Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting TWRP 2.8.7 on Wed Nov 25 23:10:32 2015
- (pid 251)
- Setting SELinux to permissive
- TW_INCLUDE_DUMLOCK := true
- I:Lun file '/sys/devices/msm_dwc3/f9200000.dwc3/gadget/lun0/file'
- TW_INCLUDE_CRYPTO := true
- I:TW_BRIGHTNESS_PATH := /sys/class/leds/lcd-backlight/brightness
- I:Found brightness file at '/sys/class/leds/lcd-backlight/brightness'
- I:TWFunc::Set_Brightness: Setting brightness control to 255
- Starting the UI...Pixel format: 1080x1920 @ 32bpp
- Pixel format: RGBX_8888
- Not using qualcomm overlay, 'mdssfb_90000'
- framebuffer: fd 4 (1080 x 1920)
- minui: /sys/board_properties/virtualkeys.synaptics-rmi-touchscreen is 5 % 6
- => Linking mtab
- => Processing recovery.fstab
- I:Processing '/boot'
- I:Processing '/cache'
- I:Processing '/data'
- I:Processing '/misc'
- I:Processing '/recovery'
- I:Processing '/system'
- I:Processing '/devlog'
- I:Created '/devlog' folder.
- I:Processing '/carrier'
- I:Created '/carrier' folder.
- I:Processing '/reserve'
- I:Created '/reserve' folder.
- I:Processing '/external_sd'
- I:Created '/external_sd' folder.
- I:Processing '/sd_ext'
- I:Created '/sd_ext' folder.
- I:Processing '/usb_otg'
- I:Created '/usb_otg' folder.
- I:Using automatic handling for /data/media emulated storage device.
- I:Setting up '/data' as data/media emulated storage.
- I:Created '/sdcard' folder.
- I:mount -o bind '/data/media' '/sdcard' process ended with RC=0
- I:Created '/and-sec' folder.
- I:Creating Android Secure: /external_sd/.android_secure
- I:mount -o bind '/external_sd/.android_secure' '/and-sec' process ended with RC=0
- I:Backup folder set to '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Settings storage is '/data/media/0'
- Updating partition details...
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Data backup size is 3748MB, free: 18833MB.
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- ...done
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Unmounting main partitions...
- Partition Logs:
- /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
- Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p42
- Display_Name: Boot
- Storage_Name: boot
- Backup_Path: /boot
- Backup_Name: boot
- Backup_Display_Name: Boot
- Storage_Path: /boot
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /cache | /dev/block/mmcblk0p46 | Size: 377MB Used: 6MB Free: 370MB Backup Size: 6MB Raw size: 402653184
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p46
- Display_Name: Cache
- Storage_Name: Cache
- Backup_Path: /cache
- Backup_Name: cache
- Backup_Display_Name: Cache
- Storage_Path: /cache
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /data | /dev/block/mmcblk0p47 | Size: 25532MB Used: 3748MB Free: 18833MB Backup Size: 3748MB Raw size: 27246198784
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
- Symlink_Path: /data/media/0
- Symlink_Mount_Point: /sdcard
- Primary_Block_Device: /dev/block/mmcblk0p47
- Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
- Display_Name: Data
- Storage_Name: Internal Storage
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /data/media/0
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- MTP_Storage_ID: 65539
- /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
- Flags: IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p24
- Display_Name: misc
- Storage_Name: misc
- Backup_Path: /misc
- Backup_Name: misc
- Backup_Display_Name: misc
- Storage_Path: /misc
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
- Flags: IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p43
- Display_Name: Recovery
- Storage_Name: recovery
- Backup_Path: /recovery
- Backup_Name: recovery
- Backup_Display_Name: Recovery
- Storage_Path: /recovery
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /system | /dev/block/mmcblk0p45 | Size: 2641MB Used: 990MB Free: 1651MB Backup Size: 990MB Raw size: 2818572288
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p45
- Display_Name: System
- Storage_Name: System
- Backup_Path: /system
- Backup_Name: system
- Backup_Display_Name: System
- Storage_Path: /system
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p39
- Display_Name: devlog
- Storage_Name: devlog
- Backup_Path: /devlog
- Backup_Name: devlog
- Backup_Display_Name: devlog
- Storage_Path: /devlog
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p37
- Display_Name: carrier
- Storage_Name: carrier
- Backup_Path: /carrier
- Backup_Name: carrier
- Backup_Display_Name: carrier
- Storage_Path: /carrier
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p41
- Display_Name: reserve
- Storage_Name: reserve
- Backup_Path: /reserve
- Backup_Name: reserve
- Backup_Display_Name: reserve
- Storage_Path: /reserve
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 65924MB Free: 23243MB Backup Size: 0MB Raw size: 93503619072
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
- Symlink_Path: /external_sd/.android_secure
- Symlink_Mount_Point: /and-sec
- Primary_Block_Device: /dev/block/mmcblk1p1
- Alternate_Block_Device: /dev/block/mmcblk1
- Display_Name: Micro SDcard
- Storage_Name: Micro SDcard
- Backup_Path: /and-sec
- Backup_Name: and-sec
- Backup_Display_Name: Android Secure
- Storage_Path: /external_sd
- Current_File_System: exfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65537
- /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6883MB Free: 25322MB Backup Size: 6883MB Raw size: 34359738368
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
- Primary_Block_Device: /dev/block/mmcblk1p2
- Display_Name: SD-Ext
- Storage_Name: SD-Ext
- Backup_Path: /sd_ext
- Backup_Name: sd_ext
- Backup_Display_Name: SD-Ext
- Storage_Path: /sd_ext
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
- Primary_Block_Device: /dev/block/sda1
- Alternate_Block_Device: /dev/block/sda
- Display_Name: USB-OTG
- Storage_Name: USB-OTG
- Backup_Path: /usb_otg
- Backup_Name: usb_otg
- Backup_Display_Name: USB-OTG
- Storage_Path: /usb_otg
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65538
- MultiROM Recovery version: 2015-11-15 p1
- I:Loading package: TWRP (/script/ui.xml)
- I:Load XML directly
- I:Loading package: TWRP (/data/media/0/TWRP/theme/ui.zip)
- I:Loading zip theme
- I:Loading package: TWRP (/twres/ui.xml)
- I:Load XML directly
- I:Checking resolution...
- I:Loading resources...
- open_png /twres/images/statusbar.png
- open_png /twres/images/actionbar.png
- open_png /twres/images/actionbar_tab.png
- open_png /twres/images/actionbar_ex.png
- open_png /twres/images/actionbar_logo.png
- open_png /twres/images/actionbar_back.png
- open_png /twres/images/actionbar_back_hl.png
- open_png /twres/images/actionbar_settings.png
- open_png /twres/images/actionbar_settings_hl.png
- open_png /twres/images/actionbar_overflow.png
- open_png /twres/images/actionbar_overflow_hl.png
- open_png /twres/images/actionbar_pin.png
- open_png /twres/images/actionbar_pin_hl.png
- open_png /twres/images/actionbar_pinned.png
- open_png /twres/images/actionbar_pinned_hl.png
- open_png /twres/images/actionbar_refresh.png
- open_png /twres/images/actionbar_refresh_hl.png
- open_png /twres/images/actionbar_sort.png
- open_png /twres/images/actionbar_sort_hl.png
- open_png /twres/images/actionbar_reset.png
- open_png /twres/images/actionbar_reset_hl.png
- open_png /twres/images/actionbar_font_big.png
- open_png /twres/images/actionbar_font_big_hl.png
- open_png /twres/images/actionbar_font_small.png
- open_png /twres/images/actionbar_font_small_hl.png
- open_png /twres/images/actionbar_theme.png
- open_png /twres/images/actionbar_theme_hl.png
- open_png /twres/images/actionbar_encr_dis.png
- open_png /twres/images/actionbar_encr_dis_hl.png
- open_png /twres/images/actionbar_encr_ena.png
- open_png /twres/images/actionbar_encr_ena_hl.png
- open_png /twres/images/actionbar_delete.png
- open_png /twres/images/actionbar_delete_hl.png
- open_png /twres/images/actionbar_edit.png
- open_png /twres/images/actionbar_edit_hl.png
- open_png /twres/images/actionbar_close.png
- open_png /twres/images/actionbar_close_hl.png
- open_png /twres/images/btn_float_addtoqueue.png
- open_png /twres/images/btn_float_addtoqueue_hl.png
- open_png /twres/images/btn_float_flashifyinfo.png
- open_png /twres/images/btn_float_flashifyinfo_hl.png
- open_png /twres/images/btn_float_accept.png
- open_png /twres/images/btn_float_folder.png
- open_png /twres/images/btn_menu_zip.png
- open_png /twres/images/btn_menu_zip_sel.png
- open_png /twres/images/btn_menu_img.png
- open_png /twres/images/btn_menu_img_sel.png
- open_png /twres/images/btn_menu_name_a.png
- open_png /twres/images/btn_menu_name_a_sel.png
- open_png /twres/images/btn_menu_name_d.png
- open_png /twres/images/btn_menu_name_d_sel.png
- open_png /twres/images/btn_menu_date_a.png
- open_png /twres/images/btn_menu_date_a_sel.png
- open_png /twres/images/btn_menu_date_d.png
- open_png /twres/images/btn_menu_date_d_sel.png
- open_png /twres/images/btn_menu_size_a.png
- open_png /twres/images/btn_menu_size_a_sel.png
- open_png /twres/images/btn_menu_size_d.png
- open_png /twres/images/btn_menu_size_d_sel.png
- open_png /twres/images/btn_menu_inject.png
- open_png /twres/images/btn_menu_settings.png
- open_png /twres/images/btn_flat_less.png
- open_png /twres/images/btn_flat_more.png
- open_png /twres/images/btn_flat_ext3.png
- open_png /twres/images/btn_flat_ext4.png
- open_png /twres/images/btn_flat_installdumlock.png
- open_png /twres/images/btn_flat_reflashrecovery.png
- open_png /twres/images/btn_flat_restoreboot.png
- open_png /twres/images/btn_flat_injectbootsector.png
- open_png /twres/images/btn_flat_rot0.png
- open_png /twres/images/btn_flat_rot90.png
- open_png /twres/images/btn_flat_rot180.png
- open_png /twres/images/btn_flat_rot270.png
- open_png /twres/images/btn_raised_clearqueue.png
- open_png /twres/images/btn_raised_viewqueue.png
- open_png /twres/images/btn_raised_installscript.png
- open_png /twres/images/btn_raised_wipecaches.png
- open_png /twres/images/btn_raised_rebootsystem.png
- open_png /twres/images/btn_raised_rebootrecovery.png
- open_png /twres/images/btn_raised_formatdata.png
- open_png /twres/images/btn_raised_filesystem.png
- open_png /twres/images/btn_raised_fsoptions.png
- open_png /twres/images/btn_raised_fsrepair.png
- open_png /twres/images/btn_raised_fschange.png
- open_png /twres/images/btn_raised_fsresize.png
- open_png /twres/images/btn_raised_keepreadonly.png
- open_png /twres/images/btn_raised_disconnect.png
- open_png /twres/images/btn_raised_advancedwipe.png
- open_png /twres/images/btn_raised_back.png
- open_png /twres/images/btn_raised_decryptdata.png
- open_png /twres/images/btn_raised_enablemtp.png
- open_png /twres/images/btn_raised_disablemtp.png
- open_png /twres/images/btn_raised_usbstorage.png
- open_png /twres/images/btn_raised_cancel.png
- open_png /twres/images/btn_raised_noinstall.png
- open_png /twres/images/btn_raised_changetheme.png
- open_png /twres/images/btn_raised_changesplash.png
- open_png /twres/images/btn_raised_wipeencryption.png
- open_png /twres/images/btn_raised_mr_addrom.png
- open_png /twres/images/btn_raised_mr_swaproms.png
- open_png /twres/images/btn_raised_mr_delete.png
- open_png /twres/images/btn_raised_mr_rename.png
- open_png /twres/images/btn_raised_mr_backup.png
- open_png /twres/images/btn_raised_mr_wipedata.png
- open_png /twres/images/btn_raised_mr_wipedalvik.png
- open_png /twres/images/btn_raised_mr_wipecache.png
- open_png /twres/images/btn_raised_mr_addboot.png
- open_png /twres/images/btn_raised_mr_remboot.png
- open_png /twres/images/btn_raised_mr_addradio.png
- open_png /twres/images/btn_raised_mr_remradio.png
- open_png /twres/images/btn_raised_mr_flashzip.png
- open_png /twres/images/btn_raised_mr_sideload.png
- open_png /twres/images/btn_raised_mr_repatchinit.png
- open_png /twres/images/btn_raised_mr_next.png
- open_png /twres/images/btn_raised_mr_zipfile.png
- open_png /twres/images/btn_raised_mr_addfile.png
- open_png /twres/images/btn_raised_mr_selectimage.png
- open_png /twres/images/btn_raised_mr_restorecon.png
- open_png /twres/images/btn_appenddate.png
- open_png /twres/images/clr_red.png
- open_png /twres/images/clr_pink.png
- open_png /twres/images/clr_indigo.png
- open_png /twres/images/clr_blue.png
- open_png /twres/images/clr_lightblue.png
- open_png /twres/images/clr_teal.png
- open_png /twres/images/clr_green.png
- open_png /twres/images/clr_lightgreen.png
- open_png /twres/images/clr_lime.png
- open_png /twres/images/clr_amber.png
- open_png /twres/images/clr_orange.png
- open_png /twres/images/clr_deeporange.png
- open_png /twres/images/clr_brown.png
- open_png /twres/images/clr_grey.png
- open_png /twres/images/clr_bluegrey.png
- open_png /twres/images/background.png
- open_png /twres/images/divider.png
- open_png /twres/images/divider_list.png
- open_png /twres/images/divider_wide.png
- open_png /twres/images/hider_ab_ex.png
- open_png /twres/images/dialog_bg.png
- open_png /twres/images/dialog_label_storage.png
- open_png /twres/images/dialog_label_bookmark.png
- open_png /twres/images/dialog_label_restoresettings.png
- open_png /twres/images/dialog_label_settheme.png
- open_png /twres/images/dialog_label_color.png
- open_png /twres/images/dialog_label_encryption.png
- open_png /twres/images/dialog_label_decryption.png
- open_png /twres/images/dialog_label_offset.png
- open_png /twres/images/dialog_label_removetheme.png
- open_png /twres/images/dialog_label_warning.png
- open_png /twres/images/menu_install.png
- open_png /twres/images/menu_sort.png
- open_png /twres/images/db_ok.png
- open_png /twres/images/db_ok_hl.png
- open_png /twres/images/db_cancel.png
- open_png /twres/images/db_cancel_hl.png
- open_png /twres/images/bs_bg.png
- open_png /twres/images/bs_btn_copy.png
- open_png /twres/images/bs_btn_cut.png
- open_png /twres/images/bs_btn_chmod755.png
- open_png /twres/images/bs_btn_chmod644.png
- open_png /twres/images/bs_btn_chmod.png
- open_png /twres/images/bs_btn_delete.png
- open_png /twres/images/bs_btn_rename.png
- open_png /twres/images/bs_close.png
- open_png /twres/images/bc_install.png
- open_png /twres/images/bc_install_zip.png
- open_png /twres/images/bc_install_zip_m.png
- open_png /twres/images/bc_install_image.png
- open_png /twres/images/bc_install_image_m.png
- open_png /twres/images/bc_wipe.png
- open_png /twres/images/bc_backup.png
- open_png /twres/images/bc_restore.png
- open_png /twres/images/bc_mount.png
- open_png /twres/images/bc_advanced.png
- open_png /twres/images/bc_filemanager.png
- open_png /twres/images/bc_restart.png
- open_png /twres/images/bc_confirmaction.png
- open_png /twres/images/bc_working.png
- open_png /twres/images/bc_done.png
- open_png /twres/images/bc_settings.png
- open_png /twres/images/bc_settings_theme.png
- open_png /twres/images/bc_terminal.png
- open_png /twres/images/bc_sideload.png
- open_png /twres/images/bc_installsu.png
- open_png /twres/images/bc_about.png
- open_png /twres/images/bc_partsdcard.png
- open_png /twres/images/bc_dumlock.png
- open_png /twres/images/bc_multirom.png
- open_png /twres/images/bc_multiromsettings.png
- open_png /twres/images/mb_empty.png
- open_png /twres/images/mb_empty_s.png
- open_png /twres/images/mb_install.png
- open_png /twres/images/mb_wipe.png
- open_png /twres/images/mb_backup.png
- open_png /twres/images/mb_restore.png
- open_png /twres/images/mb_mount.png
- open_png /twres/images/mb_filemanager.png
- open_png /twres/images/mb_advanced.png
- open_png /twres/images/mb_restart.png
- open_png /twres/images/mb_system.png
- open_png /twres/images/mb_recovery.png
- open_png /twres/images/mb_bootloader.png
- open_png /twres/images/mb_theme.png
- open_png /twres/images/mb_poweroff.png
- open_png /twres/images/mb_download.png
- open_png /twres/images/mb_logtosd.png
- open_png /twres/images/mb_fixpermissions.png
- open_png /twres/images/mb_terminalcommand.png
- open_png /twres/images/mb_adbsideload.png
- open_png /twres/images/mb_dumlock.png
- open_png /twres/images/mb_reinjecttwrp.png
- open_png /twres/images/mb_partsdcard.png
- open_png /twres/images/mb_multirom.png
- open_png /twres/images/mb_install_color.png
- open_png /twres/images/mb_wipe_color.png
- open_png /twres/images/mb_backup_color.png
- open_png /twres/images/mb_restore_color.png
- open_png /twres/images/mb_mount_color.png
- open_png /twres/images/mb_filemanager_color.png
- open_png /twres/images/mb_advanced_color.png
- open_png /twres/images/mb_restart_color.png
- open_png /twres/images/mb_system_color.png
- open_png /twres/images/mb_recovery_color.png
- open_png /twres/images/mb_bootloader_color.png
- open_png /twres/images/mb_theme_color.png
- open_png /twres/images/mb_poweroff_color.png
- open_png /twres/images/mb_download_color.png
- open_png /twres/images/mb_logtosd_color.png
- open_png /twres/images/mb_fixpermissions_color.png
- open_png /twres/images/mb_terminalcommand_color.png
- open_png /twres/images/mb_adbsideload_color.png
- open_png /twres/images/mb_dumlock_color.png
- open_png /twres/images/mb_reinjecttwrp_color.png
- open_png /twres/images/mb_partsdcard_color.png
- open_png /twres/images/mb_multirom_color.png
- open_png /twres/images/icon_info.png
- open_png /twres/images/icon_warning.png
- open_png /twres/images/icon_person.png
- open_png /twres/images/icon_mail.png
- open_png /twres/images/icon_palette.png
- open_png /twres/images/icon_cake.png
- open_png /twres/images/icon_color.png
- open_png /twres/images/icon_confirm.png
- open_png /twres/images/file.png
- open_png /twres/images/folder.png
- open_png /twres/images/unlock_icon.png
- open_png /twres/images/folder_mr.png
- open_png /twres/images/indeterminate001.png
- open_png /twres/images/indeterminate002.png
- open_png /twres/images/indeterminate003.png
- open_png /twres/images/indeterminate004.png
- open_png /twres/images/indeterminate005.png
- open_png /twres/images/indeterminate006.png
- open_png /twres/images/indeterminate007.png
- open_png /twres/images/indeterminate008.png
- open_png /twres/images/indeterminate009.png
- open_png /twres/images/indeterminate010.png
- open_png /twres/images/indeterminate011.png
- open_png /twres/images/indeterminate012.png
- open_png /twres/images/indeterminate013.png
- open_png /twres/images/indeterminate014.png
- open_png /twres/images/indeterminate015.png
- open_png /twres/images/indeterminate016.png
- open_png /twres/images/indeterminate017.png
- open_png /twres/images/indeterminate018.png
- open_png /twres/images/indeterminate019.png
- open_png /twres/images/indeterminate020.png
- open_png /twres/images/indeterminate021.png
- open_png /twres/images/indeterminate022.png
- open_png /twres/images/indeterminate023.png
- open_png /twres/images/indeterminate024.png
- open_png /twres/images/indeterminate025.png
- open_png /twres/images/progress_empty.png
- open_png /twres/images/progress_fill.png
- open_png /twres/images/checkbox_false.png
- open_png /twres/images/checkbox_true.png
- open_png /twres/images/checkbox_false_d.png
- open_png /twres/images/checkbox_true_d.png
- open_png /twres/images/radio_false.png
- open_png /twres/images/radio_true.png
- open_png /twres/images/radio_false_d.png
- open_png /twres/images/radio_true_d.png
- open_png /twres/images/home.png
- open_png /twres/images/home_hl.png
- open_png /twres/images/back.png
- open_png /twres/images/back_hl.png
- open_png /twres/images/slideout.png
- open_png /twres/images/slideout_hl.png
- open_png /twres/images/slider.png
- open_png /twres/images/slider_used.png
- open_png /twres/images/slider_lock.png
- open_png /twres/images/slider_lock_used.png
- open_png /twres/images/slider_lock_handle.png
- open_png /twres/images/handle.png
- open_png /twres/images/handle_h.png
- open_png /twres/images/keyboard1.png
- open_png /twres/images/keyboard2.png
- open_png /twres/images/keyboard3.png
- open_png /twres/images/keyboard4.png
- open_png /twres/images/keyboard_shadow.png
- open_png /twres/images/usb.png
- open_png /twres/images/input_line.png
- open_png /twres/images/input_line_dialog.png
- open_png /twres/images/input_line_fail_backupname.png
- open_png /twres/images/input_line_fail_dialog_encr.png
- open_png /twres/images/input_line_fail_decr.png
- open_png /twres/images/input_line_fail_romname.png
- open_png /twres/images/tab_misc.png
- open_png /twres/images/tab_misc_a.png
- open_png /twres/images/tab_display.png
- open_png /twres/images/tab_display_a.png
- open_png /twres/images/tab_time.png
- open_png /twres/images/tab_time_a.png
- open_png /twres/images/tab_vibration.png
- open_png /twres/images/tab_vibration_a.png
- open_png /twres/images/tab_mr_bootmenu.png
- open_png /twres/images/tab_mr_bootmenu_a.png
- open_png /twres/images/tab_mr_autoboot.png
- open_png /twres/images/tab_mr_autoboot_a.png
- open_png /twres/images/cursor.png
- I:Loading variables...
- I:Loading mouse cursor...
- I:Loading pages...
- I:PageSet::CheckInclude loading filename: '/twres/light_mr.xml'
- I:Loading included resources...
- I:Loading included variables...
- I:Loading mouse cursor...
- I:Loading included pages...
- I:Loading page main
- I:Loading page main2
- I:Loading page settings
- I:Loading page timezone
- I:Loading page screen
- I:Loading page vibrate
- I:Loading page theme_settings
- I:Loading page theme_color
- I:Loading page set_color
- I:Loading page theme_swap
- I:Loading page theme_splash
- I:Loading page theme_splash_info
- I:Loading page theme_splash_select_img
- I:Loading page theme_splash_select_jpg
- I:Loading page theme_splash_flash
- I:Loading page theme_splash_flash_done
- I:Loading page install
- I:Loading page install_image
- I:Loading page flash_confirm
- I:Loading page queueview
- I:Loading page flash_aromafm_confirm
- I:Loading page flash_image_confirm
- I:Loading page flash_image_confirm_f
- I:Loading page flash_image_info
- I:Loading page add_zip
- I:Loading page flash_zip
- I:Loading page flash_image
- I:Loading page flash_done
- I:Loading page flash_image_done
- I:Loading page clear_vars
- I:Loading page confirm_action
- I:Loading page action_page
- I:Loading page singleaction_page
- I:Loading page action_complete
- I:Loading page reboot
- I:Loading page filecheck
- I:Loading page themecheck
- I:Loading page rebootcheck
- I:Loading page wipe
- I:Loading page advancedwipe
- I:Loading page formatdata
- I:Loading page formatdata_confirm
- I:Loading page checkpartitionlist
- I:Loading page partitionoptions
- I:Loading page refreshfilesystem
- I:Loading page selectfilesystem
- I:Loading page wipe_confirm_action
- I:Loading page wipe_action_page
- I:Loading page wipe_action_complete
- I:Loading page backup
- I:Loading page backupname1
- I:Loading page backupname2
- I:Loading page checkbackuppassword
- I:Loading page backup_run
- I:Loading page backup_action_complete
- I:Loading page restore
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Loading page restore_read
- I:Loading page restore_decrypt
- I:Loading page try_restore_decrypt
- I:Loading page restore_select
- I:Loading page renamebackup
- I:Loading page deletebackup
- I:Loading page restore_run
- I:Loading page restore_confirm_action
- I:Loading page restore_action_page
- I:Loading page restore_action_complete
- I:Loading page mount
- I:Loading page usb_mount
- I:Loading page usb_umount
- I:Loading page system_readonly_check
- I:Loading page system_readonly
- I:Loading page decrypt
- I:Loading page decrypt_pattern
- I:Loading page trydecrypt
- I:Loading page filemanagerlist
- I:Loading page filemanageroptions
- I:Loading page choosedestinationfolder
- I:Loading page filemanagerrenamefile
- I:Loading page filemanagerrenamefolder
- I:Loading page filemanagerchmod
- I:Loading page filemanagerconfirm
- I:Loading page filemanageraction
- I:Loading page filemanagercomplete
- I:Loading page advanced
- I:Loading page fixpermissions
- I:Loading page partsdcard
- I:Loading page htcdumlock
- I:Loading page terminalfolder
- I:Loading page terminalcommand
- I:Loading page sideload
- I:Loading page installsu
- I:Loading page lock
- I:Loading page about
- I:Loading page console
- I:Loading page menu_install
- I:Loading page menu_sort
- I:Loading page dialog_storage
- I:Loading page dialog_color
- I:Loading page dialog_encryption1
- I:Loading page dialog_encryption2
- I:Loading page dialog_folder
- I:Loading page dialog_settheme
- I:Loading page dialog_offset
- I:Loading page dialog_reset
- I:Loading page dialog_reset_theme
- I:Loading page dialog_remove_theme
- I:Loading page dialog_warning
- I:Loading page multirom_msg
- I:Loading page multirom_main
- I:Loading page multirom_list
- I:Unable to open ''
- I:Loading page multirom_manage
- I:Loading page multirom_manage_inject_select
- I:Loading page multirom_manage_flash_select
- I:Loading page multirom_manage_flash_confirm
- I:Loading page multirom_manage_confirm_action
- I:Loading page multirom_rename
- I:Loading page multirom_do_rename
- I:Loading page multirom_settings
- I:Loading page multirom_settings_autoboot
- I:Loading page multirom_settings_rename_internal
- I:Loading page multirom_inject
- I:Loading page multirom_inject_select
- I:Loading page multirom_add
- I:Loading page multirom_add_sailfish
- I:Loading page multirom_add_source
- I:Loading page multirom_add_select
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
- I:Loading page multirom_add_start_process
- I:Loading page multirom_add_confirm_action
- I:Loading page multirom_add_image_size
- I:Loading page multirom_change_img_size
- I:Loading page multirom_confirm_action
- I:Loading page multirom_action_page
- I:Loading page multirom_action_complete
- I:Loading page multirom_sideload_complete
- I:Loading page multirom_swap
- I:Loading page multirom_swap_set_internal_name
- I:Loading page multirom_swap_space_info
- I:Loading page multirom_set_list_loc
- I:Loading page menu_multirom
- I:Loading page dialog_storage_mr
- I:Set page: 'clear_vars'
- I:Set page: 'main2'
- I:Switching packages (TWRP)
- SELinux contexts loaded from /file_contexts
- Full SELinux support is present.
- Startup Commands:
- ro.com.google.clientidbase=android-google
- ro.com.android.dateformat=MM-dd-yyyy
- ro.com.android.dataroaming=true
- ro.com.android.wifi-watchlist=GoogleGuest
- ro.ril.oem.ecclist=911
- ro.ril.set.mtusize=1422
- ro.ril.svdo=true
- ro.ril.hsdpa.category=14
- ro.ril.hsxpa=4
- ro.ril.enable.a53=1
- ro.ril.enable.sdr=0
- ro.ril.enable.gea3=1
- ro.ril.enable.r8fd=1
- ro.ril.disable.fd.plmn.prefix=23402,23410,23411,23420
- ro.ril.disable.cpc=1
- ro.url.legal=http://www.google.com/intl/%s/mobile/android/basic/phone-legal.html
- ro.boot.dq=PASS
- ro.boot.lb=1
- ro.boot.cid=22222222
- ro.boot.mid=0P6B70000
- ro.boot.emmc=true
- ro.boot.mode=recovery
- ro.boot.podt=0x3E8
- ro.boot.engid=0
- ro.boot.ddrmid=(0x1)
- ro.boot.carrier=COMMON
- ro.boot.keycaps=qwerty
- ro.boot.selinux=permissive
- ro.boot.baseband=1.09.20.0209
- ro.boot.hardware=qcom
- ro.boot.pagesize=2048
- ro.boot.rom_type=NORMAL
- ro.boot.serialno=HT444SF01255
- ro.boot.devicerev=5
- ro.boot.bootloader=3.19.0.0000
- ro.boot.efuse_info=SL
- ro.boot.batt_poweron=good_battery
- ro.cdma.home.operator.alpha=Sprint
- ro.cdma.home.operator.numeric=310120
- ro.hwui.path_cache_size=32
- ro.hwui.layer_cache_size=48
- ro.hwui.texture_cache_size=72
- ro.hwui.gradient_cache_size=1
- ro.hwui.r_buffer_cache_size=8
- ro.hwui.drop_shadow_cache_size=6
- ro.hwui.text_large_cache_width=2048
- ro.hwui.text_small_cache_width=1024
- ro.hwui.text_large_cache_height=1024
- ro.hwui.text_small_cache_height=1024
- ro.hwui.texture_cache_flushrate=0.4
- ro.omni.device=m8
- ro.omni.version=5.1.1-20151115-m8-HOMEMADE
- ro.twrp.boot=1
- ro.twrp.version=2.8.7
- ro.wifi.channels=
- ro.allow.mock.location=1
- ro.board.platform=msm8974
- ro.build.id=LYZ28J
- ro.build.date=Sat Nov 14 23:01:51 EST 2015
- ro.build.date.utc=0
- ro.build.host=QuadCore-SSD-BuildBox
- ro.build.tags=test-keys
- ro.build.type=eng
- ro.build.user=throwback
- ro.build.flavor=omni_m8-eng
- ro.build.display.id=omni_m8-eng 5.1.1 LYZ28J eng.throwback.20151114.230135 test-keys
- ro.build.product=m8
- ro.build.version.sdk=22
- ro.build.version.base_os=
- ro.build.version.release=5.1.1
- ro.build.version.codename=REL
- ro.build.version.incremental=eng.throwback.20151114.230135
- ro.build.version.all_codenames=REL
- ro.build.version.security_patch=2015-11-01
- ro.build.description=4.20.651.10 CL476182 release-keys
- ro.build.fingerprint=htc/sprint_wwe/htc_m8whl:5.0.1/LRX22C/476182.10:user/release-keys
- ro.build.characteristics=default
- ro.config.ringtone=Orion.ogg
- ro.config.alarm_alert=Argon.ogg
- ro.config.notification_sound=pixiedust.ogg
- ro.dalvik.vm.native.bridge=0
- ro.kernel.android.checkjni=1
- ro.secure=0
- ro.zygote=zygote32
- ro.carrier=unknown
- ro.product.cpu.abi=armeabi-v7a
- ro.product.cpu.abi2=armeabi
- ro.product.cpu.abilist=armeabi-v7a,armeabi
- ro.product.cpu.abilist32=armeabi-v7a,armeabi
- ro.product.cpu.abilist64=
- ro.product.board=MSM8974
- ro.product.brand=htc
- ro.product.model=831C
- ro.product.device=htc_m8whl
- ro.product.locale.region=US
- ro.product.locale.language=en
- ro.product.manufacturer=htc
- ro.baseband=1.09.20.0209
- ro.bootmode=recovery
- ro.hardware=qcom
- ro.revision=0
- ro.serialno=HT444SF01255
- ro.9kramdump=0
- ro.telephony.ril_class=m8sprRIL
- ro.telephony.default_network=8
- ro.telephony.default_cdma_sub=1
- ro.alarm_boot=false
- ro.bootloader=3.19.0.0000
- ro.debuggable=1
- ro.modversion=OmniROM-5.1.1-20151115-m8-HOMEMADE
- ro.factorytest=0
- ro.setupwizard.enterprise_mode=1
- gsm.sim.operator.alpha=Sprint
- gsm.sim.operator.numeric=310120
- gsm.operator.alpha=310120
- gsm.operator.numeric=310120
- net.bt.name=Android
- net.change=net.bt.name
- init.svc.adbd=running
- init.svc.healthd=running
- init.svc.ueventd=running
- init.svc.recovery=running
- init.svc.chargeled=running
- init.svc.choice_fn=stopped
- rild.libargs=-d /dev/smd0
- twrp.crash_counter=0
- dalvik.vm.isa.arm.features=div
- dalvik.vm.dex2oat-Xms=64m
- dalvik.vm.dex2oat-Xmx=512m
- dalvik.vm.dex2oat-filter=interpret-only
- dalvik.vm.stack-trace-file=/data/anr/traces.txt
- dalvik.vm.image-dex2oat-Xms=64m
- dalvik.vm.image-dex2oat-Xmx=64m
- dalvik.vm.image-dex2oat-filter=verify-none
- persist.sys.usb.config=adb
- persist.sys.dalvik.vm.lib.2=libart.so
- persist.sys.root_access=1
- persist.radio.snapshot_timer=22
- persist.radio.snapshot_enabled=1
- service.adb.root=1
- keyguard.no_require_sim=true
- telephony.sms.pseudo_multipart=1
- telephony.lteOnCdmaDevice=1
- I:Copying file /cache/recovery/log to /cache/recovery/last_log
- tw_get_context got selinux context: u:object_r:media_rw_data_file:s0
- I:Got default contexts and file mode for storage files.
- I:Attempt to load settings from settings file...
- I:Loading settings from '/data/media/0/TWRP/.twrps'.
- I:Backup folder set to '/external_sd/TWRP/BACKUPS/HT444SF01255'
- I:Copying file /etc/recovery.fstab to /cache/recovery/recovery.fstab
- I:Version number saved to '/cache/recovery/.version'
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- I:TWFunc::Set_Brightness: Setting brightness control to 89
- I:TWFunc::Fixup_Time: Pre-fix date and time: 2015-11-25--18-10-37
- I:TWFunc::Fixup_Time: Setting time offset from file /sys/class/rtc/rtc0/since_epoch
- I:TWFunc::Fixup_Time: Date and time corrected: 2015-11-25--18-10-37
- I:Switching packages (TWRP)
- I:Set overlay: 'console'
- I:Set overlay: ''
- I:Set page: 'multirom_main'
- I:Set page: 'multirom_list'
- I:Set page: 'multirom_set_list_loc'
- I:Set overlay: 'dialog_storage_mr'
- I:Set page: 'multirom_list'
- I:Set overlay: ''
- I:Set page: 'multirom_manage'
- I:Set page: 'multirom_manage_flash_select'
- I:Set page: 'multirom_manage_flash_confirm'
- I:Set page: 'multirom_action_page'
- I:operation_start: 'Flashing'
- Flashing ZIP file /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
- ROM: 4.25.654.18
- Preparing ZIP file...
- rm: can't remove '/tmp/mr_update.zip': No such file or directory
- I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
- No need to change ZIP.
- Changing mounts to ROM 4.25.654.18...
- I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
- I:Processing '/data_t'
- I:Created '/data_t' folder.
- I:Processing '/system'
- I:Processing '/cache'
- Partition Logs:
- /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
- Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p42
- Display_Name: Boot
- Storage_Name: boot
- Backup_Path: /boot
- Backup_Name: boot
- Backup_Display_Name: Boot
- Storage_Path: /boot
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 3748MB Free: 18833MB Backup Size: 3748MB Raw size: 27246198784
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
- Symlink_Path: /realdata/media/0
- Symlink_Mount_Point: /sdcard
- Primary_Block_Device: /dev/block/mmcblk0p47
- Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
- Display_Name: Realdata
- Storage_Name: Internal Storage
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /realdata/media/0
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- MTP_Storage_ID: 65539
- /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
- Flags: IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p24
- Display_Name: misc
- Storage_Name: misc
- Backup_Path: /misc
- Backup_Name: misc
- Backup_Display_Name: misc
- Storage_Path: /misc
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
- Flags: IsPresent Can_Flash_Img
- Primary_Block_Device: /dev/block/mmcblk0p43
- Display_Name: Recovery
- Storage_Name: recovery
- Backup_Path: /recovery
- Backup_Name: recovery
- Backup_Display_Name: Recovery
- Storage_Path: /recovery
- Current_File_System: emmc
- Fstab_File_System: emmc
- Backup_Method: dd
- /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p39
- Display_Name: devlog
- Storage_Name: devlog
- Backup_Path: /devlog
- Backup_Name: devlog
- Backup_Display_Name: devlog
- Storage_Path: /devlog
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p37
- Display_Name: carrier
- Storage_Name: carrier
- Backup_Path: /carrier
- Backup_Name: carrier
- Backup_Display_Name: carrier
- Storage_Path: /carrier
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
- Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
- Primary_Block_Device: /dev/block/mmcblk0p41
- Display_Name: reserve
- Storage_Name: reserve
- Backup_Path: /reserve
- Backup_Name: reserve
- Backup_Display_Name: reserve
- Storage_Path: /reserve
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 65924MB Free: 23243MB Backup Size: 0MB Raw size: 93503619072
- Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
- Symlink_Path: /external_sd/.android_secure
- Symlink_Mount_Point: /and-sec
- Primary_Block_Device: /dev/block/mmcblk1p1
- Alternate_Block_Device: /dev/block/mmcblk1
- Display_Name: Micro SDcard
- Storage_Name: Micro SDcard
- Backup_Path: /and-sec
- Backup_Name: and-sec
- Backup_Display_Name: Android Secure
- Storage_Path: /external_sd
- Current_File_System: exfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65537
- /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6883MB Free: 25322MB Backup Size: 6883MB Raw size: 34359738368
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
- Primary_Block_Device: /dev/block/mmcblk1p2
- Display_Name: SD-Ext
- Storage_Name: SD-Ext
- Backup_Path: /sd_ext
- Backup_Name: sd_ext
- Backup_Display_Name: SD-Ext
- Storage_Path: /sd_ext
- Current_File_System: ext4
- Fstab_File_System: ext4
- Backup_Method: files
- /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
- Primary_Block_Device: /dev/block/sda1
- Alternate_Block_Device: /dev/block/sda
- Display_Name: USB-OTG
- Storage_Name: USB-OTG
- Backup_Path: /usb_otg
- Backup_Name: usb_otg
- Backup_Display_Name: USB-OTG
- Storage_Path: /usb_otg
- Current_File_System: vfat
- Fstab_File_System: vfat
- Backup_Method: files
- MTP_Storage_ID: 65538
- /data | /mnt/multirom-m8/4.25.654.18/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
- Primary_Block_Device: /mnt/multirom-m8/4.25.654.18/data
- Display_Name: Data
- Storage_Name: data_t
- Backup_Path: /data
- Backup_Name: data
- Backup_Display_Name: Data
- Storage_Path: /data_t
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /system | /mnt/multirom-m8/4.25.654.18/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /mnt/multirom-m8/4.25.654.18/system
- Display_Name: System
- Storage_Name: System
- Backup_Path: /system
- Backup_Name: system
- Backup_Display_Name: System
- Storage_Path: /system
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- /cache | /mnt/multirom-m8/4.25.654.18/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
- Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
- Primary_Block_Device: /mnt/multirom-m8/4.25.654.18/cache
- Display_Name: Cache
- Storage_Name: Cache
- Backup_Path: /cache
- Backup_Name: cache
- Backup_Display_Name: Cache
- Storage_Path: /cache
- Current_File_System: ext4
- Fstab_File_System: ext4
- Bind_Of: /realdata
- Backup_Method: files
- I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
- I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
- I:Running cmd "ln -s "/mnt/multirom-m8/4.25.654.18/boot.img" "/dev/block/mmcblk0p42""
- Installing '/external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip'...
- Checking for MD5 file...
- Skipping MD5 check: no MD5 file found
- I:Zip does not contain SELinux file_contexts file in its root.
- I:Legacy property environment initialized.
- + fd=23
- + zip=/external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
- + rm -Rf /tmp/superuser
- + mkdir -p /tmp/superuser
- + unzip -o /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip -d /tmp/superuser/
- Archive: /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
- creating: scripts/
- inflating: scripts/bootimg.sh
- inflating: scripts/.gitignore
- creating: scripts/su/
- inflating: scripts/su/changes.sh
- inflating: scripts/su/su-communication.sh
- inflating: scripts/su/rights.sh
- inflating: scripts/README.md
- inflating: scripts/gitversion
- creating: scripts/keystore_tools/
- inflating: scripts/keystore_tools/README
- inflating: scripts/keystore_tools/make_key
- inflating: scripts/keystore_tools/BootKeystoreSigner.jar
- inflating: scripts/keystore_tools/BootSignature.jar
- creating: scripts/havealoha/
- inflating: scripts/havealoha/changes.sh
- creating: scripts/bin/
- inflating: scripts/bin/su-x86
- inflating: scripts/bin/sepolicy-inject
- inflating: scripts/bin/bootimg-repack
- inflating: scripts/bin/su-arm
- inflating: scripts/bin/bootimg-extract
- creating: META-INF/
- creating: META-INF/com/
- creating: META-INF/com/google/
- creating: META-INF/com/google/android/
- inflating: META-INF/com/google/android/updater-script
- inflating: META-INF/com/google/android/update-binary
- inflating: busybox-armv7l
- + chmod 0755 /tmp/superuser/busybox-armv7l
- + cd /tmp/superuser/scripts/su/
- + fstab=/etc/recovery.fstab
- + [ ! -f /etc/recovery.fstab ]
- + fstab=/etc/recovery.fstab.bak
- + grep -E \b/boot\b /etc/recovery.fstab.bak
- + grep -oE /dev/[a-zA-Z0-9_./-]*
- + bootimg=/dev/block/platform/msm_sdcc.1/by-name/boot
- + [ -z /dev/block/platform/msm_sdcc.1/by-name/boot ]
- + ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
- + echo ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
- + sh -x ../bootimg.sh /dev/block/platform/msm_sdcc.1/by-name/boot eng
- Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot+ export TMPDIR=/tmp/
- + which mktemp
- /sbin/mktemp
- + [ 2 == 0 ]
- + set -e
- + [ -f eng ]
- + scr=/tmp/superuser/scripts/su/changes.sh
- + trap cleanup EXIT
- + readlink -f ../bootimg.sh
- + dirname /tmp/superuser/scripts/bootimg.sh
- + scriptdir=/tmp/superuser/scripts
- + chmod 0755 /tmp/superuser/scripts/bin/sepolicy-inject
- + chmod 0755 /tmp/superuser/scripts/bin/bootimg-repack
- + chmod 0755 /tmp/superuser/scripts/bin/bootimg-extract
- + [[ toto2 =~ toto ]]
- sh: =~: unknown operand
- + r_file_perms=getattr open read ioctl lock
- + x_file_perms=getattr execute execute_no_trans
- + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + w_file_perms=open append write
- + rw_file_perms=getattr open read ioctl lock open append write
- + rwx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + rw_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + create_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + rw_stream_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + create_stream_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + r_dir_perms=open getattr read search ioctl
- + w_dir_perms=open search write add_name remove_name
- + ra_dir_perms=open getattr read search ioctl add name write
- + rw_dir_perms=open getattr read search ioctl open search write add_name remove_name
- + create_dir_perms=create reparent rename rmdir setattr open getattr read search ioctl open search write add_name remove_name
- + startBootImgEdit /dev/block/platform/msm_sdcc.1/by-name/boot
- + readlink -f /dev/block/platform/msm_sdcc.1/by-name/boot
- + f=/mnt/multirom-m8/4.25.654.18/boot.img
- + homedir=/tmp/superuser/scripts/su
- + mktemp -d
- + bootimg_extract=/tmp/tmp.JvyixM
- + cd /tmp/tmp.JvyixM
- + /tmp/superuser/scripts/bin/bootimg-extract /mnt/multirom-m8/4.25.654.18/boot.img
- + mktemp -d
- + d2=/tmp/tmp.wvJKxS
- + cd /tmp/tmp.wvJKxS
- + [ -f /tmp/tmp.JvyixM/ramdisk.gz ]
- + gunzip -c
- + cpio -i
- 10654 blocks
- + gunzip -c
- + INITRAMFS_FILES=
- + file init
- ../bootimg.sh: line 1: file: not found
- + grep -q Intel
- + DST_ARCH=arm
- + /tmp/superuser/scripts/bin/sepolicy-inject -e -s gatekeeper_service -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 660 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -e -c service_manager -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 660 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + ANDROID=21
- + shift
- + [ -n ]
- + . /tmp/superuser/scripts/su/changes.sh
- + dirname /tmp/superuser/scripts/su/changes.sh
- + . /tmp/superuser/scripts/su/su-communication.sh
- + dirname /tmp/superuser/scripts/su/changes.sh
- + . /tmp/superuser/scripts/su/rights.sh
- + r_file_perms=getattr open read ioctl lock
- + x_file_perms=getattr execute execute_no_trans
- + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
- + w_file_perms=open append write
- + cp /tmp/superuser/scripts/bin/su-arm sbin/su
- + addFile sbin/su
- + [ -n ]
- + echo
- + grep -qE \bsbin/su\b
- + INITRAMFS_FILES= sbin/su
- + chmod 0755 sbin/su
- + [ -f sepolicy ]
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su -P sepolicy
- source type su does not exist: 0,661
- libsepol.policydb_index_others: security: 1 users, 2 roles, 660 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 661 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su_device -P sepolicy
- source type su_device does not exist: 0,662
- libsepol.policydb_index_others: security: 1 users, 2 roles, 661 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 662 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -z su_daemon -P sepolicy
- source type su_daemon does not exist: 0,663
- libsepol.policydb_index_others: security: 1 users, 2 roles, 662 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8067 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c dir -t su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8068 rules, 0 cond rules
- + allow su_device tmpfs filesystem associate
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su
- + grep -qE \bsepolicy\b
- + INITRAMFS_FILES= sbin/su sepolicy
- + [ -z su_device -o -z tmpfs -o -z filesystem -o -z associate ]
- + echo associate
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_device -t tmpfs -c filesystem -p associate -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8069 rules, 0 cond rules
- + allowSuClient shell
- + allow shell rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8070 rules, 0 cond rules
- + allow shell su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8071 rules, 0 cond rules
- + allow shell su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8072 rules, 0 cond rules
- + allow shell su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z shell -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8073 rules, 0 cond rules
- + allow su_daemon shell fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8074 rules, 0 cond rules
- + allow su_daemon shell fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8075 rules, 0 cond rules
- + allow su_daemon shell dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8076 rules, 0 cond rules
- + allow su_daemon shell file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8077 rules, 0 cond rules
- + allow su_daemon shell lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8078 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8079 rules, 0 cond rules
- + allow su shell fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8080 rules, 0 cond rules
- + allow su shell fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8081 rules, 0 cond rules
- + allowSuClient untrusted_app
- + allow untrusted_app rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8082 rules, 0 cond rules
- + allow untrusted_app su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8083 rules, 0 cond rules
- + allow untrusted_app su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8084 rules, 0 cond rules
- + allow untrusted_app su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8085 rules, 0 cond rules
- + allow su_daemon untrusted_app fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8086 rules, 0 cond rules
- + allow su_daemon untrusted_app fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8087 rules, 0 cond rules
- + allow su_daemon untrusted_app dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8088 rules, 0 cond rules
- + allow su_daemon untrusted_app file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8089 rules, 0 cond rules
- + allow su_daemon untrusted_app lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8090 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8091 rules, 0 cond rules
- + allow su untrusted_app fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8091 rules, 0 cond rules
- + allow su untrusted_app fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8092 rules, 0 cond rules
- + allowSuClient su
- + allow su rootfs file execute_no_trans execute
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z rootfs -o -z file -o -z execute_no_trans execute ]
- + echo execute_no_trans execute
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p execute_no_trans,execute -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8093 rules, 0 cond rules
- + allow su su_daemon unix_stream_socket connectto getopt
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
- + echo connectto getopt
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8094 rules, 0 cond rules
- + allow su su_device dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_device -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8095 rules, 0 cond rules
- + allow su su_device sock_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_device -o -z sock_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c sock_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8096 rules, 0 cond rules
- + allow su_daemon su fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8097 rules, 0 cond rules
- + allow su_daemon su fifo_file read write getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z fifo_file -o -z read write getattr ioctl ]
- + echo read write getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fifo_file -p read,write,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8098 rules, 0 cond rules
- + allow su_daemon su dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8099 rules, 0 cond rules
- + allow su_daemon su file read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z file -o -z read open ]
- + echo read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c file -p read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8100 rules, 0 cond rules
- + allow su_daemon su lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8101 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
- + echo sys_ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8102 rules, 0 cond rules
- + allow su su fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8102 rules, 0 cond rules
- + allow su su fifo_file read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fifo_file -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8103 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -e -s ssd_tool -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8104 rules, 0 cond rules
- + allow init su_daemon process transition
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z init -o -z su_daemon -o -z process -o -z transition ]
- + echo transition
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p transition -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8104 rules, 0 cond rules
- + noaudit init su_daemon process rlimitinh siginh noatsecure
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p rlimitinh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8105 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p siginh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8105 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p noatsecure -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8105 rules, 0 cond rules
- + suDaemonRights
- + allow su_daemon rootfs file entrypoint
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z rootfs -o -z file -o -z entrypoint ]
- + echo entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t rootfs -c file -p entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8105 rules, 0 cond rules
- + allow su_daemon su_daemon dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8106 rules, 0 cond rules
- + allow su_daemon su_daemon file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8107 rules, 0 cond rules
- + allow su_daemon su_daemon lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8108 rules, 0 cond rules
- + allow su_daemon su_daemon unix_dgram_socket create connect write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z unix_dgram_socket -o -z create connect write ]
- + echo create connect write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_dgram_socket -p create,connect,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8109 rules, 0 cond rules
- + allow su_daemon su_daemon unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8110 rules, 0 cond rules
- + allow su_daemon devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8111 rules, 0 cond rules
- + allow su_daemon untrusted_app_devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z untrusted_app_devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app_devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8112 rules, 0 cond rules
- + allow su_daemon su_daemon capability setuid setgid
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z setuid setgid ]
- + echo setuid setgid
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p setuid,setgid -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8113 rules, 0 cond rules
- + allow su_daemon app_data_file dir getattr search write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z app_data_file -o -z dir -o -z getattr search write add_name ]
- + echo getattr search write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c dir -p getattr,search,write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8113 rules, 0 cond rules
- + allow su_daemon app_data_file file getattr read open lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z app_data_file -o -z file -o -z getattr read open lock ]
- + echo getattr read open lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c file -p getattr,read,open,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8114 rules, 0 cond rules
- + allow su_daemon su_daemon capability dac_override
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z dac_override ]
- + echo dac_override
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p dac_override -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8115 rules, 0 cond rules
- + allow su_daemon su_daemon process fork sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z process -o -z fork sigchld ]
- + echo fork sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p fork,sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8115 rules, 0 cond rules
- + allow su_daemon toolbox_exec file execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z toolbox_exec -o -z file -o -z execute read open execute_no_trans ]
- + echo execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t toolbox_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
- target type toolbox_exec does not exist
- Could not add rule
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8116 rules, 0 cond rules
- + true
- + allow su_daemon device dir write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z device -o -z dir -o -z write add_name ]
- + echo write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t device -c dir -p write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8116 rules, 0 cond rules
- + allow su_daemon su_device dir create setattr remove_name add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z create setattr remove_name add_name ]
- + echo create setattr remove_name add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p create,setattr,remove_name,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8117 rules, 0 cond rules
- + allow su_daemon su_device sock_file create unlink
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z sock_file -o -z create unlink ]
- + echo create unlink
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c sock_file -p create,unlink -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8118 rules, 0 cond rules
- + allow su_daemon zygote_exec file execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z zygote_exec -o -z file -o -z execute read open execute_no_trans ]
- + echo execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t zygote_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8119 rules, 0 cond rules
- + allow su_daemon su_device dir search write add_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z search write add_name ]
- + echo search write add_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p search,write,add_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8120 rules, 0 cond rules
- + allow su_daemon su_daemon process setexec
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z process -o -z setexec ]
- + echo setexec
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setexec -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8120 rules, 0 cond rules
- + allow su_daemon shell_exec file execute read open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z shell_exec -o -z file -o -z execute read open ]
- + echo execute read open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell_exec -c file -p execute,read,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8120 rules, 0 cond rules
- + allow su_daemon su_daemon capability chown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z chown ]
- + echo chown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p chown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8121 rules, 0 cond rules
- + suDaemonTo su
- + allow su_daemon su process transition
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su -o -z process -o -z transition ]
- + echo transition
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p transition -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8121 rules, 0 cond rules
- + noaudit su_daemon su process siginh rlimitinh noatsecure
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p siginh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8122 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p rlimitinh -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8122 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p noatsecure -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8122 rules, 0 cond rules
- + allowLog su
- + allow su logdw_socket sock_file write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logdw_socket -o -z sock_file -o -z write ]
- + echo write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdw_socket -c sock_file -p write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8122 rules, 0 cond rules
- + allow su logd unix_dgram_socket sendto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logd -o -z unix_dgram_socket -o -z sendto ]
- + echo sendto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_dgram_socket -p sendto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8123 rules, 0 cond rules
- + allow logd su dir search
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z logd -o -z su -o -z dir -o -z search ]
- + echo search
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c dir -p search -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8124 rules, 0 cond rules
- + allow logd su file read open getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z logd -o -z su -o -z file -o -z read open getattr ]
- + echo read open getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c file -p read,open,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8125 rules, 0 cond rules
- + allow su su dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8126 rules, 0 cond rules
- + allow su su unix_dgram_socket create connect write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_dgram_socket -o -z create connect write ]
- + echo create connect write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_dgram_socket -p create,connect,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8127 rules, 0 cond rules
- + allow su su lnk_file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z lnk_file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c lnk_file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8128 rules, 0 cond rules
- + allow su su file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8129 rules, 0 cond rules
- + allow su toolbox_exec file read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z toolbox_exec -o -z file -o -z read ]
- + echo read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p read -P sepolicy
- target type toolbox_exec does not exist
- Could not add rule
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8130 rules, 0 cond rules
- + true
- + allow su devpts chr_file read write open
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z devpts -o -z chr_file -o -z read write open ]
- + echo read write open
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p read,write,open -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8130 rules, 0 cond rules
- + suRights su
- + allow su su_daemon fd use
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z fd -o -z use ]
- + echo use
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c fd -p use -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8131 rules, 0 cond rules
- + allow su su_daemon process sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z process -o -z sigchld ]
- + echo sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c process -p sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8132 rules, 0 cond rules
- + allow su su_daemon unix_stream_socket read write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z read write ]
- + echo read write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p read,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8133 rules, 0 cond rules
- + allow su_daemon su_daemon capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8133 rules, 0 cond rules
- + allow servicemanager su dir search read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z dir -o -z search read ]
- + echo search read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c dir -p search,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8133 rules, 0 cond rules
- + allow servicemanager su file open read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z file -o -z open read ]
- + echo open read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c file -p open,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8134 rules, 0 cond rules
- + allow servicemanager su process getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z process -o -z getattr ]
- + echo getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c process -p getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8135 rules, 0 cond rules
- + allow servicemanager su binder transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z servicemanager -o -z su -o -z binder -o -z transfer ]
- + echo transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c binder -p transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8136 rules, 0 cond rules
- + [ 21 -ge 20 ]
- + allow system_server su binder call
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z system_server -o -z su -o -z binder -o -z call ]
- + echo call
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8137 rules, 0 cond rules
- + allow su shell_exec zygote_exec dalvikcache_data_file rootfs system_file file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_exec zygote_exec dalvikcache_data_file rootfs system_file -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8138 rules, 0 cond rules
- + tr ,
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t zygote_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8139 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8140 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8141 rules, 0 cond rules
- + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8141 rules, 0 cond rules
- + allow su dalvikcache_data_file rootfs system_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8142 rules, 0 cond rules
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8143 rules, 0 cond rules
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8144 rules, 0 cond rules
- + allow su dalvikcache_data_file rootfs system_file dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8145 rules, 0 cond rules
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8146 rules, 0 cond rules
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8147 rules, 0 cond rules
- + [ 21 -ge 23 ]
- + allow su devpts chr_file getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z devpts -o -z chr_file -o -z getattr ioctl ]
- + echo getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8148 rules, 0 cond rules
- + [ 21 -ge 20 ]
- + allow su system_server servicemanager binder call transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z system_server servicemanager -o -z binder -o -z call transfer ]
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_server -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8148 rules, 0 cond rules
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8149 rules, 0 cond rules
- + [ 21 -ge 23 ]
- + [ 21 -ge 20 ]
- + allow su untrusted_app_devpts chr_file read write open getattr ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app_devpts -o -z chr_file -o -z read write open getattr ioctl ]
- + echo read write open getattr ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app_devpts -c chr_file -p read,write,open,getattr,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8150 rules, 0 cond rules
- + allow su su file getattr open read ioctl lock getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans ]
- + echo getattr open read ioctl lock getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8151 rules, 0 cond rules
- + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8151 rules, 0 cond rules
- + allow su su process sigchld setpgid setsched fork signal execmem getsched
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z process -o -z sigchld setpgid setsched fork signal execmem getsched ]
- + echo sigchld setpgid setsched fork signal execmem getsched
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p sigchld,setpgid,setsched,fork,signal,execmem,getsched -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8152 rules, 0 cond rules
- + allow su su fifo_file getattr open read ioctl lock open append write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z fifo_file -o -z getattr open read ioctl lock open append write ]
- + echo getattr open read ioctl lock open append write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8153 rules, 0 cond rules
- + suL0 su
- + suBackL0 su
- + [ 21 -ge 20 ]
- + allow system_server su binder call transfer
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z system_server -o -z su -o -z binder -o -z call transfer ]
- + echo call transfer
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call,transfer -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8153 rules, 0 cond rules
- + allow untrusted_app su unix_stream_socket ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z untrusted_app -o -z su -o -z unix_stream_socket -o -z ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto ]
- + echo ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su -c unix_stream_socket -p ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,connectto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8153 rules, 0 cond rules
- + allow surfaceflinger su process sigchld
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z su -o -z process -o -z sigchld ]
- + echo sigchld
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t su -c process -p sigchld -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8154 rules, 0 cond rules
- + suMiscL0 su
- + allow su su capability sys_nice
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_nice ]
- + echo sys_nice
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_nice -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8155 rules, 0 cond rules
- + suReadLogs su
- + allow su kernel system syslog_read syslog_mod
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z kernel -o -z system -o -z syslog_read syslog_mod ]
- + echo syslog_read syslog_mod
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t kernel -c system -p syslog_read,syslog_mod -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8156 rules, 0 cond rules
- + allow su su capability2 syslog
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability2 -o -z syslog ]
- + echo syslog
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability2 -p syslog -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8157 rules, 0 cond rules
- + [ 21 -ge 20 ]
- + allow su logdr_socket sock_file write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logdr_socket -o -z sock_file -o -z write ]
- + echo write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdr_socket -c sock_file -p write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8158 rules, 0 cond rules
- + allow su logd unix_stream_socket connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z logd -o -z unix_stream_socket -o -z connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_stream_socket -p connectto,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8159 rules, 0 cond rules
- + suNetworkL0 su
- + /tmp/superuser/scripts/bin/sepolicy-inject -a netdomain -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8160 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a bluetoothdomain -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8160 rules, 0 cond rules
- + suL1 su
- + suMiscL1 su
- + allowFSRWX su shell_data_file
- + allowFSRW su shell_data_file
- + allow su shell_data_file dir open getattr read search ioctl open search write add_name remove_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name ]
- + echo open getattr read search ioctl open search write add_name remove_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8160 rules, 0 cond rules
- + allow su shell_data_file file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8161 rules, 0 cond rules
- + allow su shell_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8162 rules, 0 cond rules
- + allow su shell_data_file file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z shell_data_file -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8163 rules, 0 cond rules
- + [ 21 -ge 20 ]
- + [ 21 -ge 23 ]
- + [ 21 -ge 20 ]
- + allowFSR su fuse
- + allow su fuse dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8163 rules, 0 cond rules
- + allow su fuse file getattr open read ioctl lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z file -o -z getattr open read ioctl lock ]
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8164 rules, 0 cond rules
- + allow su fuse lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z fuse -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8165 rules, 0 cond rules
- + allow su su process ptrace
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z process -o -z ptrace ]
- + echo ptrace
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p ptrace -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8166 rules, 0 cond rules
- + suServicesL1 su
- + [ 21 -ge 20 ]
- + allow su servicemanager service_manager list
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z servicemanager -o -z service_manager -o -z list ]
- + echo list
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c service_manager -p list -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8166 rules, 0 cond rules
- + [ 21 -ge 23 ]
- + [ 21 -ge 20 ]
- + allow su =service_manager_type service_manager find
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z =service_manager_type -o -z service_manager -o -z find ]
- + echo find
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t =service_manager_type -c service_manager -p find -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8167 rules, 0 cond rules
- + suNetworkL1 su
- + allow su su netlink_route_socket create setopt bind getattr write nlmsg_read read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z netlink_route_socket -o -z create setopt bind getattr write nlmsg_read read ]
- + echo create setopt bind getattr write nlmsg_read read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p create,setopt,bind,getattr,write,nlmsg_read,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8185 rules, 0 cond rules
- + [ 21 -ge 20 ]
- + allowFSR su net_data_file
- + allow su net_data_file dir open getattr read search ioctl
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z dir -o -z open getattr read search ioctl ]
- + echo open getattr read search ioctl
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8186 rules, 0 cond rules
- + allow su net_data_file file getattr open read ioctl lock
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z file -o -z getattr open read ioctl lock ]
- + echo getattr open read ioctl lock
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8187 rules, 0 cond rules
- + allow su net_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z net_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8188 rules, 0 cond rules
- + true
- + suL3 su
- + suFirewall su
- + suToApps su
- + allow su untrusted_app fifo_file ioctl getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z untrusted_app -o -z fifo_file -o -z ioctl getattr ]
- + echo ioctl getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p ioctl,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8189 rules, 0 cond rules
- + allow su app_data_file dir search getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z app_data_file -o -z dir -o -z search getattr ]
- + echo search getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c dir -p search,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8189 rules, 0 cond rules
- + allow su app_data_file file getattr execute read open execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z app_data_file -o -z file -o -z getattr execute read open execute_no_trans ]
- + echo getattr execute read open execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c file -p getattr,execute,read,open,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8190 rules, 0 cond rules
- + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8191 rules, 0 cond rules
- + allow su su rawip_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z rawip_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c rawip_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8191 rules, 0 cond rules
- + allow su su udp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z udp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c udp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8192 rules, 0 cond rules
- + allow su su tcp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z tcp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
- + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c tcp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8193 rules, 0 cond rules
- + allow su su capability net_raw net_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z net_raw net_admin ]
- + echo net_raw net_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p net_raw,net_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8194 rules, 0 cond rules
- + allow su su netlink_route_socket nlmsg_write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z netlink_route_socket -o -z nlmsg_write ]
- + echo nlmsg_write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p nlmsg_write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8194 rules, 0 cond rules
- + suBind
- + allow su_daemon su_exec file mounton read
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_exec -o -z file -o -z mounton read ]
- + echo mounton read
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_exec -c file -p mounton,read -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8194 rules, 0 cond rules
- + allowFSRWX su_daemon su_device
- + allowFSRW su_daemon su_device
- + allow su_daemon su_device dir open getattr read search ioctl open search write add_name remove_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name ]
- + echo open getattr read search ioctl open search write add_name remove_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8195 rules, 0 cond rules
- + allow su_daemon su_device file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8195 rules, 0 cond rules
- + allow su_daemon su_device lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8196 rules, 0 cond rules
- + allow su_daemon su_device file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8197 rules, 0 cond rules
- + allow su_daemon su_device file relabelfrom
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z su_device -o -z file -o -z relabelfrom ]
- + echo relabelfrom
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p relabelfrom -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8197 rules, 0 cond rules
- + allow su_daemon system_file file relabelto
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su_daemon -o -z system_file -o -z file -o -z relabelto ]
- + echo relabelto
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_file -c file -p relabelto -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8197 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedobject -s su_device -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8198 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su_daemon -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8198 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8198 rules, 0 cond rules
- + [ eng == power -o eng == eng ]
- + suL6 su
- + suBackL6 su
- + allowFSRWX surfaceflinger app_data_file
- + allowFSRW surfaceflinger app_data_file
- + allow surfaceflinger app_data_file dir open getattr read search ioctl open search write add_name remove_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name ]
- + echo open getattr read search ioctl open search write add_name remove_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8198 rules, 0 cond rules
- + allow surfaceflinger app_data_file file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8199 rules, 0 cond rules
- + allow surfaceflinger app_data_file lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8199 rules, 0 cond rules
- + allow surfaceflinger app_data_file file getattr execute execute_no_trans
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr execute execute_no_trans ]
- + echo getattr execute execute_no_trans
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8200 rules, 0 cond rules
- + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s surfaceflinger -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8200 rules, 0 cond rules
- + suL8 su
- + suMiscL8 su
- + allow su system_file file mounton
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z system_file -o -z file -o -z mounton ]
- + echo mounton
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p mounton -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8200 rules, 0 cond rules
- + allow su su capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8200 rules, 0 cond rules
- + suL9 su
- + suMiscL9 su
- + allow su labeledfs filesystem remount unmount
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z labeledfs -o -z filesystem -o -z remount unmount ]
- + echo remount unmount
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t labeledfs -c filesystem -p remount,unmount -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8200 rules, 0 cond rules
- + allow su rootfs filesystem remount
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z rootfs -o -z filesystem -o -z remount ]
- + tr ,
- + echo remount
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c filesystem -p remount -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8201 rules, 0 cond rules
- + allowFSRW su block_device
- + allow su block_device dir open getattr read search ioctl open search write add_name remove_name
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name ]
- + echo open getattr read search ioctl open search write add_name remove_name
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8202 rules, 0 cond rules
- + allow su block_device file getattr open read ioctl lock open append write create setattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
- + echo getattr open read ioctl lock open append write create setattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8203 rules, 0 cond rules
- + allow su block_device lnk_file read getattr
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z lnk_file -o -z read getattr ]
- + echo read getattr
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c lnk_file -p read,getattr -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8204 rules, 0 cond rules
- + allow su block_device blk_file getattr open read ioctl lock open append write
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z block_device -o -z blk_file -o -z getattr open read ioctl lock open append write ]
- + echo getattr open read ioctl lock open append write
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c blk_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8205 rules, 0 cond rules
- + allow su su capability sys_admin
- + addFile sepolicy
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \bsepolicy\b
- + [ -z su -o -z su -o -z capability -o -z sys_admin ]
- + echo sys_admin
- + tr ,
- + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8206 rules, 0 cond rules
- + [ eng == eng ]
- + /tmp/superuser/scripts/bin/sepolicy-inject -Z su -P sepolicy
- libsepol.policydb_index_others: security: 1 users, 2 roles, 663 types, 0 bools
- libsepol.policydb_index_others: security: 1 sens, 1024 cats
- libsepol.policydb_index_others: security: 86 classes, 8206 rules, 0 cond rules
- + sed -i /flash_recovery/a \ disabled init.rc
- + sed -i /on init/a \ chmod 0755 /sbin init.rc
- + echo -e service su /sbin/su --daemon\n\tclass main\n\tseclabel u:r:su_daemon:s0\n
- + addFile init.rc
- + [ -n ]
- + echo sbin/su sepolicy
- + grep -qE \binit.rc\b
- + INITRAMFS_FILES= sbin/su sepolicy init.rc
- + VERSIONED=1
- + [ -n 1 ]
- + [ -f /tmp/superuser/scripts/gitversion ]
- + cat /tmp/superuser/scripts/gitversion
- + rev=d0bb525
- + echo d0bb525
- + addFile super-bootimg
- + [ -n ]
- + echo sbin/su sepolicy init.rc
- + grep -qE \bsuper-bootimg\b
- + INITRAMFS_FILES= sbin/su sepolicy init.rc super-bootimg
- + doneBootImgEdit
- + echo sbin/su sepolicy init.rc super-bootimg
- + tr \n
- + cpio -o -H newc
- + [ -f /tmp/tmp.JvyixM/ramdisk.gz ]
- + cat ramdisk1 ramdisk2
- + gzip -9 -c
- + cd /tmp/tmp.JvyixM
- + rm -Rf /tmp/tmp.wvJKxS
- + /tmp/superuser/scripts/bin/bootimg-repack /mnt/multirom-m8/4.25.654.18/boot.img
- + cp new-boot.img /tmp/superuser/scripts/su
- + cd /tmp/superuser/scripts/su
- + rm -Rf /tmp/tmp.JvyixM
- + [ -f /tmp/superuser/scripts/keystore.x509.pem -a -f /tmp/superuser/scripts/keystore.pk8 ]
- + cleanup
- + rm -Rf /tmp/tmp.JvyixM /tmp/tmp.wvJKxS
- + ui_print Generated /new-boot.img
- + echo ui_print Generated /new-boot.img
- + dd if=new-boot.img of=/dev/block/platform/msm_sdcc.1/by-name/boot bs=8192
- Generated /new-boot.img1520+1 records in
- 1520+1 records out
- 12455936 bytes (11.9MB) copied, 0.096482 seconds, 123.1MB/s
- + ui_print Flashed root-ed boot.img
- + echo ui_print Flashed root-ed boot.img
- Flashed root-ed boot.imgI:Legacy property environment disabled.
- rm: can't remove 'META-INF/com/google/android': No such file or directory
- ZIP successfully installed
- I:Running cmd "rm "/dev/block/mmcblk0p42""
- I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
- Restoring mounts...
- losetup: /dev/block/loop0: No such device or address
- losetup: /dev/block/loop1: No such device or address
- losetup: /dev/block/loop2: No such device or address
- losetup: /dev/block/loop3: No such device or address
- losetup: /dev/block/loop4: No such device or address
- losetup: /dev/block/loop5: No such device or address
- losetup: /dev/block/loop6: No such device or address
- losetup: /dev/block/loop7: No such device or address
- I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
- Updating partition details...
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- I:Data backup size is 3748MB, free: 18833MB.
- I:Unable to mount '/usb_otg'
- I:Actual block device: '', current file system: 'vfat'
- ...done
- I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
- Extracting contents of boot.img...
- I:Running cmd "rm -r "/mnt/multirom-m8/4.25.654.18/boot/"*"
- rm: can't remove '/tmp/boot': No such file or directory
- Ramdisk uses GZIP compression
- 10654 blocks
- I:Running cmd "cp -a /tmp/boot/*.rc "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/default.prop "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/init "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/main_init "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/fstab.* "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/file_contexts "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/property_contexts "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/seapp_contexts "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cp -a /tmp/boot/sepolicy "/mnt/multirom-m8/4.25.654.18/boot/""
- I:Running cmd "cd "/mnt/multirom-m8/4.25.654.18/boot" && rm cmdline ramdisk.gz zImage"
- rm: can't remove 'cmdline': No such file or directory
- rm: can't remove 'ramdisk.gz': No such file or directory
- rm: can't remove 'zImage': No such file or directory
- Injecting boot.img..
- I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/mnt/multirom-m8/4.25.654.18/boot.img" --mrom_dir="/data/media/0/multirom" -f"
- I:Set page: 'multirom_action_complete'
- I:operation_end - status=0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement