Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting TWRP 2.8.7 on Mon Dec 28 17:01:41 2015
- (pid 250)
- Setting SELinux to permissive
- TW_INCLUDE_DUMLOCK := true
- I:Lun file '/sys/devices/msm_dwc3/f9200000.dwc3/gadget/lun0/file'
- TW_INCLUDE_CRYPTO := true
- I:TW_BRIGHTNESS_PATH := /sys/class/leds/lcd-backlight/brightness
- I:Found brightness file at '/sys/class/leds/lcd-backlight/brightness'
- I:TWFunc::Set_Brightness: Setting brightness control to 255
- Starting the UI...Pixel format: 1080x1920 @ 32bpp
- Pixel format: RGBX_8888
- Not using qualcomm overlay, 'mdssfb_90000'
- framebuffer: fd 4 (1080 x 1920)
- minui: /sys/board_properties/virtualkeys.synaptics-rmi-touchscreen is 5 % 6
- => Linking mtab
- => Processing recovery.fstab
- I:Processing '/boot'
- I:Processing '/cache'
- I:Processing '/data'
- I:Processing '/misc'
- I:Processing '/recovery'
- I:Processing '/system'
- I:Processing '/devlog'
- I:Created '/devlog' folder.
- I:Processing '/carrier'
- I:Created '/carrier' folder.
- I:Processing '/reserve'
- I:Created '/reserve' folder.
- I:Processing '/external_sd'
- I:Created '/external_sd' folder.
- I:Processing '/sd_ext'
- I:Created '/sd_ext' folder.
- I:Processing '/usb_otg'
- I:Created '/usb_otg' folder.
- I:Using automatic handling for /data/media emulated storage device.
- I:Setting up '/data' as data/media emulated storage.
- I:Created '/sdcard' folder.
- I:mount -o bind '/data/media' '/sdcard' process ended with RC=0
- I:Created '/and-sec' folder.
- I:Creating Android Secure: /external_sd/.android_secure
- I:mount -o bind '/external_sd/.android_secure' '/and-sec' process ended with RC=0
- I:Backup folder set to '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Settings storage is '/data/media/0'
- Updating partition details...
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Data backup size is 2841MB, free: 16583MB.
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- ...done
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Unmounting main partitions...
- Partition Logs:
- /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
- Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p42
- Display_Name: Boot
- Storage_Name: boot
- Backup_Path: /boot
- Backup_Name: boot
- Backup_Display_Name: Boot
- Storage_Path: /boot
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /cache | /dev/block/mmcblk0p46 | Size: 377MB Used: 6MB Free: 371MB Backup Size: 6MB Raw size: 402653184
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p46
- Display_Name: Cache
- Storage_Name: Cache
- Backup_Path: /cache
- Backup_Name: cache
- Backup_Display_Name: Cache
- Storage_Path: /cache
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /data | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 16583MB Backup Size: 2841MB Raw size: 27246198784
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
- Symlink_Path: /data/media/0
- Symlink_Mount_Point: /sdcard
- Primary_Block_Device: /dev/block/mmcblk0p47
- Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
- Display_Name: Data
- Storage_Name: Internal Storage
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /data/media/0
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- MTP_Storage_ID: 65539
- /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
- Flags: IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p24
- Display_Name: misc
- Storage_Name: misc
- Backup_Path: /misc
- Backup_Name: misc
- Backup_Display_Name: misc
- Storage_Path: /misc
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
- Flags: IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p43
- Display_Name: Recovery
- Storage_Name: recovery
- Backup_Path: /recovery
- Backup_Name: recovery
- Backup_Display_Name: Recovery
- Storage_Path: /recovery
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /system | /dev/block/mmcblk0p45 | Size: 2641MB Used: 1164MB Free: 1477MB Backup Size: 1164MB Raw size: 2818572288
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p45
- Display_Name: System
- Storage_Name: System
- Backup_Path: /system
- Backup_Name: system
- Backup_Display_Name: System
- Storage_Path: /system
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p39
- Display_Name: devlog
- Storage_Name: devlog
- Backup_Path: /devlog
- Backup_Name: devlog
- Backup_Display_Name: devlog
- Storage_Path: /devlog
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p37
- Display_Name: carrier
- Storage_Name: carrier
- Backup_Path: /carrier
- Backup_Name: carrier
- Backup_Display_Name: carrier
- Storage_Path: /carrier
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p41
- Display_Name: reserve
- Storage_Name: reserve
- Backup_Path: /reserve
- Backup_Name: reserve
- Backup_Display_Name: reserve
- Storage_Path: /reserve
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
- Symlink_Path: /external_sd/.android_secure
- Symlink_Mount_Point: /and-sec
- Primary_Block_Device: /dev/block/mmcblk1p1
- Alternate_Block_Device: /dev/block/mmcblk1
- Display_Name: Micro SDcard
- Storage_Name: Micro SDcard
- Backup_Path: /and-sec
- Backup_Name: and-sec
- Backup_Display_Name: Android Secure
- Storage_Path: /external_sd
- Current_File_System: exfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65537
- /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
- Primary_Block_Device: /dev/block/mmcblk1p2
- Display_Name: SD-Ext
- Storage_Name: SD-Ext
- Backup_Path: /sd_ext
- Backup_Name: sd_ext
- Backup_Display_Name: SD-Ext
- Storage_Path: /sd_ext
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
- Primary_Block_Device: /dev/block/sda1
- Alternate_Block_Device: /dev/block/sda
- Display_Name: USB-OTG
- Storage_Name: USB-OTG
- Backup_Path: /usb_otg
- Backup_Name: usb_otg
- Backup_Display_Name: USB-OTG
- Storage_Path: /usb_otg
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65538
- MultiROM Recovery version: 2015-12-28 p1
- I:Loading package: TWRP (/script/ui.xml)
- I:Load XML directly
- I:Loading package: TWRP (/data/media/0/TWRP/theme/ui.zip)
- I:Loading zip theme
- I:Loading package: TWRP (/twres/ui.xml)
- I:Load XML directly
- I:Checking resolution...
- I:Loading resources...
- open_png /twres/images/statusbar.png
- open_png /twres/images/actionbar.png
- open_png /twres/images/actionbar_tab.png
- open_png /twres/images/actionbar_ex.png
- open_png /twres/images/actionbar_logo.png
- open_png /twres/images/actionbar_back.png
- open_png /twres/images/actionbar_back_hl.png
- open_png /twres/images/actionbar_settings.png
- open_png /twres/images/actionbar_settings_hl.png
- open_png /twres/images/actionbar_overflow.png
- open_png /twres/images/actionbar_overflow_hl.png
- open_png /twres/images/actionbar_pin.png
- open_png /twres/images/actionbar_pin_hl.png
- open_png /twres/images/actionbar_pinned.png
- open_png /twres/images/actionbar_pinned_hl.png
- open_png /twres/images/actionbar_refresh.png
- open_png /twres/images/actionbar_refresh_hl.png
- open_png /twres/images/actionbar_sort.png
- open_png /twres/images/actionbar_sort_hl.png
- open_png /twres/images/actionbar_reset.png
- open_png /twres/images/actionbar_reset_hl.png
- open_png /twres/images/actionbar_font_big.png
- open_png /twres/images/actionbar_font_big_hl.png
- open_png /twres/images/actionbar_font_small.png
- open_png /twres/images/actionbar_font_small_hl.png
- open_png /twres/images/actionbar_theme.png
- open_png /twres/images/actionbar_theme_hl.png
- open_png /twres/images/actionbar_encr_dis.png
- open_png /twres/images/actionbar_encr_dis_hl.png
- open_png /twres/images/actionbar_encr_ena.png
- open_png /twres/images/actionbar_encr_ena_hl.png
- open_png /twres/images/actionbar_delete.png
- open_png /twres/images/actionbar_delete_hl.png
- open_png /twres/images/actionbar_edit.png
- open_png /twres/images/actionbar_edit_hl.png
- open_png /twres/images/actionbar_close.png
- open_png /twres/images/actionbar_close_hl.png
- open_png /twres/images/btn_float_addtoqueue.png
- open_png /twres/images/btn_float_addtoqueue_hl.png
- open_png /twres/images/btn_float_flashifyinfo.png
- open_png /twres/images/btn_float_flashifyinfo_hl.png
- open_png /twres/images/btn_float_accept.png
- open_png /twres/images/btn_float_folder.png
- open_png /twres/images/btn_menu_zip.png
- open_png /twres/images/btn_menu_zip_sel.png
- open_png /twres/images/btn_menu_img.png
- open_png /twres/images/btn_menu_img_sel.png
- open_png /twres/images/btn_menu_name_a.png
- open_png /twres/images/btn_menu_name_a_sel.png
- open_png /twres/images/btn_menu_name_d.png
- open_png /twres/images/btn_menu_name_d_sel.png
- open_png /twres/images/btn_menu_date_a.png
- open_png /twres/images/btn_menu_date_a_sel.png
- open_png /twres/images/btn_menu_date_d.png
- open_png /twres/images/btn_menu_date_d_sel.png
- open_png /twres/images/btn_menu_size_a.png
- open_png /twres/images/btn_menu_size_a_sel.png
- open_png /twres/images/btn_menu_size_d.png
- open_png /twres/images/btn_menu_size_d_sel.png
- open_png /twres/images/btn_menu_inject.png
- open_png /twres/images/btn_menu_settings.png
- open_png /twres/images/btn_flat_less.png
- open_png /twres/images/btn_flat_more.png
- open_png /twres/images/btn_flat_ext3.png
- open_png /twres/images/btn_flat_ext4.png
- open_png /twres/images/btn_flat_installdumlock.png
- open_png /twres/images/btn_flat_reflashrecovery.png
- open_png /twres/images/btn_flat_restoreboot.png
- open_png /twres/images/btn_flat_injectbootsector.png
- open_png /twres/images/btn_flat_rot0.png
- open_png /twres/images/btn_flat_rot90.png
- open_png /twres/images/btn_flat_rot180.png
- open_png /twres/images/btn_flat_rot270.png
- open_png /twres/images/btn_raised_clearqueue.png
- open_png /twres/images/btn_raised_viewqueue.png
- open_png /twres/images/btn_raised_installscript.png
- open_png /twres/images/btn_raised_wipecaches.png
- open_png /twres/images/btn_raised_rebootsystem.png
- open_png /twres/images/btn_raised_rebootrecovery.png
- open_png /twres/images/btn_raised_formatdata.png
- open_png /twres/images/btn_raised_filesystem.png
- open_png /twres/images/btn_raised_fsoptions.png
- open_png /twres/images/btn_raised_fsrepair.png
- open_png /twres/images/btn_raised_fschange.png
- open_png /twres/images/btn_raised_fsresize.png
- open_png /twres/images/btn_raised_keepreadonly.png
- open_png /twres/images/btn_raised_disconnect.png
- open_png /twres/images/btn_raised_advancedwipe.png
- open_png /twres/images/btn_raised_back.png
- open_png /twres/images/btn_raised_decryptdata.png
- open_png /twres/images/btn_raised_enablemtp.png
- open_png /twres/images/btn_raised_disablemtp.png
- open_png /twres/images/btn_raised_usbstorage.png
- open_png /twres/images/btn_raised_cancel.png
- open_png /twres/images/btn_raised_noinstall.png
- open_png /twres/images/btn_raised_changetheme.png
- open_png /twres/images/btn_raised_changesplash.png
- open_png /twres/images/btn_raised_wipeencryption.png
- open_png /twres/images/btn_raised_mr_addrom.png
- open_png /twres/images/btn_raised_mr_swaproms.png
- open_png /twres/images/btn_raised_mr_delete.png
- open_png /twres/images/btn_raised_mr_rename.png
- open_png /twres/images/btn_raised_mr_backup.png
- open_png /twres/images/btn_raised_mr_wipedata.png
- open_png /twres/images/btn_raised_mr_wipedalvik.png
- open_png /twres/images/btn_raised_mr_wipecache.png
- open_png /twres/images/btn_raised_mr_addboot.png
- open_png /twres/images/btn_raised_mr_remboot.png
- open_png /twres/images/btn_raised_mr_addradio.png
- open_png /twres/images/btn_raised_mr_remradio.png
- open_png /twres/images/btn_raised_mr_flashzip.png
- open_png /twres/images/btn_raised_mr_sideload.png
- open_png /twres/images/btn_raised_mr_repatchinit.png
- open_png /twres/images/btn_raised_mr_next.png
- open_png /twres/images/btn_raised_mr_zipfile.png
- open_png /twres/images/btn_raised_mr_addfile.png
- open_png /twres/images/btn_raised_mr_selectimage.png
- open_png /twres/images/btn_raised_mr_restorecon.png
- open_png /twres/images/btn_appenddate.png
- open_png /twres/images/clr_red.png
- open_png /twres/images/clr_pink.png
- open_png /twres/images/clr_indigo.png
- open_png /twres/images/clr_blue.png
- open_png /twres/images/clr_lightblue.png
- open_png /twres/images/clr_teal.png
- open_png /twres/images/clr_green.png
- open_png /twres/images/clr_lightgreen.png
- open_png /twres/images/clr_lime.png
- open_png /twres/images/clr_amber.png
- open_png /twres/images/clr_orange.png
- open_png /twres/images/clr_deeporange.png
- open_png /twres/images/clr_brown.png
- open_png /twres/images/clr_grey.png
- open_png /twres/images/clr_bluegrey.png
- open_png /twres/images/background.png
- open_png /twres/images/divider.png
- open_png /twres/images/divider_list.png
- open_png /twres/images/divider_wide.png
- open_png /twres/images/hider_ab_ex.png
- open_png /twres/images/dialog_bg.png
- open_png /twres/images/dialog_label_storage.png
- open_png /twres/images/dialog_label_bookmark.png
- open_png /twres/images/dialog_label_restoresettings.png
- open_png /twres/images/dialog_label_settheme.png
- open_png /twres/images/dialog_label_color.png
- open_png /twres/images/dialog_label_encryption.png
- open_png /twres/images/dialog_label_decryption.png
- open_png /twres/images/dialog_label_offset.png
- open_png /twres/images/dialog_label_removetheme.png
- open_png /twres/images/dialog_label_warning.png
- open_png /twres/images/menu_install.png
- open_png /twres/images/menu_sort.png
- open_png /twres/images/db_ok.png
- open_png /twres/images/db_ok_hl.png
- open_png /twres/images/db_cancel.png
- open_png /twres/images/db_cancel_hl.png
- open_png /twres/images/bs_bg.png
- open_png /twres/images/bs_btn_copy.png
- open_png /twres/images/bs_btn_cut.png
- open_png /twres/images/bs_btn_chmod755.png
- open_png /twres/images/bs_btn_chmod644.png
- open_png /twres/images/bs_btn_chmod.png
- open_png /twres/images/bs_btn_delete.png
- open_png /twres/images/bs_btn_rename.png
- open_png /twres/images/bs_close.png
- open_png /twres/images/bc_install.png
- open_png /twres/images/bc_install_zip.png
- open_png /twres/images/bc_install_zip_m.png
- open_png /twres/images/bc_install_image.png
- open_png /twres/images/bc_install_image_m.png
- open_png /twres/images/bc_wipe.png
- open_png /twres/images/bc_backup.png
- open_png /twres/images/bc_restore.png
- open_png /twres/images/bc_mount.png
- open_png /twres/images/bc_advanced.png
- open_png /twres/images/bc_filemanager.png
- open_png /twres/images/bc_restart.png
- open_png /twres/images/bc_confirmaction.png
- open_png /twres/images/bc_working.png
- open_png /twres/images/bc_done.png
- open_png /twres/images/bc_settings.png
- open_png /twres/images/bc_settings_theme.png
- open_png /twres/images/bc_terminal.png
- open_png /twres/images/bc_sideload.png
- open_png /twres/images/bc_installsu.png
- open_png /twres/images/bc_about.png
- open_png /twres/images/bc_partsdcard.png
- open_png /twres/images/bc_dumlock.png
- open_png /twres/images/bc_multirom.png
- open_png /twres/images/bc_multiromsettings.png
- open_png /twres/images/mb_empty.png
- open_png /twres/images/mb_empty_s.png
- open_png /twres/images/mb_install.png
- open_png /twres/images/mb_wipe.png
- open_png /twres/images/mb_backup.png
- open_png /twres/images/mb_restore.png
- open_png /twres/images/mb_mount.png
- open_png /twres/images/mb_filemanager.png
- open_png /twres/images/mb_advanced.png
- open_png /twres/images/mb_restart.png
- open_png /twres/images/mb_system.png
- open_png /twres/images/mb_recovery.png
- open_png /twres/images/mb_bootloader.png
- open_png /twres/images/mb_theme.png
- open_png /twres/images/mb_poweroff.png
- open_png /twres/images/mb_download.png
- open_png /twres/images/mb_logtosd.png
- open_png /twres/images/mb_fixpermissions.png
- open_png /twres/images/mb_terminalcommand.png
- open_png /twres/images/mb_adbsideload.png
- open_png /twres/images/mb_dumlock.png
- open_png /twres/images/mb_reinjecttwrp.png
- open_png /twres/images/mb_partsdcard.png
- open_png /twres/images/mb_multirom.png
- open_png /twres/images/mb_install_color.png
- open_png /twres/images/mb_wipe_color.png
- open_png /twres/images/mb_backup_color.png
- open_png /twres/images/mb_restore_color.png
- open_png /twres/images/mb_mount_color.png
- open_png /twres/images/mb_filemanager_color.png
- open_png /twres/images/mb_advanced_color.png
- open_png /twres/images/mb_restart_color.png
- open_png /twres/images/mb_system_color.png
- open_png /twres/images/mb_recovery_color.png
- open_png /twres/images/mb_bootloader_color.png
- open_png /twres/images/mb_theme_color.png
- open_png /twres/images/mb_poweroff_color.png
- open_png /twres/images/mb_download_color.png
- open_png /twres/images/mb_logtosd_color.png
- open_png /twres/images/mb_fixpermissions_color.png
- open_png /twres/images/mb_terminalcommand_color.png
- open_png /twres/images/mb_adbsideload_color.png
- open_png /twres/images/mb_dumlock_color.png
- open_png /twres/images/mb_reinjecttwrp_color.png
- open_png /twres/images/mb_partsdcard_color.png
- open_png /twres/images/mb_multirom_color.png
- open_png /twres/images/icon_info.png
- open_png /twres/images/icon_warning.png
- open_png /twres/images/icon_person.png
- open_png /twres/images/icon_mail.png
- open_png /twres/images/icon_palette.png
- open_png /twres/images/icon_cake.png
- open_png /twres/images/icon_color.png
- open_png /twres/images/icon_confirm.png
- open_png /twres/images/file.png
- open_png /twres/images/folder.png
- open_png /twres/images/unlock_icon.png
- open_png /twres/images/folder_mr.png
- open_png /twres/images/indeterminate001.png
- open_png /twres/images/indeterminate002.png
- open_png /twres/images/indeterminate003.png
- open_png /twres/images/indeterminate004.png
- open_png /twres/images/indeterminate005.png
- open_png /twres/images/indeterminate006.png
- open_png /twres/images/indeterminate007.png
- open_png /twres/images/indeterminate008.png
- open_png /twres/images/indeterminate009.png
- open_png /twres/images/indeterminate010.png
- open_png /twres/images/indeterminate011.png
- open_png /twres/images/indeterminate012.png
- open_png /twres/images/indeterminate013.png
- open_png /twres/images/indeterminate014.png
- open_png /twres/images/indeterminate015.png
- open_png /twres/images/indeterminate016.png
- open_png /twres/images/indeterminate017.png
- open_png /twres/images/indeterminate018.png
- open_png /twres/images/indeterminate019.png
- open_png /twres/images/indeterminate020.png
- open_png /twres/images/indeterminate021.png
- open_png /twres/images/indeterminate022.png
- open_png /twres/images/indeterminate023.png
- open_png /twres/images/indeterminate024.png
- open_png /twres/images/indeterminate025.png
- open_png /twres/images/progress_empty.png
- open_png /twres/images/progress_fill.png
- open_png /twres/images/checkbox_false.png
- open_png /twres/images/checkbox_true.png
- open_png /twres/images/checkbox_false_d.png
- open_png /twres/images/checkbox_true_d.png
- open_png /twres/images/radio_false.png
- open_png /twres/images/radio_true.png
- open_png /twres/images/radio_false_d.png
- open_png /twres/images/radio_true_d.png
- open_png /twres/images/home.png
- open_png /twres/images/home_hl.png
- open_png /twres/images/back.png
- open_png /twres/images/back_hl.png
- open_png /twres/images/slideout.png
- open_png /twres/images/slideout_hl.png
- open_png /twres/images/slider.png
- open_png /twres/images/slider_used.png
- open_png /twres/images/slider_lock.png
- open_png /twres/images/slider_lock_used.png
- open_png /twres/images/slider_lock_handle.png
- open_png /twres/images/handle.png
- open_png /twres/images/handle_h.png
- open_png /twres/images/keyboard1.png
- open_png /twres/images/keyboard2.png
- open_png /twres/images/keyboard3.png
- open_png /twres/images/keyboard4.png
- open_png /twres/images/keyboard_shadow.png
- open_png /twres/images/usb.png
- open_png /twres/images/input_line.png
- open_png /twres/images/input_line_dialog.png
- open_png /twres/images/input_line_fail_backupname.png
- open_png /twres/images/input_line_fail_dialog_encr.png
- open_png /twres/images/input_line_fail_decr.png
- open_png /twres/images/input_line_fail_romname.png
- open_png /twres/images/tab_misc.png
- open_png /twres/images/tab_misc_a.png
- open_png /twres/images/tab_display.png
- open_png /twres/images/tab_display_a.png
- open_png /twres/images/tab_time.png
- open_png /twres/images/tab_time_a.png
- open_png /twres/images/tab_vibration.png
- open_png /twres/images/tab_vibration_a.png
- open_png /twres/images/tab_mr_bootmenu.png
- open_png /twres/images/tab_mr_bootmenu_a.png
- open_png /twres/images/tab_mr_autoboot.png
- open_png /twres/images/tab_mr_autoboot_a.png
- open_png /twres/images/cursor.png
- I:Loading variables...
- I:Loading mouse cursor...
- I:Loading pages...
- I:PageSet::CheckInclude loading filename: '/twres/light_mr.xml'
- I:Loading included resources...
- I:Loading included variables...
- I:Loading mouse cursor...
- I:Loading included pages...
- I:Loading page main
- I:Loading page main2
- I:Loading page settings
- I:Loading page timezone
- I:Loading page screen
- I:Loading page vibrate
- I:Loading page theme_settings
- I:Loading page theme_color
- I:Loading page set_color
- I:Loading page theme_swap
- I:Loading page theme_splash
- I:Loading page theme_splash_info
- I:Loading page theme_splash_select_img
- I:Loading page theme_splash_select_jpg
- I:Loading page theme_splash_flash
- I:Loading page theme_splash_flash_done
- I:Loading page install
- I:Loading page install_image
- I:Loading page flash_confirm
- I:Loading page queueview
- I:Loading page flash_aromafm_confirm
- I:Loading page flash_image_confirm
- I:Loading page flash_image_confirm_f
- I:Loading page flash_image_info
- I:Loading page add_zip
- I:Loading page flash_zip
- I:Loading page flash_image
- I:Loading page flash_done
- I:Loading page flash_image_done
- I:Loading page clear_vars
- I:Loading page confirm_action
- I:Loading page action_page
- I:Loading page singleaction_page
- I:Loading page action_complete
- I:Loading page reboot
- I:Loading page filecheck
- I:Loading page themecheck
- I:Loading page rebootcheck
- I:Loading page wipe
- I:Loading page advancedwipe
- I:Loading page formatdata
- I:Loading page formatdata_confirm
- I:Loading page checkpartitionlist
- I:Loading page partitionoptions
- I:Loading page refreshfilesystem
- I:Loading page selectfilesystem
- I:Loading page wipe_confirm_action
- I:Loading page wipe_action_page
- I:Loading page wipe_action_complete
- I:Loading page backup
- I:Loading page backupname1
- I:Loading page backupname2
- I:Loading page checkbackuppassword
- I:Loading page backup_run
- I:Loading page backup_action_complete
- I:Loading page restore
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Loading page restore_read
- I:Loading page restore_decrypt
- I:Loading page try_restore_decrypt
- I:Loading page restore_select
- I:Loading page renamebackup
- I:Loading page deletebackup
- I:Loading page restore_run
- I:Loading page restore_confirm_action
- I:Loading page restore_action_page
- I:Loading page restore_action_complete
- I:Loading page mount
- I:Loading page usb_mount
- I:Loading page usb_umount
- I:Loading page system_readonly_check
- I:Loading page system_readonly
- I:Loading page decrypt
- I:Loading page decrypt_pattern
- I:Loading page trydecrypt
- I:Loading page filemanagerlist
- I:Loading page filemanageroptions
- I:Loading page choosedestinationfolder
- I:Loading page filemanagerrenamefile
- I:Loading page filemanagerrenamefolder
- I:Loading page filemanagerchmod
- I:Loading page filemanagerconfirm
- I:Loading page filemanageraction
- I:Loading page filemanagercomplete
- I:Loading page advanced
- I:Loading page fixpermissions
- I:Loading page partsdcard
- I:Loading page htcdumlock
- I:Loading page terminalfolder
- I:Loading page terminalcommand
- I:Loading page sideload
- I:Loading page installsu
- I:Loading page lock
- I:Loading page about
- I:Loading page console
- I:Loading page menu_install
- I:Loading page menu_sort
- I:Loading page dialog_storage
- I:Loading page dialog_color
- I:Loading page dialog_encryption1
- I:Loading page dialog_encryption2
- I:Loading page dialog_folder
- I:Loading page dialog_settheme
- I:Loading page dialog_offset
- I:Loading page dialog_reset
- I:Loading page dialog_reset_theme
- I:Loading page dialog_remove_theme
- I:Loading page dialog_warning
- I:Loading page multirom_msg
- I:Loading page multirom_main
- I:Loading page multirom_list
- I:Unable to open ''
- I:Loading page multirom_manage
- I:Loading page multirom_manage_inject_select
- I:Loading page multirom_manage_flash_select
- I:Loading page multirom_manage_flash_confirm
- I:Loading page multirom_manage_confirm_action
- I:Loading page multirom_rename
- I:Loading page multirom_do_rename
- I:Loading page multirom_settings
- I:Loading page multirom_settings_autoboot
- I:Loading page multirom_settings_rename_internal
- I:Loading page multirom_inject
- I:Loading page multirom_inject_select
- I:Loading page multirom_add
- I:Loading page multirom_add_sailfish
- I:Loading page multirom_add_source
- I:Loading page multirom_add_select
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Loading page multirom_add_start_process
- I:Loading page multirom_add_confirm_action
- I:Loading page multirom_add_image_size
- I:Loading page multirom_change_img_size
- I:Loading page multirom_confirm_action
- I:Loading page multirom_action_page
- I:Loading page multirom_action_complete
- I:Loading page multirom_sideload_complete
- I:Loading page multirom_swap
- I:Loading page multirom_swap_set_internal_name
- I:Loading page multirom_swap_space_info
- I:Loading page multirom_set_list_loc
- I:Loading page menu_multirom
- I:Loading page dialog_storage_mr
- I:Set page: 'clear_vars'
- I:Set page: 'main2'
- I:Switching packages (TWRP)
- SELinux contexts loaded from /file_contexts
- Full SELinux support is present.
- Startup Commands:
- ro.com.google.clientidbase=android-google
- ro.com.android.dateformat=MM-dd-yyyy
- ro.com.android.dataroaming=true
- ro.com.android.wifi-watchlist=GoogleGuest
- ro.ril.oem.ecclist=911
- ro.ril.set.mtusize=1422
- ro.ril.svdo=true
- ro.ril.hsdpa.category=14
- ro.ril.hsxpa=4
- ro.ril.enable.a53=1
- ro.ril.enable.sdr=0
- ro.ril.enable.gea3=1
- ro.ril.enable.r8fd=1
- ro.ril.disable.fd.plmn.prefix=23402,23410,23411,23420
- ro.ril.disable.cpc=1
- ro.url.legal=http://www.google.com/intl/%s/mobile/android/basic/phone-legal.html
- ro.boot.dq=PASS
- ro.boot.lb=1
- ro.boot.cid=22222222
- ro.boot.mid=0P6B70000
- ro.boot.emmc=true
- ro.boot.mode=recovery
- ro.boot.podt=0x3E8
- ro.boot.engid=0
- ro.boot.ddrmid=(0x1)
- ro.boot.carrier=COMMON
- ro.boot.keycaps=qwerty
- ro.boot.selinux=permissive
- ro.boot.baseband=1.09.20.0209
- ro.boot.hardware=qcom
- ro.boot.pagesize=2048
- ro.boot.rom_type=NORMAL
- ro.boot.serialno=HT444SF01255
- ro.boot.devicerev=5
- ro.boot.bootloader=3.19.0.0000
- ro.boot.efuse_info=SL
- ro.boot.batt_poweron=good_battery
- ro.cdma.home.operator.alpha=Sprint
- ro.cdma.home.operator.numeric=310120
- ro.hwui.path_cache_size=32
- ro.hwui.layer_cache_size=48
- ro.hwui.texture_cache_size=72
- ro.hwui.gradient_cache_size=1
- ro.hwui.r_buffer_cache_size=8
- ro.hwui.drop_shadow_cache_size=6
- ro.hwui.text_large_cache_width=2048
- ro.hwui.text_small_cache_width=1024
- ro.hwui.text_large_cache_height=1024
- ro.hwui.text_small_cache_height=1024
- ro.hwui.texture_cache_flushrate=0.4
- ro.omni.device=m8
- ro.omni.version=5.1.1-20151228-m8-HOMEMADE
- ro.twrp.boot=1
- ro.twrp.version=2.8.7
- ro.wifi.channels=
- ro.allow.mock.location=1
- ro.board.platform=msm8974
- ro.build.id=LYZ28J
- ro.build.date=Mon Dec 28 10:53:57 EST 2015
- ro.build.date.utc=0
- ro.build.host=QuadCore-SSD-BuildBox
- ro.build.tags=test-keys
- ro.build.type=eng
- ro.build.user=throwback
- ro.build.flavor=omni_m8-eng
- ro.build.display.id=omni_m8-eng 5.1.1 LYZ28J eng.throwback.20151228.105339 test-keys
- ro.build.product=m8
- ro.build.version.sdk=22
- ro.build.version.base_os=
- ro.build.version.release=5.1.1
- ro.build.version.codename=REL
- ro.build.version.incremental=eng.throwback.20151228.105339
- ro.build.version.all_codenames=REL
- ro.build.version.security_patch=2015-11-01
- ro.build.description=4.20.651.10 CL476182 release-keys
- ro.build.fingerprint=htc/sprint_wwe/htc_m8whl:5.0.1/LRX22C/476182.10:user/release-keys
- ro.build.characteristics=default
- ro.config.ringtone=Orion.ogg
- ro.config.alarm_alert=Argon.ogg
- ro.config.notification_sound=pixiedust.ogg
- ro.dalvik.vm.native.bridge=0
- ro.kernel.android.checkjni=1
- ro.secure=0
- ro.zygote=zygote32
- ro.carrier=unknown
- ro.product.cpu.abi=armeabi-v7a
- ro.product.cpu.abi2=armeabi
- ro.product.cpu.abilist=armeabi-v7a,armeabi
- ro.product.cpu.abilist32=armeabi-v7a,armeabi
- ro.product.cpu.abilist64=
- ro.product.board=MSM8974
- ro.product.brand=htc
- ro.product.model=831C
- ro.product.device=htc_m8whl
- ro.product.locale.region=US
- ro.product.locale.language=en
- ro.product.manufacturer=htc
- ro.baseband=1.09.20.0209
- ro.bootmode=recovery
- ro.hardware=qcom
- ro.revision=0
- ro.serialno=HT444SF01255
- ro.9kramdump=0
- ro.telephony.ril_class=m8sprRIL
- ro.telephony.default_network=8
- ro.telephony.default_cdma_sub=1
- ro.alarm_boot=false
- ro.bootloader=3.19.0.0000
- ro.debuggable=1
- ro.modversion=OmniROM-5.1.1-20151228-m8-HOMEMADE
- ro.factorytest=0
- ro.setupwizard.enterprise_mode=1
- gsm.sim.operator.alpha=Sprint
- gsm.sim.operator.numeric=310120
- gsm.operator.alpha=310120
- gsm.operator.numeric=310120
- net.bt.name=Android
- net.change=net.bt.name
- init.svc.adbd=running
- init.svc.healthd=running
- init.svc.ueventd=running
- init.svc.recovery=running
- init.svc.chargeled=running
- init.svc.choice_fn=stopped
- init.svc.set_permissive=stopped
- rild.libargs=-d /dev/smd0
- twrp.crash_counter=0
- dalvik.vm.isa.arm.features=div
- dalvik.vm.dex2oat-Xms=64m
- dalvik.vm.dex2oat-Xmx=512m
- dalvik.vm.dex2oat-filter=interpret-only
- dalvik.vm.stack-trace-file=/data/anr/traces.txt
- dalvik.vm.image-dex2oat-Xms=64m
- dalvik.vm.image-dex2oat-Xmx=64m
- dalvik.vm.image-dex2oat-filter=verify-none
- persist.sys.usb.config=adb
- persist.sys.dalvik.vm.lib.2=libart.so
- persist.sys.root_access=1
- persist.radio.snapshot_timer=22
- persist.radio.snapshot_enabled=1
- service.adb.root=1
- keyguard.no_require_sim=true
- telephony.sms.pseudo_multipart=1
- telephony.lteOnCdmaDevice=1
- I:Copying file /cache/recovery/log to /cache/recovery/last_log
- tw_get_context got selinux context: u:object_r:media_rw_data_file:s0
- I:Got default contexts and file mode for storage files.
- I:Attempt to load settings from settings file...
- I:Loading settings from '/data/media/0/TWRP/.twrps'.
- I:Backup folder set to '/external_sd/TWRP/BACKUPS/HT444SF01255'
- I:Copying file /etc/recovery.fstab to /cache/recovery/recovery.fstab
- I:Version number saved to '/cache/recovery/.version'
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- I:TWFunc::Set_Brightness: Setting brightness control to 114
- I:TWFunc::Fixup_Time: Pre-fix date and time: 2015-12-28--12-01-46
- I:TWFunc::Fixup_Time: Setting time offset from file /sys/class/rtc/rtc0/since_epoch
- I:TWFunc::Fixup_Time: Date and time corrected: 2015-12-28--12-01-46
- I:Enabling MTP during startup
- I:Starting MTP
- Starting MTP
- I:Get_Max_FileSize::maxFileSize: 17592186044416
- I:sending message to add 65539 '/data/media/0' 'Internal Storage'
- I:Message sent, add storage ID: 65539
- I:Get_Max_FileSize::maxFileSize: 18014398509481984
- I:sending message to add 65537 '/external_sd' 'Micro SDcard'
- I:Message sent, add storage ID: 65537
- MTP Enabled
- I:Switching packages (TWRP)
- created new mtpserver object
- MtpServer::run fd: 20
- mtppipe add storage 65539 '/data/media/0'
- MtpStorage id: 65539 path: /data/media/0
- mtppipe add storage 65537 '/external_sd'
- MtpStorage id: 65537 path: /external_sd
- I:Set page: 'multirom_main'
- I:Set page: 'multirom_list'
- I:Set page: 'multirom_add'
- I:Set page: 'multirom_add_source'
- I:Set page: 'multirom_add_select'
- I:MROMInstaller: base folder: data (min: 150MB def: 1024MB)
- I:MROMInstaller: base folder: system (min: 450MB def: 2688MB)
- I:MROMInstaller: base folder: cache (min: 50MB def: 436MB)
- I:Set page: 'multirom_add_start_process'
- I:Set page: 'multirom_add_confirm_action'
- I:Set page: 'multirom_action_page'
- I:operation_start: 'Installing'
- Installing ROM M8_GPE_5.07.1700.8_stock_C...
- Creating folders and images for type 1
- I:Running cmd "chcon u:object_r:system_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/system";chcon u:object_r:system_data_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/data";chcon u:object_r:cache_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/cache";"
- Flashing ZIP file /external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip
- ROM: M8_GPE_5.07.1700.8_stock_C
- Preparing ZIP file...
- rm: can't remove '/tmp/mr_update.zip': No such file or directory
- I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
- About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
- About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
- I:ZIP size limit for /tmp: 779.50 MB
- Copying ZIP to /tmp...
- I:Running cmd "cp "/external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip" /tmp/mr_update.zip"
- I:Running cmd "cd /tmp && zip "/tmp/mr_update.zip" META-INF/com/google/android/updater-script"
- updating: META-INF/com/google/android/updater-script (deflated 69%)
- Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
- I:sending message to remove 65539
- I:Message sent, remove storage ID: 65539
- mtppipe remove storage 65539
- I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
- I:Processing '/data_t'
- I:Created '/data_t' folder.
- I:Processing '/system'
- I:Processing '/cache'
- I:Recreating /cache/recovery folder.
- Partition Logs:
- /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
- Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p42
- Display_Name: Boot
- Storage_Name: boot
- Backup_Path: /boot
- Backup_Name: boot
- Backup_Display_Name: Boot
- Storage_Path: /boot
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 16583MB Backup Size: 2841MB Raw size: 27246198784
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
- Symlink_Path: /realdata/media/0
- Symlink_Mount_Point: /sdcard
- Primary_Block_Device: /dev/block/mmcblk0p47
- Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
- Display_Name: Realdata
- Storage_Name: Internal Storage
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /realdata/media/0
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- MTP_Storage_ID: 65539
- /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
- Flags: IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p24
- Display_Name: misc
- Storage_Name: misc
- Backup_Path: /misc
- Backup_Name: misc
- Backup_Display_Name: misc
- Storage_Path: /misc
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
- Flags: IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p43
- Display_Name: Recovery
- Storage_Name: recovery
- Backup_Path: /recovery
- Backup_Name: recovery
- Backup_Display_Name: Recovery
- Storage_Path: /recovery
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p39
- Display_Name: devlog
- Storage_Name: devlog
- Backup_Path: /devlog
- Backup_Name: devlog
- Backup_Display_Name: devlog
- Storage_Path: /devlog
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p37
- Display_Name: carrier
- Storage_Name: carrier
- Backup_Path: /carrier
- Backup_Name: carrier
- Backup_Display_Name: carrier
- Storage_Path: /carrier
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p41
- Display_Name: reserve
- Storage_Name: reserve
- Backup_Path: /reserve
- Backup_Name: reserve
- Backup_Display_Name: reserve
- Storage_Path: /reserve
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
- Symlink_Path: /external_sd/.android_secure
- Symlink_Mount_Point: /and-sec
- Primary_Block_Device: /dev/block/mmcblk1p1
- Alternate_Block_Device: /dev/block/mmcblk1
- Display_Name: Micro SDcard
- Storage_Name: Micro SDcard
- Backup_Path: /and-sec
- Backup_Name: and-sec
- Backup_Display_Name: Android Secure
- Storage_Path: /external_sd
- Current_File_System: exfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65537
- /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
- Primary_Block_Device: /dev/block/mmcblk1p2
- Display_Name: SD-Ext
- Storage_Name: SD-Ext
- Backup_Path: /sd_ext
- Backup_Name: sd_ext
- Backup_Display_Name: SD-Ext
- Storage_Path: /sd_ext
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
- Primary_Block_Device: /dev/block/sda1
- Alternate_Block_Device: /dev/block/sda
- Display_Name: USB-OTG
- Storage_Name: USB-OTG
- Backup_Path: /usb_otg
- Backup_Name: usb_otg
- Backup_Display_Name: USB-OTG
- Storage_Path: /usb_otg
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65538
- /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
- Display_Name: Data
- Storage_Name: data_t
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /data_t
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
- Display_Name: System
- Storage_Name: System
- Backup_Path: /system
- Backup_Name: system
- Backup_Display_Name: System
- Storage_Path: /system
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
- Display_Name: Cache
- Storage_Name: Cache
- Backup_Path: /cache
- Backup_Name: cache
- Backup_Display_Name: Cache
- Storage_Path: /cache
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- I:Running cmd "dd if="/dev/block/mmcblk0p42" of="/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img""
- 32768+0 records in
- 32768+0 records out
- 16777216 bytes (16.0MB) copied, 0.740771 seconds, 21.6MB/s
- Current boot sector was used as base for fake boot.img!
- I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
- I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
- I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
- ZIP uses block updates
- Creating system.img...
- I:Creating image with cmd: make_ext4fs -l 2720M -a "/system" -S /file_contexts "/realdata/media/0/multirom/system.img"
- Creating filesystem with parameters:
- Size: 2852126720
- Block size: 4096
- Blocks per group: 32768
- Inodes per group: 7920
- Inode size: 256
- Journal blocks: 10880
- Label:
- Blocks: 696320
- Block groups: 22
- Reserved block group size: 175
- Created filesystem with 11/174240 inodes and 22879/696320 blocks
- I:Running cmd "losetup "/dev/block/loop0" "/realdata/media/0/multirom/system.img""
- I:Running cmd "mv "/dev/block/mmcblk0p45" "/dev/block/mmcblk0p45-orig" && ln -s "/dev/block/loop0" "/dev/block/mmcblk0p45""
- I:Running cmd "rm "/realdata/media/0/multirom/system.img""
- I:Running cmd "echo "/dev/block/mmcblk0p45" > /tmp/mrom_fakesyspart"
- Installing '/tmp/mr_update.zip'...
- Checking for MD5 file...
- Skipping MD5 check: no MD5 file found
- I:Zip contains SELinux file_contexts file in its root. Extracting to /file_contexts
- I:Legacy property environment initialized.
- M8 GPE 5.07.1700.8 stock - CDMA Edition Installer
- Built with SuperR's Kitchen
- minzip: Extracted 2 file(s)
- about to run program [/tmp/install/bin/backuptool.sh] with 2 args
- Extracting system...
- blockimg version is 1
- erasing 688128 blocks
- writing 247628 blocks of new data
- wrote 247628 blocks; expected 247628
- max alloc needed was 0
- about to run program [/sbin/sh] with 3 args
- chattr: stat /system/*: No such file or directory
- about to run program [/tmp/install/bin/backuptool.sh] with 2 args
- Extracting boot image...
- M8 GPE 5.07.1700.8 stock - CDMA Edition Installed
- script succeeded: result was [M8 GPE 5.07.1700.8 stock - CDMA Edition Installed]I:Legacy property environment disabled.
- rm: can't remove 'META-INF/com/google/android': No such file or directory
- ZIP successfully installed
- I:Running cmd "busybox umount -d /tmpsystem"
- I:Running cmd "rm "/dev/block/mmcblk0p45""
- I:Running cmd "mv "/dev/block/mmcblk0p45"-orig "/dev/block/mmcblk0p45""
- I:Running cmd "rm "/dev/block/mmcblk0p42""
- I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
- Restoring mounts...
- losetup: /dev/block/loop0: No such device or address
- losetup: /dev/block/loop1: No such device or address
- losetup: /dev/block/loop2: No such device or address
- losetup: /dev/block/loop3: No such device or address
- losetup: /dev/block/loop4: No such device or address
- losetup: /dev/block/loop5: No such device or address
- losetup: /dev/block/loop6: No such device or address
- losetup: /dev/block/loop7: No such device or address
- I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
- Updating partition details...
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Data backup size is 2841MB, free: 15600MB.
- I:sending message to remove 65539
- mtppipe remove storage 65539
- I:Message sent, remove storage ID: 65539
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- ...done
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- Extracting contents of boot.img...
- I:Running cmd "rm -r "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/"*"
- rm: can't remove '/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/*': No such file or directory
- rm: can't remove '/tmp/boot': No such file or directory
- Ramdisk uses GZIP compression
- 4444 blocks
- I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- cp: can't stat '/tmp/boot/main_init': No such file or directory
- I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- cp: can't stat '/tmp/boot/cache': No such file or directory
- I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
- cp: can't stat '/tmp/boot//cache': No such file or directory
- I:Running cmd "mkdir "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
- I:Running cmd "cp -a /tmp/boot//sbin/su "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
- cp: can't stat '/tmp/boot//sbin/su': No such file or directory
- I:Running cmd "mv "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/init" "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/main_init""
- I:Running cmd "cd "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
- rm: can't remove 'cmdline': No such file or directory
- rm: can't remove 'ramdisk.gz': No such file or directory
- rm: can't remove 'zImage': No such file or directory
- Injecting boot.img..
- I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
- I:Set page: 'multirom_action_complete'
- I:operation_end - status=0
- I:Set page: 'clear_vars'
- I:Set page: 'multirom_add'
- I:Set page: 'multirom_main'
- I:Set page: 'multirom_list'
- I:Set page: 'multirom_manage'
- I:Set page: 'multirom_manage_flash_select'
- I:Set page: 'multirom_manage_flash_confirm'
- I:Set page: 'multirom_action_page'
- I:operation_start: 'Flashing'
- Flashing ZIP file /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
- ROM: M8_GPE_5.07.1700.8_stock_C
- Preparing ZIP file...
- rm: can't remove '/tmp/mr_update.zip': No such file or directory
- I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
- About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
- About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
- No need to change ZIP.
- Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
- I:sending message to remove 65539
- I:Message sent, remove storage ID: 65539
- mtppipe remove storage 65539
- I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
- I:Processing '/data_t'
- I:Processing '/system'
- I:Processing '/cache'
- Partition Logs:
- /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
- Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p42
- Display_Name: Boot
- Storage_Name: boot
- Backup_Path: /boot
- Backup_Name: boot
- Backup_Display_Name: Boot
- Storage_Path: /boot
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2841MB Free: 15600MB Backup Size: 2841MB Raw size: 27246198784
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
- Symlink_Path: /realdata/media/0
- Symlink_Mount_Point: /sdcard
- Primary_Block_Device: /dev/block/mmcblk0p47
- Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
- Display_Name: Realdata
- Storage_Name: Internal Storage
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /realdata/media/0
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- MTP_Storage_ID: 65539
- /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
- Flags: IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p24
- Display_Name: misc
- Storage_Name: misc
- Backup_Path: /misc
- Backup_Name: misc
- Backup_Display_Name: misc
- Storage_Path: /misc
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
- Flags: IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p43
- Display_Name: Recovery
- Storage_Name: recovery
- Backup_Path: /recovery
- Backup_Name: recovery
- Backup_Display_Name: Recovery
- Storage_Path: /recovery
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p39
- Display_Name: devlog
- Storage_Name: devlog
- Backup_Path: /devlog
- Backup_Name: devlog
- Backup_Display_Name: devlog
- Storage_Path: /devlog
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p37
- Display_Name: carrier
- Storage_Name: carrier
- Backup_Path: /carrier
- Backup_Name: carrier
- Backup_Display_Name: carrier
- Storage_Path: /carrier
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p41
- Display_Name: reserve
- Storage_Name: reserve
- Backup_Path: /reserve
- Backup_Name: reserve
- Backup_Display_Name: reserve
- Storage_Path: /reserve
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 71867MB Free: 17300MB Backup Size: 8MB Raw size: 93503619072
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
- Symlink_Path: /external_sd/.android_secure
- Symlink_Mount_Point: /and-sec
- Primary_Block_Device: /dev/block/mmcblk1p1
- Alternate_Block_Device: /dev/block/mmcblk1
- Display_Name: Micro SDcard
- Storage_Name: Micro SDcard
- Backup_Path: /and-sec
- Backup_Name: and-sec
- Backup_Display_Name: Android Secure
- Storage_Path: /external_sd
- Current_File_System: exfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65537
- /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
- Primary_Block_Device: /dev/block/mmcblk1p2
- Display_Name: SD-Ext
- Storage_Name: SD-Ext
- Backup_Path: /sd_ext
- Backup_Name: sd_ext
- Backup_Display_Name: SD-Ext
- Storage_Path: /sd_ext
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
- Primary_Block_Device: /dev/block/sda1
- Alternate_Block_Device: /dev/block/sda
- Display_Name: USB-OTG
- Storage_Name: USB-OTG
- Backup_Path: /usb_otg
- Backup_Name: usb_otg
- Backup_Display_Name: USB-OTG
- Storage_Path: /usb_otg
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65538
- /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
- Display_Name: Data
- Storage_Name: data_t
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /data_t
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
- Display_Name: System
- Storage_Name: System
- Backup_Path: /system
- Backup_Name: system
- Backup_Display_Name: System
- Storage_Path: /system
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
- Display_Name: Cache
- Storage_Name: Cache
- Backup_Path: /cache
- Backup_Name: cache
- Backup_Display_Name: Cache
- Storage_Path: /cache
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
- I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
- I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
- Installing '/external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip'...
- Checking for MD5 file...
- Skipping MD5 check: no MD5 file found
- I:Zip does not contain SELinux file_contexts file in its root.
- I:Legacy property environment initialized.
- + fd=24
- + zip=/external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
- + rm -Rf /tmp/superuser
- + mkdir -p /tmp/superuser
- + unzip -o /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip -d /tmp/superuser/
- Archive: /external_sd/06_Tools/Root/phh_seSuperuser/superuser.zip
- creating: scripts/
- inflating: scripts/bootimg.sh
- inflating: scripts/.gitignore
- creating: scripts/su/
- inflating: scripts/su/changes.sh
- inflating: scripts/su/su-communication.sh
- inflating: scripts/su/rights.sh
- inflating: scripts/README.md
- inflating: scripts/gitversion
- creating: scripts/keystore_tools/
- inflating: scripts/keystore_tools/README
- inflating: scripts/keystore_tools/make_key
- inflating: scripts/keystore_tools/BootKeystoreSigner.jar
- inflating: scripts/keystore_tools/BootSignature.jar
- creating: scripts/havealoha/
- inflating: scripts/havealoha/changes.sh
- creating: scripts/bin/
- inflating: scripts/bin/su-x86
- inflating: scripts/bin/sepolicy-inject
- inflating: scripts/bin/bootimg-repack
- inflating: scripts/bin/su-arm
- inflating: scripts/bin/bootimg-extract
- creating: META-INF/
- creating: META-INF/com/
- creating: META-INF/com/google/
- creating: META-INF/com/google/android/
- inflating: META-INF/com/google/android/updater-script
- inflating: META-INF/com/google/android/update-binary
- + cd /tmp/superuser/scripts/su/
- + fstab=/etc/recovery.fstab
- + [ ! -f /etc/recovery.fstab ]
- + fstab=/etc/recovery.fstab.bak
- + grep -E \b/boot\b /etc/recovery.fstab.bak
- + grep -oE /dev/[a-zA-Z0-9_./-]*
- + bootimg=/dev/block/platform/msm_sdcc.1/by-name/boot
- + [ -z /dev/block/platform/msm_sdcc.1/by-name/boot ]
- + ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
- + echo ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
- + sh -x ../bootimg.sh /dev/block/platform/msm_sdcc.1/by-name/boot eng
- Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot+ export TMPDIR=/tmp/
- + which mktemp
- /sbin/mktemp
- + [ 2 == 0 ]
- + set -e
- + [ -f eng ]
- + scr=/tmp/superuser/scripts/su/changes.sh
- + trap cleanup EXIT
- + readlink -f ../bootimg.sh
- + dirname /tmp/superuser/scripts/bootimg.sh
- + scriptdir=/tmp/superuser/scripts
- + chmod 0755 /tmp/superuser/scripts/bin/sepolicy-inject
- + chmod 0755 /tmp/superuser/scripts/bin/bootimg-repack
- + chmod 0755 /tmp/superuser/scripts/bin/bootimg-extract
- + [[ toto2 =~ toto ]]
- sh: =~: unknown operand
- + r_file_perms=getattr open read ioctl lock
- + x_file_perms=getattr execute execute_no_trans
- + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + w_file_perms=open append write
- + rw_file_perms=getattr open read ioctl lock open append write
- + rwx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + rw_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + create_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + rw_stream_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + create_stream_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + r_dir_perms=open getattr read search ioctl
- + w_dir_perms=open search write add_name remove_name
- + ra_dir_perms=open getattr read search ioctl add name write
- + rw_dir_perms=open getattr read search ioctl open search write add_name remove_name
- + create_dir_perms=create reparent rename rmdir setattr open getattr read search ioctl open search write add_name remove_name
- + startBootImgEdit /dev/block/platform/msm_sdcc.1/by-name/boot
- + readlink -f /dev/block/platform/msm_sdcc.1/by-name/boot
- + f=/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
- + homedir=/tmp/superuser/scripts/su
- + mktemp -d
- + bootimg_extract=/tmp/tmp.DXhiiE
- + cd /tmp/tmp.DXhiiE
- + /tmp/superuser/scripts/bin/bootimg-extract /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
- + mktemp -d
- + d2=/tmp/tmp.08nCro
- + cd /tmp/tmp.08nCro
- + [ -f /tmp/tmp.DXhiiE/ramdisk.gz ]
- + gunzip -c
- + cpio -i
- 11039 blocks
- + gunzip -c
- + INITRAMFS_FILES=
- + file init
- ../bootimg.sh: line 1: file: not found
- + grep -q Intel
- + DST_ARCH=arm
- + /tmp/superuser/scripts/bin/sepolicy-inject -e -s gatekeeper_service -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- + ANDROID=23
- + shift
- + [ -n ]
- + . /tmp/superuser/scripts/su/changes.sh
- + dirname /tmp/superuser/scripts/su/changes.sh
- + . /tmp/superuser/scripts/su/su-communication.sh
- + dirname /tmp/superuser/scripts/su/changes.sh
- + . /tmp/superuser/scripts/su/rights.sh
- + r_file_perms=getattr open read ioctl lock
- + x_file_perms=getattr execute execute_no_trans
- + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + w_file_perms=open append write
- + cp /tmp/superuser/scripts/bin/su-arm sbin/su
- + addFile sbin/su
- + [ -n ]
- + echo
- + grep -qE \bsbin/su\b
- + INITRAMFS_FILES= sbin/su
- + chmod 0755 sbin/su
- + [ -f sepolicy ]
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su -P sepolicy
- source type su does not exist: 0,1007
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su_device -P sepolicy
- source type su_device does not exist: 0,1008
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su_daemon -P sepolicy
- source type su_daemon does not exist: 0,1009
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c dir -t su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9678 rules, 0 cond rules
- + allow su_device tmpfs filesystem associate
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su
- + grep -qE \bsepolicy\b
- + INITRAMFS_FILES= sbin/su sepolicy
- + [ -z su_device -o -z tmpfs -o -z filesystem -o -z associate ]
- + echo associate
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_device -t tmpfs -c filesystem -p associate -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9679 rules, 0 cond rules
- + allowSuClient shell
- + allow shell rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9680 rules, 0 cond rules
- + allow shell su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9681 rules, 0 cond rules
- + allow shell su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9682 rules, 0 cond rules
- + allow shell su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9683 rules, 0 cond rules
- + allow su_daemon shell fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9684 rules, 0 cond rules
- + allow su_daemon shell fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9685 rules, 0 cond rules
- + allow su_daemon shell dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9686 rules, 0 cond rules
- + allow su_daemon shell file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9687 rules, 0 cond rules
- + allow su_daemon shell lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9688 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9689 rules, 0 cond rules
- + allow su shell fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9690 rules, 0 cond rules
- + allow su shell fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9691 rules, 0 cond rules
- + allowSuClient untrusted_app
- + allow untrusted_app rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9692 rules, 0 cond rules
- + allow untrusted_app su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9693 rules, 0 cond rules
- + allow untrusted_app su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9694 rules, 0 cond rules
- + allow untrusted_app su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9695 rules, 0 cond rules
- + allow su_daemon untrusted_app fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9696 rules, 0 cond rules
- + allow su_daemon untrusted_app fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9697 rules, 0 cond rules
- + allow su_daemon untrusted_app dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9698 rules, 0 cond rules
- + allow su_daemon untrusted_app file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9699 rules, 0 cond rules
- + allow su_daemon untrusted_app lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9700 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
- + allow su untrusted_app fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
- + allow su untrusted_app fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9702 rules, 0 cond rules
- + allowSuClient su
- + allow su rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9703 rules, 0 cond rules
- + allow su su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9704 rules, 0 cond rules
- + allow su su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9705 rules, 0 cond rules
- + allow su su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9706 rules, 0 cond rules
- + allow su_daemon su fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9707 rules, 0 cond rules
- + allow su_daemon su fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9708 rules, 0 cond rules
- + allow su_daemon su dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9709 rules, 0 cond rules
- + allow su_daemon su file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9710 rules, 0 cond rules
- + allow su_daemon su lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9711 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
- + allow su su fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
- + allow su su fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9713 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -e -s ssd_tool -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
- + allow init su_daemon process transition
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z init -o -z su_daemon -o -z process -o -z transition ]
- + echo transition
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p transition -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
- + noaudit init su_daemon process rlimitinh siginh noatsecure
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p rlimitinh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p siginh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p noatsecure -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
- + suDaemonRights
- + allow su_daemon rootfs file entrypoint
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z rootfs -o -z file -o -z entrypoint ]
- + echo entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t rootfs -c file -p entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
- + allow su_daemon su_daemon dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9716 rules, 0 cond rules
- + allow su_daemon su_daemon file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9717 rules, 0 cond rules
- + allow su_daemon su_daemon lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9718 rules, 0 cond rules
- + allow su_daemon su_daemon unix_dgram_socket create connect write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z unix_dgram_socket -o -z create connect write ]
- + echo create connect write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_dgram_socket -p create,connect,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9719 rules, 0 cond rules
- + allow su_daemon su_daemon unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9720 rules, 0 cond rules
- + allow su_daemon devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9721 rules, 0 cond rules
- + allow su_daemon untrusted_app_devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app_devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app_devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9722 rules, 0 cond rules
- + allow su_daemon su_daemon capability setuid setgid
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z setuid setgid ]
- + echo setuid setgid
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p setuid,setgid -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
- + allow su_daemon app_data_file dir getattr search write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z app_data_file -o -z dir -o -z getattr search write add_name ]
- + echo getattr search write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c dir -p getattr,search,write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
- + allow su_daemon app_data_file file getattr read open lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z app_data_file -o -z file -o -z getattr read open lock ]
- + echo getattr read open lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c file -p getattr,read,open,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9724 rules, 0 cond rules
- + allow su_daemon su_daemon capability dac_override
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z dac_override ]
- + echo dac_override
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p dac_override -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
- + allow su_daemon su_daemon process fork sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z process -o -z fork sigchld ]
- + echo fork sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p fork,sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
- + allow su_daemon toolbox_exec file execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z toolbox_exec -o -z file -o -z execute read open execute_no_trans ]
- + echo execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t toolbox_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9726 rules, 0 cond rules
- + allow su_daemon device dir write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z device -o -z dir -o -z write add_name ]
- + echo write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t device -c dir -p write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9727 rules, 0 cond rules
- + allow su_daemon su_device dir create setattr remove_name add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z create setattr remove_name add_name ]
- + echo create setattr remove_name add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p create,setattr,remove_name,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9728 rules, 0 cond rules
- + allow su_daemon su_device sock_file create unlink
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z sock_file -o -z create unlink ]
- + echo create unlink
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c sock_file -p create,unlink -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9729 rules, 0 cond rules
- + allow su_daemon zygote_exec file execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z zygote_exec -o -z file -o -z execute read open execute_no_trans ]
- + echo execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t zygote_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9730 rules, 0 cond rules
- + allow su_daemon su_device dir search write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z search write add_name ]
- + echo search write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p search,write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
- + allow su_daemon su_daemon process setexec
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z process -o -z setexec ]
- + echo setexec
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setexec -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
- + allow su_daemon shell_exec file execute read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell_exec -o -z file -o -z execute read open ]
- + echo execute read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell_exec -c file -p execute,read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
- + allow su_daemon su_daemon capability chown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z chown ]
- + echo chown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p chown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
- + suDaemonTo su
- + allow su_daemon su process transition
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z process -o -z transition ]
- + echo transition
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p transition -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
- + noaudit su_daemon su process siginh rlimitinh noatsecure
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p siginh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p rlimitinh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p noatsecure -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
- + allowLog su
- + allow su logdw_socket sock_file write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logdw_socket -o -z sock_file -o -z write ]
- + echo write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdw_socket -c sock_file -p write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
- + allow su logd unix_dgram_socket sendto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logd -o -z unix_dgram_socket -o -z sendto ]
- + echo sendto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_dgram_socket -p sendto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9734 rules, 0 cond rules
- + allow logd su dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z logd -o -z su -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9735 rules, 0 cond rules
- + allow logd su file read open getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z logd -o -z su -o -z file -o -z read open getattr ]
- + echo read open getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c file -p read,open,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9736 rules, 0 cond rules
- + allow su su dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9737 rules, 0 cond rules
- + allow su su unix_dgram_socket create connect write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_dgram_socket -o -z create connect write ]
- + echo create connect write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_dgram_socket -p create,connect,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9738 rules, 0 cond rules
- + allow su su lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9739 rules, 0 cond rules
- + allow su su file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9740 rules, 0 cond rules
- + allow su toolbox_exec file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z toolbox_exec -o -z file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9741 rules, 0 cond rules
- + allow su devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9742 rules, 0 cond rules
- + suRights su
- + allow su su_daemon fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9743 rules, 0 cond rules
- + allow su su_daemon process sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z process -o -z sigchld ]
- + echo sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c process -p sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9744 rules, 0 cond rules
- + allow su su_daemon unix_stream_socket read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
- + allow servicemanager su dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
- + allow servicemanager su file open read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z file -o -z open read ]
- + echo open read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c file -p open,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9746 rules, 0 cond rules
- + allow servicemanager su process getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z process -o -z getattr ]
- + echo getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c process -p getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9747 rules, 0 cond rules
- + allow servicemanager su binder transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z binder -o -z transfer ]
- + echo transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c binder -p transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9748 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allow system_server su binder call
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z system_server -o -z su -o -z binder -o -z call ]
- + echo call
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9749 rules, 0 cond rules
- + allow su shell_exec zygote_exec dalvikcache_data_file rootfs system_file file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_exec zygote_exec dalvikcache_data_file rootfs system_file -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9750 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t zygote_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9751 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9752 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
- + allow su dalvikcache_data_file rootfs system_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9754 rules, 0 cond rules
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9755 rules, 0 cond rules
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9756 rules, 0 cond rules
- + allow su dalvikcache_data_file rootfs system_file dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9757 rules, 0 cond rules
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9758 rules, 0 cond rules
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9759 rules, 0 cond rules
- + [ 23 -ge 23 ]
- + allow su toolbox_exec file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z toolbox_exec -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
- + allow su devpts chr_file getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z devpts -o -z chr_file -o -z getattr ioctl ]
- + echo getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allow su system_server servicemanager binder call transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z system_server servicemanager -o -z binder -o -z call transfer ]
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_server -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9761 rules, 0 cond rules
- + [ 23 -ge 23 ]
- + allow su activity_service service_manager find
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z activity_service -o -z service_manager -o -z find ]
- + echo find
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t activity_service -c service_manager -p find -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9762 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allow su untrusted_app_devpts chr_file read write open getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app_devpts -o -z chr_file -o -z read write open getattr ioctl ]
- + echo read write open getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app_devpts -c chr_file -p read,write,open,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9763 rules, 0 cond rules
- + allow su su file getattr open read ioctl lock getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans ]
- + echo getattr open read ioctl lock getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
- + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
- + allow su su process sigchld setpgid setsched fork signal execmem getsched
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z process -o -z sigchld setpgid setsched fork signal execmem getsched ]
- + echo sigchld setpgid setsched fork signal execmem getsched
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p sigchld,setpgid,setsched,fork,signal,execmem,getsched -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9765 rules, 0 cond rules
- + allow su su fifo_file getattr open read ioctl lock open append write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fifo_file -o -z getattr open read ioctl lock open append write ]
- + echo getattr open read ioctl lock open append write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
- + suL0 su
- + suBackL0 su
- + [ 23 -ge 20 ]
- + allow system_server su binder call transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z system_server -o -z su -o -z binder -o -z call transfer ]
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
- + allow untrusted_app su unix_stream_socket ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su -o -z unix_stream_socket -o -z ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto ]
- + echo ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su -c unix_stream_socket -p ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,connectto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
- + allow surfaceflinger su process sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z su -o -z process -o -z sigchld ]
- + echo sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t su -c process -p sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9767 rules, 0 cond rules
- + suMiscL0 su
- + allow su su capability sys_nice
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_nice ]
- + echo sys_nice
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_nice -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9768 rules, 0 cond rules
- + suReadLogs su
- + allow su kernel system syslog_read syslog_mod
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z kernel -o -z system -o -z syslog_read syslog_mod ]
- + echo syslog_read syslog_mod
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t kernel -c system -p syslog_read,syslog_mod -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9769 rules, 0 cond rules
- + allow su su capability2 syslog
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability2 -o -z syslog ]
- + echo syslog
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability2 -p syslog -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9770 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allow su logdr_socket sock_file write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logdr_socket -o -z sock_file -o -z write ]
- + echo write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdr_socket -c sock_file -p write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9771 rules, 0 cond rules
- + allow su logd unix_stream_socket connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logd -o -z unix_stream_socket -o -z connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_stream_socket -p connectto,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9772 rules, 0 cond rules
- + suNetworkL0 su
- + /tmp/superuser/scripts/bin/sepolicy-inject -a netdomain -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a bluetoothdomain -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
- + suL1 su
- + suMiscL1 su
- + allowFSRWX su shell_data_file
- + allowFSRW su shell_data_file
- + allow su shell_data_file dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
- + allow su shell_data_file file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9774 rules, 0 cond rules
- + allow su shell_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9775 rules, 0 cond rules
- + allow su shell_data_file file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9776 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + [ 23 -ge 23 ]
- + allowFSR su storage_file mnt_user_file
- + allow su storage_file mnt_user_file dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z storage_file mnt_user_file -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9776 rules, 0 cond rules
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9777 rules, 0 cond rules
- + allow su storage_file mnt_user_file file getattr open read ioctl lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z storage_file mnt_user_file -o -z file -o -z getattr open read ioctl lock ]
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9778 rules, 0 cond rules
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9779 rules, 0 cond rules
- + allow su storage_file mnt_user_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z storage_file mnt_user_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9780 rules, 0 cond rules
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9781 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allowFSR su fuse
- + allow su fuse dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9782 rules, 0 cond rules
- + allow su fuse file getattr open read ioctl lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z file -o -z getattr open read ioctl lock ]
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9783 rules, 0 cond rules
- + allow su fuse lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9784 rules, 0 cond rules
- + allow su su process ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z process -o -z ptrace ]
- + echo ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9785 rules, 0 cond rules
- + suServicesL1 su
- + [ 23 -ge 20 ]
- + allow su servicemanager service_manager list
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z servicemanager -o -z service_manager -o -z list ]
- + echo list
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c service_manager -p list -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9785 rules, 0 cond rules
- + [ 23 -ge 23 ]
- + allow su =service_manager_type-gatekeeper_service service_manager find
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z =service_manager_type-gatekeeper_service -o -z service_manager -o -z find ]
- + echo find
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t =service_manager_type-gatekeeper_service -c service_manager -p find -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9786 rules, 0 cond rules
- + suNetworkL1 su
- + allow su su netlink_route_socket create setopt bind getattr write nlmsg_read read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z netlink_route_socket -o -z create setopt bind getattr write nlmsg_read read ]
- + echo create setopt bind getattr write nlmsg_read read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p create,setopt,bind,getattr,write,nlmsg_read,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9909 rules, 0 cond rules
- + [ 23 -ge 20 ]
- + allowFSR su net_data_file
- + allow su net_data_file dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9910 rules, 0 cond rules
- + allow su net_data_file file getattr open read ioctl lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z file -o -z getattr open read ioctl lock ]
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9911 rules, 0 cond rules
- + allow su net_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9912 rules, 0 cond rules
- + true
- + suL3 su
- + suFirewall su
- + suToApps su
- + allow su untrusted_app fifo_file ioctl getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fifo_file -o -z ioctl getattr ]
- + echo ioctl getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p ioctl,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9913 rules, 0 cond rules
- + allow su app_data_file dir search getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z app_data_file -o -z dir -o -z search getattr ]
- + echo search getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c dir -p search,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9913 rules, 0 cond rules
- + allow su app_data_file file getattr execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z app_data_file -o -z file -o -z getattr execute read open execute_no_trans ]
- + echo getattr execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c file -p getattr,execute,read,open,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9914 rules, 0 cond rules
- + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9915 rules, 0 cond rules
- + allow su su rawip_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z rawip_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c rawip_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9915 rules, 0 cond rules
- + allow su su udp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z udp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c udp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9916 rules, 0 cond rules
- + allow su su tcp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z tcp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c tcp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9917 rules, 0 cond rules
- + allow su su capability net_raw net_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z net_raw net_admin ]
- + echo net_raw net_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p net_raw,net_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
- + allow su su netlink_route_socket nlmsg_write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z netlink_route_socket -o -z nlmsg_write ]
- + echo nlmsg_write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p nlmsg_write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
- + suBind
- + allow su_daemon su_exec file mounton read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_exec -o -z file -o -z mounton read ]
- + echo mounton read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_exec -c file -p mounton,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
- + allowFSRWX su_daemon su_device
- + allowFSRW su_daemon su_device
- + allow su_daemon su_device dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
- + allow su_daemon su_device file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
- + allow su_daemon su_device lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9920 rules, 0 cond rules
- + allow su_daemon su_device file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
- + allow su_daemon su_device file relabelfrom
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z relabelfrom ]
- + echo relabelfrom
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p relabelfrom -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
- + allow su_daemon system_file file relabelto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z system_file -o -z file -o -z relabelto ]
- + echo relabelto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_file -c file -p relabelto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedobject -s su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su_daemon -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
- + [ eng == power -o eng == eng ]
- + suL6 su
- + suBackL6 su
- + allowFSRWX surfaceflinger app_data_file
- + allowFSRW surfaceflinger app_data_file
- + allow surfaceflinger app_data_file dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
- + allow surfaceflinger app_data_file file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
- + allow surfaceflinger app_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
- + allow surfaceflinger app_data_file file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s surfaceflinger -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
- + suL8 su
- + suMiscL8 su
- + allow su system_file file mounton
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z system_file -o -z file -o -z mounton ]
- + echo mounton
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p mounton -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
- + allow su su capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
- + suL9 su
- + suMiscL9 su
- + allow su labeledfs filesystem remount unmount
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z labeledfs -o -z filesystem -o -z remount unmount ]
- + echo remount unmount
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t labeledfs -c filesystem -p remount,unmount -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
- + allow su rootfs filesystem remount
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z rootfs -o -z filesystem -o -z remount ]
- + echo remount
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c filesystem -p remount -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
- + allowFSRW su block_device
- + allow su block_device dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9926 rules, 0 cond rules
- + allow su block_device file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9927 rules, 0 cond rules
- + allow su block_device lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9928 rules, 0 cond rules
- + allow su block_device blk_file getattr open read ioctl lock open append write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z blk_file -o -z getattr open read ioctl lock open append write ]
- + echo getattr open read ioctl lock open append write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c blk_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9929 rules, 0 cond rules
- + allow su su capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
- + allowFSRW su_daemon su_daemon
- + allow su_daemon su_daemon dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
- + allow su_daemon su_daemon file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
- + allow su_daemon su_daemon lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
- + allowFSRW su_daemon system_data_file
- + allow su_daemon system_data_file dir open getattr read search ioctl open search write add_name remove_name create
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z system_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
- + echo open getattr read search ioctl open search write add_name remove_name create
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
- + allow su_daemon system_data_file file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z system_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9931 rules, 0 cond rules
- + allow su_daemon system_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z system_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9932 rules, 0 cond rules
- + allow su_daemon labeledfs filesystem associate
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z labeledfs -o -z filesystem -o -z associate ]
- + echo associate
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t labeledfs -c filesystem -p associate -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9933 rules, 0 cond rules
- + allow su_daemon su_daemon process setfscreate
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z process -o -z setfscreate ]
- + echo setfscreate
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setfscreate -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9934 rules, 0 cond rules
- + [ eng == eng ]
- + /tmp/superuser/scripts/bin/sepolicy-inject -Z su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 87 classes, 9934 rules, 0 cond rules
- + sed -i /flash_recovery/a \ disabled init.rc
- + sed -i /on init/a \ chmod 0755 /sbin init.rc
- + echo -e service su /sbin/su --daemon\n\tclass main\n\tseclabel u:r:su_daemon:s0\n
- + addFile init.rc
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \binit.rc\b
- + INITRAMFS_FILES= sbin/su sepolicy init.rc
- + VERSIONED=1
- + [ -n 1 ]
- + [ -f /tmp/superuser/scripts/gitversion ]
- + cat /tmp/superuser/scripts/gitversion
- + rev=828eeb2
- + echo 828eeb2
- + addFile super-bootimg
- + [ -n ]
- + echo sbin/su sepolicy init.rc
- + grep -qE \bsuper-bootimg\b
- + INITRAMFS_FILES= sbin/su sepolicy init.rc super-bootimg
- + doneBootImgEdit
- + echo sbin/su sepolicy init.rc super-bootimg
- + tr \n
- + cpio -o -H newc
- + [ -f /tmp/tmp.DXhiiE/ramdisk.gz ]
- + cat ramdisk1 ramdisk2
- + gzip -9 -c
- + cd /tmp/tmp.DXhiiE
- + rm -Rf /tmp/tmp.08nCro
- + /tmp/superuser/scripts/bin/bootimg-repack /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
- + cp new-boot.img /tmp/superuser/scripts/su
- + cd /tmp/superuser/scripts/su
- + rm -Rf /tmp/tmp.DXhiiE
- + [ -f /tmp/superuser/scripts/keystore.x509.pem -a -f /tmp/superuser/scripts/keystore.pk8 ]
- + cleanup
- + rm -Rf /tmp/tmp.DXhiiE /tmp/tmp.08nCro
- + ui_print Generated /new-boot.img
- + echo ui_print Generated /new-boot.img
- + dd if=new-boot.img of=/dev/block/platform/msm_sdcc.1/by-name/boot bs=8192
- Generated /new-boot.img1369+1 records in
- 1369+1 records out
- 11220992 bytes (10.7MB) copied, 0.106494 seconds, 100.5MB/s
- + ui_print Flashed root-ed boot.img
- + echo ui_print Flashed root-ed boot.img
- Flashed root-ed boot.imgI:Legacy property environment disabled.
- rm: can't remove 'META-INF/com/google/android': No such file or directory
- ZIP successfully installed
- I:Running cmd "rm "/dev/block/mmcblk0p42""
- I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
- Restoring mounts...
- losetup: /dev/block/loop0: No such device or address
- losetup: /dev/block/loop1: No such device or address
- losetup: /dev/block/loop2: No such device or address
- losetup: /dev/block/loop3: No such device or address
- losetup: /dev/block/loop4: No such device or address
- losetup: /dev/block/loop5: No such device or address
- losetup: /dev/block/loop6: No such device or address
- losetup: /dev/block/loop7: No such device or address
- I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
- Updating partition details...
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Data backup size is 2841MB, free: 15603MB.
- I:sending message to remove 65539
- mtppipe remove storage 65539
- I:Message sent, remove storage ID: 65539
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- ...done
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- Extracting contents of boot.img...
- I:Running cmd "rm -r "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/"*"
- rm: can't remove '/tmp/boot': No such file or directory
- Ramdisk uses GZIP compression
- 11039 blocks
- I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- cp: can't stat '/tmp/boot/cache': No such file or directory
- I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
- cp: can't stat '/tmp/boot//cache': No such file or directory
- I:Running cmd "mkdir "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
- I:Running cmd "cp -a /tmp/boot//sbin/su "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/sbin/""
- cp: can't stat '/tmp/boot//sbin/su': No such file or directory
- I:Running cmd "cd "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
- rm: can't remove 'cmdline': No such file or directory
- rm: can't remove 'ramdisk.gz': No such file or directory
- rm: can't remove 'zImage': No such file or directory
- Injecting boot.img..
- I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
- I:Set page: 'multirom_action_complete'
- I:operation_end - status=0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement