow su net_data_file lnk_file read getattr
  3188. + addFile sepolicy
  3189. + [ -n ]
  3190. + echo sbin/su sepolicy
  3191. + grep -qE \bsepolicy\b
  3192. + [ -z su -o -z net_data_file -o -z lnk_file -o -z read getattr ]
  3193. + echo read getattr
  3194. + tr ,
  3195. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c lnk_file -p read,getattr -P sepolicy
  3196. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3197. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3198. libsepol.policydb_index_others: security: 87 classes, 9912 rules, 0 cond rules
  3199. + true
  3200. + suL3 su
  3201. + suFirewall su
  3202. + suToApps su
  3203. + allow su untrusted_app fifo_file ioctl getattr
  3204. + addFile sepolicy
  3205. + [ -n ]
  3206. + echo sbin/su sepolicy
  3207. + grep -qE \bsepolicy\b
  3208. + [ -z su -o -z untrusted_app -o -z fifo_file -o -z ioctl getattr ]
  3209. + echo ioctl getattr
  3210. + tr ,
  3211. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p ioctl,getattr -P sepolicy
  3212. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3213. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3214. libsepol.policydb_index_others: security: 87 classes, 9913 rules, 0 cond rules
  3215. + allow su app_data_file dir search getattr
  3216. + addFile sepolicy
  3217. + [ -n ]
  3218. + echo sbin/su sepolicy
  3219. + grep -qE \bsepolicy\b
  3220. + [ -z su -o -z app_data_file -o -z dir -o -z search getattr ]
  3221. + echo search getattr
  3222. + tr ,
  3223. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c dir -p search,getattr -P sepolicy
  3224. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3225. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3226. libsepol.policydb_index_others: security: 87 classes, 9913 rules, 0 cond rules
  3227. + allow su app_data_file file getattr execute read open execute_no_trans
  3228. + addFile sepolicy
  3229. + [ -n ]
  3230. + echo sbin/su sepolicy
  3231. + grep -qE \bsepolicy\b
  3232. + [ -z su -o -z app_data_file -o -z file -o -z getattr execute read open execute_no_trans ]
  3233. + echo getattr execute read open execute_no_trans
  3234. + tr ,
  3235. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c file -p getattr,execute,read,open,execute_no_trans -P sepolicy
  3236. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3237. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3238. libsepol.policydb_index_others: security: 87 classes, 9914 rules, 0 cond rules
  3239. + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  3240. + addFile sepolicy
  3241. + [ -n ]
  3242. + echo sbin/su sepolicy
  3243. + grep -qE \bsepolicy\b
  3244. + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  3245. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  3246. + tr ,
  3247. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  3248. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3249. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3250. libsepol.policydb_index_others: security: 87 classes, 9915 rules, 0 cond rules
  3251. + allow su su rawip_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3252. + addFile sepolicy
  3253. + [ -n ]
  3254. + echo sbin/su sepolicy
  3255. + grep -qE \bsepolicy\b
  3256. + [ -z su -o -z su -o -z rawip_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3257. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3258. + tr ,
  3259. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c rawip_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3260. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3261. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3262. libsepol.policydb_index_others: security: 87 classes, 9915 rules, 0 cond rules
  3263. + allow su su udp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3264. + addFile sepolicy
  3265. + [ -n ]
  3266. + echo sbin/su sepolicy
  3267. + grep -qE \bsepolicy\b
  3268. + [ -z su -o -z su -o -z udp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3269. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3270. + tr ,
  3271. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c udp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3272. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3273. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3274. libsepol.policydb_index_others: security: 87 classes, 9916 rules, 0 cond rules
  3275. + allow su su tcp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3276. + addFile sepolicy
  3277. + [ -n ]
  3278. + echo sbin/su sepolicy
  3279. + grep -qE \bsepolicy\b
  3280. + [ -z su -o -z su -o -z tcp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3281. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3282. + tr ,
  3283. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c tcp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3284. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3285. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3286. libsepol.policydb_index_others: security: 87 classes, 9917 rules, 0 cond rules
  3287. + allow su su capability net_raw net_admin
  3288. + addFile sepolicy
  3289. + [ -n ]
  3290. + echo sbin/su sepolicy
  3291. + grep -qE \bsepolicy\b
  3292. + [ -z su -o -z su -o -z capability -o -z net_raw net_admin ]
  3293. + echo net_raw net_admin
  3294. + tr ,
  3295. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p net_raw,net_admin -P sepolicy
  3296. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3297. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3298. libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
  3299. + allow su su netlink_route_socket nlmsg_write
  3300. + addFile sepolicy
  3301. + [ -n ]
  3302. + echo sbin/su sepolicy
  3303. + grep -qE \bsepolicy\b
  3304. + [ -z su -o -z su -o -z netlink_route_socket -o -z nlmsg_write ]
  3305. + echo nlmsg_write
  3306. + tr ,
  3307. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p nlmsg_write -P sepolicy
  3308. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3309. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3310. libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
  3311. + suBind
  3312. + allow su_daemon su_exec file mounton read
  3313. + addFile sepolicy
  3314. + [ -n ]
  3315. + echo sbin/su sepolicy
  3316. + grep -qE \bsepolicy\b
  3317. + [ -z su_daemon -o -z su_exec -o -z file -o -z mounton read ]
  3318. + echo mounton read
  3319. + tr ,
  3320. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_exec -c file -p mounton,read -P sepolicy
  3321. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3322. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3323. libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
  3324. + allowFSRWX su_daemon su_device
  3325. + allowFSRW su_daemon su_device
  3326. + allow su_daemon su_device dir open getattr read search ioctl open search write add_name remove_name create
  3327. + addFile sepolicy
  3328. + [ -n ]
  3329. + echo sbin/su sepolicy
  3330. + grep -qE \bsepolicy\b
  3331. + [ -z su_daemon -o -z su_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3332. + echo open getattr read search ioctl open search write add_name remove_name create
  3333. + tr ,
  3334. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3335. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3336. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3337. libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
  3338. + allow su_daemon su_device file getattr open read ioctl lock open append write create setattr
  3339. + addFile sepolicy
  3340. + [ -n ]
  3341. + echo sbin/su sepolicy
  3342. + grep -qE \bsepolicy\b
  3343. + [ -z su_daemon -o -z su_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3344. + echo getattr open read ioctl lock open append write create setattr
  3345. + tr ,
  3346. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3347. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3348. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3349. libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
  3350. + allow su_daemon su_device lnk_file read getattr
  3351. + addFile sepolicy
  3352. + [ -n ]
  3353. + echo sbin/su sepolicy
  3354. + grep -qE \bsepolicy\b
  3355. + [ -z su_daemon -o -z su_device -o -z lnk_file -o -z read getattr ]
  3356. + echo read getattr
  3357. + tr ,
  3358. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c lnk_file -p read,getattr -P sepolicy
  3359. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3360. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3361. libsepol.policydb_index_others: security: 87 classes, 9920 rules, 0 cond rules
  3362. + allow su_daemon su_device file getattr execute execute_no_trans
  3363. + addFile sepolicy
  3364. + [ -n ]
  3365. + echo sbin/su sepolicy
  3366. + grep -qE \bsepolicy\b
  3367. + [ -z su_daemon -o -z su_device -o -z file -o -z getattr execute execute_no_trans ]
  3368. + echo getattr execute execute_no_trans
  3369. + tr ,
  3370. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,execute,execute_no_trans -P sepolicy
  3371. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3372. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3373. libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
  3374. + allow su_daemon su_device file relabelfrom
  3375. + addFile sepolicy
  3376. + [ -n ]
  3377. + echo sbin/su sepolicy
  3378. + grep -qE \bsepolicy\b
  3379. + [ -z su_daemon -o -z su_device -o -z file -o -z relabelfrom ]
  3380. + echo relabelfrom
  3381. + tr ,
  3382. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p relabelfrom -P sepolicy
  3383. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3384. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3385. libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
  3386. + allow su_daemon system_file file relabelto
  3387. + addFile sepolicy
  3388. + [ -n ]
  3389. + echo sbin/su sepolicy
  3390. + grep -qE \bsepolicy\b
  3391. + [ -z su_daemon -o -z system_file -o -z file -o -z relabelto ]
  3392. + echo relabelto
  3393. + tr ,
  3394. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_file -c file -p relabelto -P sepolicy
  3395. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3396. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3397. libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
  3398. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedobject -s su_device -P sepolicy
  3399. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3400. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3401. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3402. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su_daemon -P sepolicy
  3403. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3404. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3405. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3406. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su -P sepolicy
  3407. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3408. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3409. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3410. + [ eng == power -o eng == eng ]
  3411. + suL6 su
  3412. + suBackL6 su
  3413. + allowFSRWX surfaceflinger app_data_file
  3414. + allowFSRW surfaceflinger app_data_file
  3415. + allow surfaceflinger app_data_file dir open getattr read search ioctl open search write add_name remove_name create
  3416. + addFile sepolicy
  3417. + [ -n ]
  3418. + echo sbin/su sepolicy
  3419. + grep -qE \bsepolicy\b
  3420. + [ -z surfaceflinger -o -z app_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3421. + echo open getattr read search ioctl open search write add_name remove_name create
  3422. + tr ,
  3423. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3424. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3425. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3426. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3427. + allow surfaceflinger app_data_file file getattr open read ioctl lock open append write create setattr
  3428. + addFile sepolicy
  3429. + [ -n ]
  3430. + echo sbin/su sepolicy
  3431. + grep -qE \bsepolicy\b
  3432. + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3433. + echo getattr open read ioctl lock open append write create setattr
  3434. + tr ,
  3435. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3436. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3437. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3438. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3439. + allow surfaceflinger app_data_file lnk_file read getattr
  3440. + addFile sepolicy
  3441. + [ -n ]
  3442. + echo sbin/su sepolicy
  3443. + grep -qE \bsepolicy\b
  3444. + [ -z surfaceflinger -o -z app_data_file -o -z lnk_file -o -z read getattr ]
  3445. + echo read getattr
  3446. + tr ,
  3447. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c lnk_file -p read,getattr -P sepolicy
  3448. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3449. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3450. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3451. + allow surfaceflinger app_data_file file getattr execute execute_no_trans
  3452. + addFile sepolicy
  3453. + [ -n ]
  3454. + echo sbin/su sepolicy
  3455. + grep -qE \bsepolicy\b
  3456. + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr execute execute_no_trans ]
  3457. + echo getattr execute execute_no_trans
  3458. + tr ,
  3459. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
  3460. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3461. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3462. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3463. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s surfaceflinger -P sepolicy
  3464. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3465. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3466. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3467. + suL8 su
  3468. + suMiscL8 su
  3469. + allow su system_file file mounton
  3470. + addFile sepolicy
  3471. + [ -n ]
  3472. + echo sbin/su sepolicy
  3473. + grep -qE \bsepolicy\b
  3474. + [ -z su -o -z system_file -o -z file -o -z mounton ]
  3475. + echo mounton
  3476. + tr ,
  3477. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p mounton -P sepolicy
  3478. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3479. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3480. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3481. + allow su su capability sys_admin
  3482. + addFile sepolicy
  3483. + [ -n ]
  3484. + echo sbin/su sepolicy
  3485. + grep -qE \bsepolicy\b
  3486. + [ -z su -o -z su -o -z capability -o -z sys_admin ]
  3487. + echo sys_admin
  3488. + tr ,
  3489. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
  3490. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3491. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3492. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3493. + suL9 su
  3494. + suMiscL9 su
  3495. + allow su labeledfs filesystem remount unmount
  3496. + addFile sepolicy
  3497. + [ -n ]
  3498. + echo sbin/su sepolicy
  3499. + grep -qE \bsepolicy\b
  3500. + [ -z su -o -z labeledfs -o -z filesystem -o -z remount unmount ]
  3501. + echo remount unmount
  3502. + tr ,
  3503. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t labeledfs -c filesystem -p remount,unmount -P sepolicy
  3504. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3505. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3506. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3507. + allow su rootfs filesystem remount
  3508. + addFile sepolicy
  3509. + [ -n ]
  3510. + echo sbin/su sepolicy
  3511. + grep -qE \bsepolicy\b
  3512. + [ -z su -o -z rootfs -o -z filesystem -o -z remount ]
  3513. + echo remount
  3514. + tr ,
  3515. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c filesystem -p remount -P sepolicy
  3516. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3517. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3518. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3519. + allowFSRW su block_device
  3520. + allow su block_device dir open getattr read search ioctl open search write add_name remove_name create
  3521. + addFile sepolicy
  3522. + [ -n ]
  3523. + echo sbin/su sepolicy
  3524. + grep -qE \bsepolicy\b
  3525. + [ -z su -o -z block_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3526. + echo open getattr read search ioctl open search write add_name remove_name create
  3527. + tr ,
  3528. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3529. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3530. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3531. libsepol.policydb_index_others: security: 87 classes, 9926 rules, 0 cond rules
  3532. + allow su block_device file getattr open read ioctl lock open append write create setattr
  3533. + addFile sepolicy
  3534. + [ -n ]
  3535. + echo sbin/su sepolicy
  3536. + grep -qE \bsepolicy\b
  3537. + [ -z su -o -z block_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3538. + echo getattr open read ioctl lock open append write create setattr
  3539. + tr ,
  3540. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3541. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3542. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3543. libsepol.policydb_index_others: security: 87 classes, 9927 rules, 0 cond rules
  3544. + allow su block_device lnk_file read getattr
  3545. + addFile sepolicy
  3546. + [ -n ]
  3547. + echo sbin/su sepolicy
  3548. + grep -qE \bsepolicy\b
  3549. + [ -z su -o -z block_device -o -z lnk_file -o -z read getattr ]
  3550. + echo read getattr
  3551. + tr ,
  3552. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c lnk_file -p read,getattr -P sepolicy
  3553. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3554. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3555. libsepol.policydb_index_others: security: 87 classes, 9928 rules, 0 cond rules
  3556. + allow su block_device blk_file getattr open read ioctl lock open append write
  3557. + addFile sepolicy
  3558. + [ -n ]
  3559. + echo sbin/su sepolicy
  3560. + grep -qE \bsepolicy\b
  3561. + [ -z su -o -z block_device -o -z blk_file -o -z getattr open read ioctl lock open append write ]
  3562. + echo getattr open read ioctl lock open append write
  3563. + tr ,
  3564. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c blk_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
  3565. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3566. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3567. libsepol.policydb_index_others: security: 87 classes, 9929 rules, 0 cond rules
  3568. + allow su su capability sys_admin
  3569. + addFile sepolicy
  3570. + [ -n ]
  3571. + echo sbin/su sepolicy
  3572. + grep -qE \bsepolicy\b
  3573. + [ -z su -o -z su -o -z capability -o -z sys_admin ]
  3574. + echo sys_admin
  3575. + tr ,
  3576. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
  3577. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3578. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3579. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3580. + allowFSRW su_daemon su_daemon
  3581. + allow su_daemon su_daemon dir open getattr read search ioctl open search write add_name remove_name create
  3582. + addFile sepolicy
  3583. + [ -n ]
  3584. + echo sbin/su sepolicy
  3585. + grep -qE \bsepolicy\b
  3586. + [ -z su_daemon -o -z su_daemon -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3587. + echo open getattr read search ioctl open search write add_name remove_name create
  3588. + tr ,
  3589. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3590. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3591. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3592. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3593. + allow su_daemon su_daemon file getattr open read ioctl lock open append write create setattr
  3594. + addFile sepolicy
  3595. + [ -n ]
  3596. + echo sbin/su sepolicy
  3597. + grep -qE \bsepolicy\b
  3598. + [ -z su_daemon -o -z su_daemon -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3599. + echo getattr open read ioctl lock open append write create setattr
  3600. + tr ,
  3601. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3602. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3603. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3604. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3605. + allow su_daemon su_daemon lnk_file read getattr
  3606. + addFile sepolicy
  3607. + [ -n ]
  3608. + echo sbin/su sepolicy
  3609. + grep -qE \bsepolicy\b
  3610. + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read getattr ]
  3611. + echo read getattr
  3612. + tr ,
  3613. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read,getattr -P sepolicy
  3614. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3615. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3616. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3617. + allowFSRW su_daemon system_data_file
  3618. + allow su_daemon system_data_file dir open getattr read search ioctl open search write add_name remove_name create
  3619. + addFile sepolicy
  3620. + [ -n ]
  3621. + echo sbin/su sepolicy
  3622. + grep -qE \bsepolicy\b
  3623. + [ -z su_daemon -o -z system_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3624. + echo open getattr read search ioctl open search write add_name remove_name create
  3625. + tr ,
  3626. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3627. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3628. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3629. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3630. + allow su_daemon system_data_file file getattr open read ioctl lock open append write create setattr
  3631. + addFile sepolicy
  3632. + [ -n ]
  3633. + echo sbin/su sepolicy
  3634. + grep -qE \bsepolicy\b
  3635. + [ -z su_daemon -o -z system_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3636. + echo getattr open read ioctl lock open append write create setattr
  3637. + tr ,
  3638. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3639. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3640. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3641. libsepol.policydb_index_others: security: 87 classes, 9931 rules, 0 cond rules
  3642. + allow su_daemon system_data_file lnk_file read getattr
  3643. + addFile sepolicy
  3644. + [ -n ]
  3645. + echo sbin/su sepolicy
  3646. + grep -qE \bsepolicy\b
  3647. + [ -z su_daemon -o -z system_data_file -o -z lnk_file -o -z read getattr ]
  3648. + echo read getattr
  3649. + tr ,
  3650. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c lnk_file -p read,getattr -P sepolicy
  3651. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3652. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3653. libsepol.policydb_index_others: security: 87 classes, 9932 rules, 0 cond rules
  3654. + allow su_daemon labeledfs filesystem associate
  3655. + addFile sepolicy
  3656. + [ -n ]
  3657. + echo sbin/su sepolicy
  3658. + grep -qE \bsepolicy\b
  3659. + [ -z su_daemon -o -z labeledfs -o -z filesystem -o -z associate ]
  3660. + echo associate
  3661. + tr ,
  3662. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t labeledfs -c filesystem -p associate -P sepolicy
  3663. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3664. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3665. libsepol.policydb_index_others: security: 87 classes, 9933 rules, 0 cond rules
  3666. + allow su_daemon su_daemon process setfscreate
  3667. + addFile sepolicy
  3668. + [ -n ]
  3669. + echo sbin/su sepolicy
  3670. + grep -qE \bsepolicy\b
  3671. + [ -z su_daemon -o -z su_daemon -o -z process -o -z setfscreate ]
  3672. + echo setfscreate
  3673. + tr ,
  3674. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setfscreate -P sepolicy
  3675. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3676. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3677. libsepol.policydb_index_others: security: 87 classes, 9934 rules, 0 cond rules
  3678. + [ eng == eng ]
  3679. + /tmp/superuser/scripts/bin/sepolicy-inject -Z su -P sepolicy
  3680. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3681. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3682. libsepol.policydb_index_others: security: 87 classes, 9934 rules, 0 cond rules
  3683. + sed -i /flash_recovery/a \ disabled init.rc
  3684. + sed -i /on init/a \ chmod 0755 /sbin init.rc
  3685. + echo -e service su /sbin/su --daemon\n\tclass main\n\tseclabel u:r:su_daemon:s0\n
  3686. + addFile init.rc
  3687. + [ -n ]
  3688. + echo sbin/su sepolicy
  3689. + grep -qE \binit.rc\b
  3690. + INITRAMFS_FILES= sbin/su sepolicy init.rc
  3691. + VERSIONED=1
  3692. + [ -n 1 ]
  3693. + [ -f /tmp/superuser/scripts/gitversion ]
  3694. + cat /tmp/superuser/scripts/gitversion
  3695. + rev=828eeb2
  3696. + echo 828eeb2
  3697. + addFile super-bootimg
  3698. + [ -n ]
  3699. + echo sbin/su sepolicy init.rc
  3700. + grep -qE \bsuper-bootimg\b
  3701. + INITRAMFS_FILES= sbin/su sepolicy init.rc super-bootimg
  3702. + doneBootImgEdit
  3703. + echo sbin/su sepolicy init.rc super-bootimg
  3704. + tr \n
  3705. + cpio -o -H newc
  3706. + [ -f /tmp/tmp.DXhiiE/ramdisk.gz ]
  3707. + cat ramdisk1 ramdisk2
  3708. + gzip -9 -c
  3709. + cd /tmp/tmp.DXhiiE
  3710. + rm -Rf /tmp/tmp.08nCro
  3711. + /tmp/superuser/scripts/bin/bootimg-repack /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  3712. + cp new-boot.img /tmp/superuser/scripts/su
  3713. + cd /tmp/superuser/scripts/su
  3714. + rm -Rf /tmp/tmp.DXhiiE
  3715. + [ -f /tmp/superuser/scripts/keystore.x509.pem -a -f /tmp/superuser/scripts/keystore.pk8 ]
  3716. + cleanup
  3717. + rm -Rf /tmp/tmp.DXhiiE /tmp/tmp.08nCro
  3718. + ui_print Generated /new-boot.img
  3719. + echo ui_print Generated /new-boot.img
  3720. + dd if=new-boot.img of=/dev/block/platform/msm_sdcc.1/by-name/boot bs=8192
  3721. Generated /new-boot.img1369+1 records in
  3722. 1369+1 records out
  3723. 11220992 bytes (10.7MB) copied, 0.106494 seconds, 100.5MB/s
  3724. + ui_print Flashed root-ed boot.img
  3725. + echo ui_print Flashed root-ed boot.img
  3726. Flashed root-ed boot.imgI:Legacy property environment disabled.
  3727. rm: can't remove 'META-INF/com/google/android': No such file or directory
  3728. ZIP successfully installed
  3729. I:Running cmd "rm "/dev/block/mmcblk0p42""
  3730. I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
  3731. Restoring mounts...
  3732. losetup: /dev/block/loop0: No such device or address
  3733. losetup: /dev/block/loop1: No such device or address
  3734. losetup: /dev/block/loop2: No such device or address
  3735. losetup: /dev/block/loop3: No such device or address
  3736. losetup: /dev/block/loop4: No such device or address
  3737. losetup: /dev/block/loop5: No such device or address
  3738. losetup: /dev/block/loop6: No such device or address
  3739. losetup: /dev/block/loop7: No such device or address
  3740. I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
  3741. Updating partition details...
  3742. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  3743. I:Data backup size is 2841MB, free: 15603MB.
  3744. I:sending message to remove 65539
  3745. mtppipe remove storage 65539
  3746. I:Message sent, remove storage ID: 65539
  3747. I:Unable to mount '/usb_otg'
  3748. I:Actual block device: '', current file system: 'vfat'
  3749. ...done
  3750. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  3751. Extracting contents of boot.img...
  3752. I:Running cmd "rm -r "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/"*"
  3753. rm: can't remove '/tmp/boot': No such file or directory
  3754. Ramdisk uses GZIP compression
  3755. 11039 blocks
  3756. I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3757. I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3758. I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3759. I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3760. I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3761. I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3762. I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3763. I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3764. I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3765. I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3766. I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3767. I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3768. cp: can't stat '/tmp/boot/cache': No such file or directory
  3769. I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3770. I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3771. I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3772. cp: can't stat '/tmp/boot//cache': No such file or directory
  3773. I:Running cmd "mkdir "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
  3774. I:Running cmd "cp -a /tmp/boot//sbin/su "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
  3775. cp: can't stat '/tmp/boot//sbin/su': No such file or directory
  3776. I:Running cmd "cd "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
  3777. rm: can't remove 'cmdline': No such file or directory
  3778. rm: can't remove 'ramdisk.gz': No such file or directory
  3779. rm: can't remove 'zImage': No such file or directory
  3780. Injecting boot.img..
  3781. I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
  3782. I:Set page: 'multirom_action_complete'
  3783. I:operation_end - status=0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement