kasual

LG G3 cm14.1 selinux denials

Dec 17th, 2016
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.09 KB | None | 0 0
  1. $ adb shell su -c dmesg | grep denied | audit2allow -vp out/target/product/ls990/root/sepolicy
  2.  
  3. #============= isolated_app ==============
  4. # src="isolated_app" tgt="app_data_file" class="dir", perms="getattr"
  5. # comm="dboxed_process0" exe="" path=""
  6. allow isolated_app app_data_file:dir getattr;
  7. # src="isolated_app" tgt="shell_data_file" class="dir", perms="search"
  8. # comm="dboxed_process0" exe="" path=""
  9. allow isolated_app shell_data_file:dir search;
  10.  
  11. #============= logd ==============
  12. # src="logd" tgt="logd" class="capability", perms="{ dac_override dac_read_search }"
  13. # comm="logd" exe="" path=""
  14. allow logd self:capability { dac_override dac_read_search };
  15.  
  16. #============= zygote ==============
  17. # src="zygote" tgt="zygote" class="capability", perms="sys_nice"
  18. # comm="main" exe="" path=""
  19. allow zygote self:capability sys_nice;
  20.  
  21.  
  22.  
  23. $ adb shell su -c dmesg | grep denied
  24. [ 5.483119] type=1400 audit(218400.860:4): avc: denied { write } for pid=1 comm="init" name="tracing_on" dev="debugfs" ino=3224 scontext=u:r:init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
  25. [ 5.483324] init: write_file: Unable to open '/sys/kernel/debug/tracing/tracing_on': Permission denied
  26. [ 59.046971] type=1400 audit(1484983807.720:5): avc: denied { read } for pid=2742 comm=576861747341707020576F726B6572 name="traces.txt" dev="mmcblk0p43" ino=1038338 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0
  27. [ 59.048136] type=1400 audit(1484983807.720:6): avc: denied { read } for pid=2742 comm=576861747341707020576F726B6572 name="traces.txt" dev="mmcblk0p43" ino=1038338 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0
  28. [ 65.785171] type=1400 audit(1484983814.457:7): avc: denied { unlink } for pid=3275 comm="Thread-17" name="log" dev="mmcblk0p42" ino=15522 scontext=u:r:system_server:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=0
  29. [ 65.831496] type=1400 audit(1484983814.457:8): avc: denied { unlink } for pid=3275 comm="Thread-17" name=".version" dev="mmcblk0p42" ino=15523 scontext=u:r:system_server:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=0
  30. [ 65.842044] type=1400 audit(1484983814.457:9): avc: denied { unlink } for pid=3275 comm="Thread-17" name="recovery.fstab" dev="mmcblk0p42" ino=15524 scontext=u:r:system_server:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=0
  31. [ 65.842305] type=1400 audit(1484983814.457:10): avc: denied { unlink } for pid=3275 comm="Thread-17" name="storage.fstab" dev="mmcblk0p42" ino=15525 scontext=u:r:system_server:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=0
  32. [ 65.842504] type=1400 audit(1484983814.457:11): avc: denied { unlink } for pid=3275 comm="Thread-17" name="intent" dev="mmcblk0p42" ino=15527 scontext=u:r:system_server:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=0
  33. [ 83.890853] type=1400 audit(1484983832.560:12): avc: denied { read } for pid=4273 comm="Binder:4260_2" name="/" dev="tmpfs" ino=8195 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=0
  34. [ 113.920964] type=1400 audit(1484983863.805:16): avc: denied { read } for pid=6734 comm="Binder:6721_1" name="/" dev="tmpfs" ino=8195 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=0
  35. [ 121.217628] type=1400 audit(1484983871.102:17): avc: denied { read } for pid=6735 comm="Binder:6721_2" name="/" dev="tmpfs" ino=8195 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=0
  36. [ 217.743053] type=1400 audit(1484983967.625:18): avc: denied { read } for pid=6735 comm="Binder:6721_2" name="/" dev="tmpfs" ino=8195 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=0
  37.  
  38.  
  39. [ 467.206999] type=1400 audit(1485660430.919:11): avc: denied { getattr } for pid=3518 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="mmcblk0p43" ino=900563 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
  40.  
  41.  
  42.  
  43. cache -> /dev/block/mmcblk0p42
  44. userdata -> /dev/block/mmcblk0p43
Add Comment
Please, Sign In to add comment