Advertisement
Captain_Throwback

MultiROM Superuser #3

Dec 29th, 2015
141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 168.47 KB | None | 0 0
  1. Starting TWRP 2.8.7 on Tue Dec 29 16:53:00 2015
  2. (pid 251)
  3. Setting SELinux to permissive
  4. TW_INCLUDE_DUMLOCK := true
  5. I:Lun file '/sys/devices/msm_dwc3/f9200000.dwc3/gadget/lun0/file'
  6. TW_INCLUDE_CRYPTO := true
  7. I:TW_BRIGHTNESS_PATH := /sys/class/leds/lcd-backlight/brightness
  8. I:Found brightness file at '/sys/class/leds/lcd-backlight/brightness'
  9. I:TWFunc::Set_Brightness: Setting brightness control to 255
  10. Starting the UI...Pixel format: 1080x1920 @ 32bpp
  11. Pixel format: RGBX_8888
  12. Not using qualcomm overlay, 'mdssfb_90000'
  13. framebuffer: fd 4 (1080 x 1920)
  14. minui: /sys/board_properties/virtualkeys.synaptics-rmi-touchscreen is 5 % 6
  15. => Linking mtab
  16. => Processing recovery.fstab
  17. I:Processing '/boot'
  18. I:Processing '/cache'
  19. I:Processing '/data'
  20. I:Processing '/misc'
  21. I:Processing '/recovery'
  22. I:Processing '/system'
  23. I:Processing '/devlog'
  24. I:Created '/devlog' folder.
  25. I:Processing '/carrier'
  26. I:Created '/carrier' folder.
  27. I:Processing '/reserve'
  28. I:Created '/reserve' folder.
  29. I:Processing '/external_sd'
  30. I:Created '/external_sd' folder.
  31. I:Processing '/sd_ext'
  32. I:Created '/sd_ext' folder.
  33. I:Processing '/usb_otg'
  34. I:Created '/usb_otg' folder.
  35. I:Using automatic handling for /data/media emulated storage device.
  36. I:Setting up '/data' as data/media emulated storage.
  37. I:Created '/sdcard' folder.
  38. I:mount -o bind '/data/media' '/sdcard' process ended with RC=0
  39. I:Created '/and-sec' folder.
  40. I:Creating Android Secure: /external_sd/.android_secure
  41. I:mount -o bind '/external_sd/.android_secure' '/and-sec' process ended with RC=0
  42. I:Backup folder set to '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  43. I:Settings storage is '/data/media/0'
  44. Updating partition details...
  45. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  46. I:Data backup size is 2839MB, free: 18084MB.
  47. I:Unable to mount '/usb_otg'
  48. I:Actual block device: '', current file system: 'vfat'
  49. ...done
  50. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  51. I:Unmounting main partitions...
  52.  
  53.  
  54. Partition Logs:
  55. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  56.  
  57. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  58. Primary_Block_Device: /dev/block/mmcblk0p42
  59. Display_Name: Boot
  60. Storage_Name: boot
  61. Backup_Path: /boot
  62. Backup_Name: boot
  63. Backup_Display_Name: Boot
  64. Storage_Path: /boot
  65. Current_File_System: emmc
  66. Fstab_File_System: emmc
  67. Backup_Method: dd
  68.  
  69. /cache | /dev/block/mmcblk0p46 | Size: 377MB Used: 6MB Free: 371MB Backup Size: 6MB Raw size: 402653184
  70.  
  71. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent
  72. Primary_Block_Device: /dev/block/mmcblk0p46
  73. Display_Name: Cache
  74. Storage_Name: Cache
  75. Backup_Path: /cache
  76. Backup_Name: cache
  77. Backup_Display_Name: Cache
  78. Storage_Path: /cache
  79. Current_File_System: ext4
  80. Fstab_File_System: ext4
  81. Backup_Method: files
  82.  
  83. /data | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2839MB Free: 18084MB Backup Size: 2839MB Raw size: 27246198784
  84.  
  85. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  86. Symlink_Path: /data/media/0
  87. Symlink_Mount_Point: /sdcard
  88. Primary_Block_Device: /dev/block/mmcblk0p47
  89. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  90. Display_Name: Data
  91. Storage_Name: Internal Storage
  92. Backup_Path: /data
  93. Backup_Name: data
  94. Backup_Display_Name: Data
  95. Storage_Path: /data/media/0
  96. Current_File_System: ext4
  97. Fstab_File_System: ext4
  98. Backup_Method: files
  99. MTP_Storage_ID: 65539
  100.  
  101. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  102.  
  103. Flags: IsPresent
  104. Primary_Block_Device: /dev/block/mmcblk0p24
  105. Display_Name: misc
  106. Storage_Name: misc
  107. Backup_Path: /misc
  108. Backup_Name: misc
  109. Backup_Display_Name: misc
  110. Storage_Path: /misc
  111. Current_File_System: emmc
  112. Fstab_File_System: emmc
  113. Backup_Method: dd
  114.  
  115. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  116.  
  117. Flags: IsPresent Can_Flash_Img
  118. Primary_Block_Device: /dev/block/mmcblk0p43
  119. Display_Name: Recovery
  120. Storage_Name: recovery
  121. Backup_Path: /recovery
  122. Backup_Name: recovery
  123. Backup_Display_Name: Recovery
  124. Storage_Path: /recovery
  125. Current_File_System: emmc
  126. Fstab_File_System: emmc
  127. Backup_Method: dd
  128.  
  129. /system | /dev/block/mmcblk0p45 | Size: 2641MB Used: 1164MB Free: 1477MB Backup Size: 1164MB Raw size: 2818572288
  130.  
  131. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent
  132. Primary_Block_Device: /dev/block/mmcblk0p45
  133. Display_Name: System
  134. Storage_Name: System
  135. Backup_Path: /system
  136. Backup_Name: system
  137. Backup_Display_Name: System
  138. Storage_Path: /system
  139. Current_File_System: ext4
  140. Fstab_File_System: ext4
  141. Backup_Method: files
  142.  
  143. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  144.  
  145. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  146. Primary_Block_Device: /dev/block/mmcblk0p39
  147. Display_Name: devlog
  148. Storage_Name: devlog
  149. Backup_Path: /devlog
  150. Backup_Name: devlog
  151. Backup_Display_Name: devlog
  152. Storage_Path: /devlog
  153. Current_File_System: ext4
  154. Fstab_File_System: ext4
  155. Backup_Method: files
  156.  
  157. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  158.  
  159. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  160. Primary_Block_Device: /dev/block/mmcblk0p37
  161. Display_Name: carrier
  162. Storage_Name: carrier
  163. Backup_Path: /carrier
  164. Backup_Name: carrier
  165. Backup_Display_Name: carrier
  166. Storage_Path: /carrier
  167. Current_File_System: ext4
  168. Fstab_File_System: ext4
  169. Backup_Method: files
  170.  
  171. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  172.  
  173. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  174. Primary_Block_Device: /dev/block/mmcblk0p41
  175. Display_Name: reserve
  176. Storage_Name: reserve
  177. Backup_Path: /reserve
  178. Backup_Name: reserve
  179. Backup_Display_Name: reserve
  180. Storage_Path: /reserve
  181. Current_File_System: vfat
  182. Fstab_File_System: vfat
  183. Backup_Method: files
  184.  
  185. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 74627MB Free: 14540MB Backup Size: 8MB Raw size: 93503619072
  186.  
  187. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  188. Symlink_Path: /external_sd/.android_secure
  189. Symlink_Mount_Point: /and-sec
  190. Primary_Block_Device: /dev/block/mmcblk1p1
  191. Alternate_Block_Device: /dev/block/mmcblk1
  192. Display_Name: Micro SDcard
  193. Storage_Name: Micro SDcard
  194. Backup_Path: /and-sec
  195. Backup_Name: and-sec
  196. Backup_Display_Name: Android Secure
  197. Storage_Path: /external_sd
  198. Current_File_System: exfat
  199. Fstab_File_System: vfat
  200. Backup_Method: files
  201. MTP_Storage_ID: 65537
  202.  
  203. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  204.  
  205. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  206. Primary_Block_Device: /dev/block/mmcblk1p2
  207. Display_Name: SD-Ext
  208. Storage_Name: SD-Ext
  209. Backup_Path: /sd_ext
  210. Backup_Name: sd_ext
  211. Backup_Display_Name: SD-Ext
  212. Storage_Path: /sd_ext
  213. Current_File_System: ext4
  214. Fstab_File_System: ext4
  215. Backup_Method: files
  216.  
  217. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  218.  
  219. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  220. Primary_Block_Device: /dev/block/sda1
  221. Alternate_Block_Device: /dev/block/sda
  222. Display_Name: USB-OTG
  223. Storage_Name: USB-OTG
  224. Backup_Path: /usb_otg
  225. Backup_Name: usb_otg
  226. Backup_Display_Name: USB-OTG
  227. Storage_Path: /usb_otg
  228. Current_File_System: vfat
  229. Fstab_File_System: vfat
  230. Backup_Method: files
  231. MTP_Storage_ID: 65538
  232.  
  233. MultiROM Recovery version: 2015-12-28 p1
  234. I:Loading package: TWRP (/script/ui.xml)
  235. I:Load XML directly
  236. I:Loading package: TWRP (/data/media/0/TWRP/theme/ui.zip)
  237. I:Loading zip theme
  238. I:Loading package: TWRP (/twres/ui.xml)
  239. I:Load XML directly
  240. I:Checking resolution...
  241. I:Loading resources...
  242. open_png /twres/images/statusbar.png
  243. open_png /twres/images/actionbar.png
  244. open_png /twres/images/actionbar_tab.png
  245. open_png /twres/images/actionbar_ex.png
  246. open_png /twres/images/actionbar_logo.png
  247. open_png /twres/images/actionbar_back.png
  248. open_png /twres/images/actionbar_back_hl.png
  249. open_png /twres/images/actionbar_settings.png
  250. open_png /twres/images/actionbar_settings_hl.png
  251. open_png /twres/images/actionbar_overflow.png
  252. open_png /twres/images/actionbar_overflow_hl.png
  253. open_png /twres/images/actionbar_pin.png
  254. open_png /twres/images/actionbar_pin_hl.png
  255. open_png /twres/images/actionbar_pinned.png
  256. open_png /twres/images/actionbar_pinned_hl.png
  257. open_png /twres/images/actionbar_refresh.png
  258. open_png /twres/images/actionbar_refresh_hl.png
  259. open_png /twres/images/actionbar_sort.png
  260. open_png /twres/images/actionbar_sort_hl.png
  261. open_png /twres/images/actionbar_reset.png
  262. open_png /twres/images/actionbar_reset_hl.png
  263. open_png /twres/images/actionbar_font_big.png
  264. open_png /twres/images/actionbar_font_big_hl.png
  265. open_png /twres/images/actionbar_font_small.png
  266. open_png /twres/images/actionbar_font_small_hl.png
  267. open_png /twres/images/actionbar_theme.png
  268. open_png /twres/images/actionbar_theme_hl.png
  269. open_png /twres/images/actionbar_encr_dis.png
  270. open_png /twres/images/actionbar_encr_dis_hl.png
  271. open_png /twres/images/actionbar_encr_ena.png
  272. open_png /twres/images/actionbar_encr_ena_hl.png
  273. open_png /twres/images/actionbar_delete.png
  274. open_png /twres/images/actionbar_delete_hl.png
  275. open_png /twres/images/actionbar_edit.png
  276. open_png /twres/images/actionbar_edit_hl.png
  277. open_png /twres/images/actionbar_close.png
  278. open_png /twres/images/actionbar_close_hl.png
  279. open_png /twres/images/btn_float_addtoqueue.png
  280. open_png /twres/images/btn_float_addtoqueue_hl.png
  281. open_png /twres/images/btn_float_flashifyinfo.png
  282. open_png /twres/images/btn_float_flashifyinfo_hl.png
  283. open_png /twres/images/btn_float_accept.png
  284. open_png /twres/images/btn_float_folder.png
  285. open_png /twres/images/btn_menu_zip.png
  286. open_png /twres/images/btn_menu_zip_sel.png
  287. open_png /twres/images/btn_menu_img.png
  288. open_png /twres/images/btn_menu_img_sel.png
  289. open_png /twres/images/btn_menu_name_a.png
  290. open_png /twres/images/btn_menu_name_a_sel.png
  291. open_png /twres/images/btn_menu_name_d.png
  292. open_png /twres/images/btn_menu_name_d_sel.png
  293. open_png /twres/images/btn_menu_date_a.png
  294. open_png /twres/images/btn_menu_date_a_sel.png
  295. open_png /twres/images/btn_menu_date_d.png
  296. open_png /twres/images/btn_menu_date_d_sel.png
  297. open_png /twres/images/btn_menu_size_a.png
  298. open_png /twres/images/btn_menu_size_a_sel.png
  299. open_png /twres/images/btn_menu_size_d.png
  300. open_png /twres/images/btn_menu_size_d_sel.png
  301. open_png /twres/images/btn_menu_inject.png
  302. open_png /twres/images/btn_menu_settings.png
  303. open_png /twres/images/btn_flat_less.png
  304. open_png /twres/images/btn_flat_more.png
  305. open_png /twres/images/btn_flat_ext3.png
  306. open_png /twres/images/btn_flat_ext4.png
  307. open_png /twres/images/btn_flat_installdumlock.png
  308. open_png /twres/images/btn_flat_reflashrecovery.png
  309. open_png /twres/images/btn_flat_restoreboot.png
  310. open_png /twres/images/btn_flat_injectbootsector.png
  311. open_png /twres/images/btn_flat_rot0.png
  312. open_png /twres/images/btn_flat_rot90.png
  313. open_png /twres/images/btn_flat_rot180.png
  314. open_png /twres/images/btn_flat_rot270.png
  315. open_png /twres/images/btn_raised_clearqueue.png
  316. open_png /twres/images/btn_raised_viewqueue.png
  317. open_png /twres/images/btn_raised_installscript.png
  318. open_png /twres/images/btn_raised_wipecaches.png
  319. open_png /twres/images/btn_raised_rebootsystem.png
  320. open_png /twres/images/btn_raised_rebootrecovery.png
  321. open_png /twres/images/btn_raised_formatdata.png
  322. open_png /twres/images/btn_raised_filesystem.png
  323. open_png /twres/images/btn_raised_fsoptions.png
  324. open_png /twres/images/btn_raised_fsrepair.png
  325. open_png /twres/images/btn_raised_fschange.png
  326. open_png /twres/images/btn_raised_fsresize.png
  327. open_png /twres/images/btn_raised_keepreadonly.png
  328. open_png /twres/images/btn_raised_disconnect.png
  329. open_png /twres/images/btn_raised_advancedwipe.png
  330. open_png /twres/images/btn_raised_back.png
  331. open_png /twres/images/btn_raised_decryptdata.png
  332. open_png /twres/images/btn_raised_enablemtp.png
  333. open_png /twres/images/btn_raised_disablemtp.png
  334. open_png /twres/images/btn_raised_usbstorage.png
  335. open_png /twres/images/btn_raised_cancel.png
  336. open_png /twres/images/btn_raised_noinstall.png
  337. open_png /twres/images/btn_raised_changetheme.png
  338. open_png /twres/images/btn_raised_changesplash.png
  339. open_png /twres/images/btn_raised_wipeencryption.png
  340. open_png /twres/images/btn_raised_mr_addrom.png
  341. open_png /twres/images/btn_raised_mr_swaproms.png
  342. open_png /twres/images/btn_raised_mr_delete.png
  343. open_png /twres/images/btn_raised_mr_rename.png
  344. open_png /twres/images/btn_raised_mr_backup.png
  345. open_png /twres/images/btn_raised_mr_wipedata.png
  346. open_png /twres/images/btn_raised_mr_wipedalvik.png
  347. open_png /twres/images/btn_raised_mr_wipecache.png
  348. open_png /twres/images/btn_raised_mr_addboot.png
  349. open_png /twres/images/btn_raised_mr_remboot.png
  350. open_png /twres/images/btn_raised_mr_addradio.png
  351. open_png /twres/images/btn_raised_mr_remradio.png
  352. open_png /twres/images/btn_raised_mr_flashzip.png
  353. open_png /twres/images/btn_raised_mr_sideload.png
  354. open_png /twres/images/btn_raised_mr_repatchinit.png
  355. open_png /twres/images/btn_raised_mr_next.png
  356. open_png /twres/images/btn_raised_mr_zipfile.png
  357. open_png /twres/images/btn_raised_mr_addfile.png
  358. open_png /twres/images/btn_raised_mr_selectimage.png
  359. open_png /twres/images/btn_raised_mr_restorecon.png
  360. open_png /twres/images/btn_appenddate.png
  361. open_png /twres/images/clr_red.png
  362. open_png /twres/images/clr_pink.png
  363. open_png /twres/images/clr_indigo.png
  364. open_png /twres/images/clr_blue.png
  365. open_png /twres/images/clr_lightblue.png
  366. open_png /twres/images/clr_teal.png
  367. open_png /twres/images/clr_green.png
  368. open_png /twres/images/clr_lightgreen.png
  369. open_png /twres/images/clr_lime.png
  370. open_png /twres/images/clr_amber.png
  371. open_png /twres/images/clr_orange.png
  372. open_png /twres/images/clr_deeporange.png
  373. open_png /twres/images/clr_brown.png
  374. open_png /twres/images/clr_grey.png
  375. open_png /twres/images/clr_bluegrey.png
  376. open_png /twres/images/background.png
  377. open_png /twres/images/divider.png
  378. open_png /twres/images/divider_list.png
  379. open_png /twres/images/divider_wide.png
  380. open_png /twres/images/hider_ab_ex.png
  381. open_png /twres/images/dialog_bg.png
  382. open_png /twres/images/dialog_label_storage.png
  383. open_png /twres/images/dialog_label_bookmark.png
  384. open_png /twres/images/dialog_label_restoresettings.png
  385. open_png /twres/images/dialog_label_settheme.png
  386. open_png /twres/images/dialog_label_color.png
  387. open_png /twres/images/dialog_label_encryption.png
  388. open_png /twres/images/dialog_label_decryption.png
  389. open_png /twres/images/dialog_label_offset.png
  390. open_png /twres/images/dialog_label_removetheme.png
  391. open_png /twres/images/dialog_label_warning.png
  392. open_png /twres/images/menu_install.png
  393. open_png /twres/images/menu_sort.png
  394. open_png /twres/images/db_ok.png
  395. open_png /twres/images/db_ok_hl.png
  396. open_png /twres/images/db_cancel.png
  397. open_png /twres/images/db_cancel_hl.png
  398. open_png /twres/images/bs_bg.png
  399. open_png /twres/images/bs_btn_copy.png
  400. open_png /twres/images/bs_btn_cut.png
  401. open_png /twres/images/bs_btn_chmod755.png
  402. open_png /twres/images/bs_btn_chmod644.png
  403. open_png /twres/images/bs_btn_chmod.png
  404. open_png /twres/images/bs_btn_delete.png
  405. open_png /twres/images/bs_btn_rename.png
  406. open_png /twres/images/bs_close.png
  407. open_png /twres/images/bc_install.png
  408. open_png /twres/images/bc_install_zip.png
  409. open_png /twres/images/bc_install_zip_m.png
  410. open_png /twres/images/bc_install_image.png
  411. open_png /twres/images/bc_install_image_m.png
  412. open_png /twres/images/bc_wipe.png
  413. open_png /twres/images/bc_backup.png
  414. open_png /twres/images/bc_restore.png
  415. open_png /twres/images/bc_mount.png
  416. open_png /twres/images/bc_advanced.png
  417. open_png /twres/images/bc_filemanager.png
  418. open_png /twres/images/bc_restart.png
  419. open_png /twres/images/bc_confirmaction.png
  420. open_png /twres/images/bc_working.png
  421. open_png /twres/images/bc_done.png
  422. open_png /twres/images/bc_settings.png
  423. open_png /twres/images/bc_settings_theme.png
  424. open_png /twres/images/bc_terminal.png
  425. open_png /twres/images/bc_sideload.png
  426. open_png /twres/images/bc_installsu.png
  427. open_png /twres/images/bc_about.png
  428. open_png /twres/images/bc_partsdcard.png
  429. open_png /twres/images/bc_dumlock.png
  430. open_png /twres/images/bc_multirom.png
  431. open_png /twres/images/bc_multiromsettings.png
  432. open_png /twres/images/mb_empty.png
  433. open_png /twres/images/mb_empty_s.png
  434. open_png /twres/images/mb_install.png
  435. open_png /twres/images/mb_wipe.png
  436. open_png /twres/images/mb_backup.png
  437. open_png /twres/images/mb_restore.png
  438. open_png /twres/images/mb_mount.png
  439. open_png /twres/images/mb_filemanager.png
  440. open_png /twres/images/mb_advanced.png
  441. open_png /twres/images/mb_restart.png
  442. open_png /twres/images/mb_system.png
  443. open_png /twres/images/mb_recovery.png
  444. open_png /twres/images/mb_bootloader.png
  445. open_png /twres/images/mb_theme.png
  446. open_png /twres/images/mb_poweroff.png
  447. open_png /twres/images/mb_download.png
  448. open_png /twres/images/mb_logtosd.png
  449. open_png /twres/images/mb_fixpermissions.png
  450. open_png /twres/images/mb_terminalcommand.png
  451. open_png /twres/images/mb_adbsideload.png
  452. open_png /twres/images/mb_dumlock.png
  453. open_png /twres/images/mb_reinjecttwrp.png
  454. open_png /twres/images/mb_partsdcard.png
  455. open_png /twres/images/mb_multirom.png
  456. open_png /twres/images/mb_install_color.png
  457. open_png /twres/images/mb_wipe_color.png
  458. open_png /twres/images/mb_backup_color.png
  459. open_png /twres/images/mb_restore_color.png
  460. open_png /twres/images/mb_mount_color.png
  461. open_png /twres/images/mb_filemanager_color.png
  462. open_png /twres/images/mb_advanced_color.png
  463. open_png /twres/images/mb_restart_color.png
  464. open_png /twres/images/mb_system_color.png
  465. open_png /twres/images/mb_recovery_color.png
  466. open_png /twres/images/mb_bootloader_color.png
  467. open_png /twres/images/mb_theme_color.png
  468. open_png /twres/images/mb_poweroff_color.png
  469. open_png /twres/images/mb_download_color.png
  470. open_png /twres/images/mb_logtosd_color.png
  471. open_png /twres/images/mb_fixpermissions_color.png
  472. open_png /twres/images/mb_terminalcommand_color.png
  473. open_png /twres/images/mb_adbsideload_color.png
  474. open_png /twres/images/mb_dumlock_color.png
  475. open_png /twres/images/mb_reinjecttwrp_color.png
  476. open_png /twres/images/mb_partsdcard_color.png
  477. open_png /twres/images/mb_multirom_color.png
  478. open_png /twres/images/icon_info.png
  479. open_png /twres/images/icon_warning.png
  480. open_png /twres/images/icon_person.png
  481. open_png /twres/images/icon_mail.png
  482. open_png /twres/images/icon_palette.png
  483. open_png /twres/images/icon_cake.png
  484. open_png /twres/images/icon_color.png
  485. open_png /twres/images/icon_confirm.png
  486. open_png /twres/images/file.png
  487. open_png /twres/images/folder.png
  488. open_png /twres/images/unlock_icon.png
  489. open_png /twres/images/folder_mr.png
  490. open_png /twres/images/indeterminate001.png
  491. open_png /twres/images/indeterminate002.png
  492. open_png /twres/images/indeterminate003.png
  493. open_png /twres/images/indeterminate004.png
  494. open_png /twres/images/indeterminate005.png
  495. open_png /twres/images/indeterminate006.png
  496. open_png /twres/images/indeterminate007.png
  497. open_png /twres/images/indeterminate008.png
  498. open_png /twres/images/indeterminate009.png
  499. open_png /twres/images/indeterminate010.png
  500. open_png /twres/images/indeterminate011.png
  501. open_png /twres/images/indeterminate012.png
  502. open_png /twres/images/indeterminate013.png
  503. open_png /twres/images/indeterminate014.png
  504. open_png /twres/images/indeterminate015.png
  505. open_png /twres/images/indeterminate016.png
  506. open_png /twres/images/indeterminate017.png
  507. open_png /twres/images/indeterminate018.png
  508. open_png /twres/images/indeterminate019.png
  509. open_png /twres/images/indeterminate020.png
  510. open_png /twres/images/indeterminate021.png
  511. open_png /twres/images/indeterminate022.png
  512. open_png /twres/images/indeterminate023.png
  513. open_png /twres/images/indeterminate024.png
  514. open_png /twres/images/indeterminate025.png
  515. open_png /twres/images/progress_empty.png
  516. open_png /twres/images/progress_fill.png
  517. open_png /twres/images/checkbox_false.png
  518. open_png /twres/images/checkbox_true.png
  519. open_png /twres/images/checkbox_false_d.png
  520. open_png /twres/images/checkbox_true_d.png
  521. open_png /twres/images/radio_false.png
  522. open_png /twres/images/radio_true.png
  523. open_png /twres/images/radio_false_d.png
  524. open_png /twres/images/radio_true_d.png
  525. open_png /twres/images/home.png
  526. open_png /twres/images/home_hl.png
  527. open_png /twres/images/back.png
  528. open_png /twres/images/back_hl.png
  529. open_png /twres/images/slideout.png
  530. open_png /twres/images/slideout_hl.png
  531. open_png /twres/images/slider.png
  532. open_png /twres/images/slider_used.png
  533. open_png /twres/images/slider_lock.png
  534. open_png /twres/images/slider_lock_used.png
  535. open_png /twres/images/slider_lock_handle.png
  536. open_png /twres/images/handle.png
  537. open_png /twres/images/handle_h.png
  538. open_png /twres/images/keyboard1.png
  539. open_png /twres/images/keyboard2.png
  540. open_png /twres/images/keyboard3.png
  541. open_png /twres/images/keyboard4.png
  542. open_png /twres/images/keyboard_shadow.png
  543. open_png /twres/images/usb.png
  544. open_png /twres/images/input_line.png
  545. open_png /twres/images/input_line_dialog.png
  546. open_png /twres/images/input_line_fail_backupname.png
  547. open_png /twres/images/input_line_fail_dialog_encr.png
  548. open_png /twres/images/input_line_fail_decr.png
  549. open_png /twres/images/input_line_fail_romname.png
  550. open_png /twres/images/tab_misc.png
  551. open_png /twres/images/tab_misc_a.png
  552. open_png /twres/images/tab_display.png
  553. open_png /twres/images/tab_display_a.png
  554. open_png /twres/images/tab_time.png
  555. open_png /twres/images/tab_time_a.png
  556. open_png /twres/images/tab_vibration.png
  557. open_png /twres/images/tab_vibration_a.png
  558. open_png /twres/images/tab_mr_bootmenu.png
  559. open_png /twres/images/tab_mr_bootmenu_a.png
  560. open_png /twres/images/tab_mr_autoboot.png
  561. open_png /twres/images/tab_mr_autoboot_a.png
  562. open_png /twres/images/cursor.png
  563. I:Loading variables...
  564. I:Loading mouse cursor...
  565. I:Loading pages...
  566. I:PageSet::CheckInclude loading filename: '/twres/light_mr.xml'
  567. I:Loading included resources...
  568. I:Loading included variables...
  569. I:Loading mouse cursor...
  570. I:Loading included pages...
  571. I:Loading page main
  572. I:Loading page main2
  573. I:Loading page settings
  574. I:Loading page timezone
  575. I:Loading page screen
  576. I:Loading page vibrate
  577. I:Loading page theme_settings
  578. I:Loading page theme_color
  579. I:Loading page set_color
  580. I:Loading page theme_swap
  581. I:Loading page theme_splash
  582. I:Loading page theme_splash_info
  583. I:Loading page theme_splash_select_img
  584. I:Loading page theme_splash_select_jpg
  585. I:Loading page theme_splash_flash
  586. I:Loading page theme_splash_flash_done
  587. I:Loading page install
  588. I:Loading page install_image
  589. I:Loading page flash_confirm
  590. I:Loading page queueview
  591. I:Loading page flash_aromafm_confirm
  592. I:Loading page flash_image_confirm
  593. I:Loading page flash_image_confirm_f
  594. I:Loading page flash_image_info
  595. I:Loading page add_zip
  596. I:Loading page flash_zip
  597. I:Loading page flash_image
  598. I:Loading page flash_done
  599. I:Loading page flash_image_done
  600. I:Loading page clear_vars
  601. I:Loading page confirm_action
  602. I:Loading page action_page
  603. I:Loading page singleaction_page
  604. I:Loading page action_complete
  605. I:Loading page reboot
  606. I:Loading page filecheck
  607. I:Loading page themecheck
  608. I:Loading page rebootcheck
  609. I:Loading page wipe
  610. I:Loading page advancedwipe
  611. I:Loading page formatdata
  612. I:Loading page formatdata_confirm
  613. I:Loading page checkpartitionlist
  614. I:Loading page partitionoptions
  615. I:Loading page refreshfilesystem
  616. I:Loading page selectfilesystem
  617. I:Loading page wipe_confirm_action
  618. I:Loading page wipe_action_page
  619. I:Loading page wipe_action_complete
  620. I:Loading page backup
  621. I:Loading page backupname1
  622. I:Loading page backupname2
  623. I:Loading page checkbackuppassword
  624. I:Loading page backup_run
  625. I:Loading page backup_action_complete
  626. I:Loading page restore
  627. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  628. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  629. I:Loading page restore_read
  630. I:Loading page restore_decrypt
  631. I:Loading page try_restore_decrypt
  632. I:Loading page restore_select
  633. I:Loading page renamebackup
  634. I:Loading page deletebackup
  635. I:Loading page restore_run
  636. I:Loading page restore_confirm_action
  637. I:Loading page restore_action_page
  638. I:Loading page restore_action_complete
  639. I:Loading page mount
  640. I:Loading page usb_mount
  641. I:Loading page usb_umount
  642. I:Loading page system_readonly_check
  643. I:Loading page system_readonly
  644. I:Loading page decrypt
  645. I:Loading page decrypt_pattern
  646. I:Loading page trydecrypt
  647. I:Loading page filemanagerlist
  648. I:Loading page filemanageroptions
  649. I:Loading page choosedestinationfolder
  650. I:Loading page filemanagerrenamefile
  651. I:Loading page filemanagerrenamefolder
  652. I:Loading page filemanagerchmod
  653. I:Loading page filemanagerconfirm
  654. I:Loading page filemanageraction
  655. I:Loading page filemanagercomplete
  656. I:Loading page advanced
  657. I:Loading page fixpermissions
  658. I:Loading page partsdcard
  659. I:Loading page htcdumlock
  660. I:Loading page terminalfolder
  661. I:Loading page terminalcommand
  662. I:Loading page sideload
  663. I:Loading page installsu
  664. I:Loading page lock
  665. I:Loading page about
  666. I:Loading page console
  667. I:Loading page menu_install
  668. I:Loading page menu_sort
  669. I:Loading page dialog_storage
  670. I:Loading page dialog_color
  671. I:Loading page dialog_encryption1
  672. I:Loading page dialog_encryption2
  673. I:Loading page dialog_folder
  674. I:Loading page dialog_settheme
  675. I:Loading page dialog_offset
  676. I:Loading page dialog_reset
  677. I:Loading page dialog_reset_theme
  678. I:Loading page dialog_remove_theme
  679. I:Loading page dialog_warning
  680. I:Loading page multirom_msg
  681. I:Loading page multirom_main
  682. I:Loading page multirom_list
  683. I:Unable to open ''
  684. I:Loading page multirom_manage
  685. I:Loading page multirom_manage_inject_select
  686. I:Loading page multirom_manage_flash_select
  687. I:Loading page multirom_manage_flash_confirm
  688. I:Loading page multirom_manage_confirm_action
  689. I:Loading page multirom_rename
  690. I:Loading page multirom_do_rename
  691. I:Loading page multirom_settings
  692. I:Loading page multirom_settings_autoboot
  693. I:Loading page multirom_settings_rename_internal
  694. I:Loading page multirom_inject
  695. I:Loading page multirom_inject_select
  696. I:Loading page multirom_add
  697. I:Loading page multirom_add_sailfish
  698. I:Loading page multirom_add_source
  699. I:Loading page multirom_add_select
  700. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  701. I:Unable to open '/data/media/0/TWRP/BACKUPS/HT444SF01255'
  702. I:Loading page multirom_add_start_process
  703. I:Loading page multirom_add_confirm_action
  704. I:Loading page multirom_add_image_size
  705. I:Loading page multirom_change_img_size
  706. I:Loading page multirom_confirm_action
  707. I:Loading page multirom_action_page
  708. I:Loading page multirom_action_complete
  709. I:Loading page multirom_sideload_complete
  710. I:Loading page multirom_swap
  711. I:Loading page multirom_swap_set_internal_name
  712. I:Loading page multirom_swap_space_info
  713. I:Loading page multirom_set_list_loc
  714. I:Loading page menu_multirom
  715. I:Loading page dialog_storage_mr
  716. I:Set page: 'clear_vars'
  717. I:Set page: 'main2'
  718. I:Switching packages (TWRP)
  719. SELinux contexts loaded from /file_contexts
  720. Full SELinux support is present.
  721. Startup Commands:
  722. ro.com.google.clientidbase=android-google
  723. ro.com.android.dateformat=MM-dd-yyyy
  724. ro.com.android.dataroaming=true
  725. ro.com.android.wifi-watchlist=GoogleGuest
  726. ro.ril.oem.ecclist=911
  727. ro.ril.set.mtusize=1422
  728. ro.ril.svdo=true
  729. ro.ril.hsdpa.category=14
  730. ro.ril.hsxpa=4
  731. ro.ril.enable.a53=1
  732. ro.ril.enable.sdr=0
  733. ro.ril.enable.gea3=1
  734. ro.ril.enable.r8fd=1
  735. ro.ril.disable.fd.plmn.prefix=23402,23410,23411,23420
  736. ro.ril.disable.cpc=1
  737. ro.url.legal=http://www.google.com/intl/%s/mobile/android/basic/phone-legal.html
  738. ro.boot.dq=PASS
  739. ro.boot.lb=1
  740. ro.boot.cid=22222222
  741. ro.boot.mid=0P6B70000
  742. ro.boot.emmc=true
  743. ro.boot.mode=recovery
  744. ro.boot.podt=0x3E8
  745. ro.boot.engid=0
  746. ro.boot.ddrmid=(0x1)
  747. ro.boot.carrier=COMMON
  748. ro.boot.keycaps=qwerty
  749. ro.boot.selinux=permissive
  750. ro.boot.baseband=1.09.20.0209
  751. ro.boot.hardware=qcom
  752. ro.boot.pagesize=2048
  753. ro.boot.rom_type=NORMAL
  754. ro.boot.serialno=HT444SF01255
  755. ro.boot.devicerev=5
  756. ro.boot.bootloader=3.19.0.0000
  757. ro.boot.efuse_info=SL
  758. ro.boot.batt_poweron=good_battery
  759. ro.cdma.home.operator.alpha=Sprint
  760. ro.cdma.home.operator.numeric=310120
  761. ro.hwui.path_cache_size=32
  762. ro.hwui.layer_cache_size=48
  763. ro.hwui.texture_cache_size=72
  764. ro.hwui.gradient_cache_size=1
  765. ro.hwui.r_buffer_cache_size=8
  766. ro.hwui.drop_shadow_cache_size=6
  767. ro.hwui.text_large_cache_width=2048
  768. ro.hwui.text_small_cache_width=1024
  769. ro.hwui.text_large_cache_height=1024
  770. ro.hwui.text_small_cache_height=1024
  771. ro.hwui.texture_cache_flushrate=0.4
  772. ro.omni.device=m8
  773. ro.omni.version=5.1.1-20151228-m8-HOMEMADE
  774. ro.twrp.boot=1
  775. ro.twrp.version=2.8.7
  776. ro.wifi.channels=
  777. ro.allow.mock.location=1
  778. ro.board.platform=msm8974
  779. ro.build.id=LYZ28J
  780. ro.build.date=Mon Dec 28 12:44:00 EST 2015
  781. ro.build.date.utc=0
  782. ro.build.host=QuadCore-SSD-BuildBox
  783. ro.build.tags=test-keys
  784. ro.build.type=eng
  785. ro.build.user=throwback
  786. ro.build.flavor=omni_m8-eng
  787. ro.build.display.id=omni_m8-eng 5.1.1 LYZ28J eng.throwback.20151228.124337 test-keys
  788. ro.build.product=m8
  789. ro.build.version.sdk=22
  790. ro.build.version.base_os=
  791. ro.build.version.release=5.1.1
  792. ro.build.version.codename=REL
  793. ro.build.version.incremental=eng.throwback.20151228.124337
  794. ro.build.version.all_codenames=REL
  795. ro.build.version.security_patch=2015-11-01
  796. ro.build.description=4.20.651.10 CL476182 release-keys
  797. ro.build.fingerprint=htc/sprint_wwe/htc_m8whl:5.0.1/LRX22C/476182.10:user/release-keys
  798. ro.build.characteristics=default
  799. ro.config.ringtone=Orion.ogg
  800. ro.config.alarm_alert=Argon.ogg
  801. ro.config.notification_sound=pixiedust.ogg
  802. ro.dalvik.vm.native.bridge=0
  803. ro.kernel.android.checkjni=1
  804. ro.secure=0
  805. ro.zygote=zygote32
  806. ro.carrier=unknown
  807. ro.product.cpu.abi=armeabi-v7a
  808. ro.product.cpu.abi2=armeabi
  809. ro.product.cpu.abilist=armeabi-v7a,armeabi
  810. ro.product.cpu.abilist32=armeabi-v7a,armeabi
  811. ro.product.cpu.abilist64=
  812. ro.product.board=MSM8974
  813. ro.product.brand=htc
  814. ro.product.model=831C
  815. ro.product.device=htc_m8whl
  816. ro.product.locale.region=US
  817. ro.product.locale.language=en
  818. ro.product.manufacturer=htc
  819. ro.baseband=1.09.20.0209
  820. ro.bootmode=recovery
  821. ro.hardware=qcom
  822. ro.revision=0
  823. ro.serialno=HT444SF01255
  824. ro.9kramdump=0
  825. ro.telephony.ril_class=m8sprRIL
  826. ro.telephony.default_network=8
  827. ro.telephony.default_cdma_sub=1
  828. ro.alarm_boot=false
  829. ro.bootloader=3.19.0.0000
  830. ro.debuggable=1
  831. ro.modversion=OmniROM-5.1.1-20151228-m8-HOMEMADE
  832. ro.factorytest=0
  833. ro.setupwizard.enterprise_mode=1
  834. gsm.sim.operator.alpha=Sprint
  835. gsm.sim.operator.numeric=310120
  836. gsm.operator.alpha=310120
  837. gsm.operator.numeric=310120
  838. net.bt.name=Android
  839. net.change=net.bt.name
  840. init.svc.adbd=running
  841. init.svc.healthd=running
  842. init.svc.ueventd=running
  843. init.svc.recovery=running
  844. init.svc.chargeled=running
  845. init.svc.choice_fn=stopped
  846. init.svc.set_permissive=stopped
  847. rild.libargs=-d /dev/smd0
  848. twrp.crash_counter=0
  849. dalvik.vm.isa.arm.features=div
  850. dalvik.vm.dex2oat-Xms=64m
  851. dalvik.vm.dex2oat-Xmx=512m
  852. dalvik.vm.dex2oat-filter=interpret-only
  853. dalvik.vm.stack-trace-file=/data/anr/traces.txt
  854. dalvik.vm.image-dex2oat-Xms=64m
  855. dalvik.vm.image-dex2oat-Xmx=64m
  856. dalvik.vm.image-dex2oat-filter=verify-none
  857. persist.sys.usb.config=adb
  858. persist.sys.dalvik.vm.lib.2=libart.so
  859. persist.sys.root_access=1
  860. persist.radio.snapshot_timer=22
  861. persist.radio.snapshot_enabled=1
  862. service.adb.root=1
  863. keyguard.no_require_sim=true
  864. telephony.sms.pseudo_multipart=1
  865. telephony.lteOnCdmaDevice=1
  866.  
  867. I:Copying file /cache/recovery/log to /cache/recovery/last_log
  868. tw_get_context got selinux context: u:object_r:media_rw_data_file:s0
  869. I:Got default contexts and file mode for storage files.
  870. I:Attempt to load settings from settings file...
  871. I:Loading settings from '/data/media/0/TWRP/.twrps'.
  872. I:Backup folder set to '/external_sd/TWRP/BACKUPS/HT444SF01255'
  873. I:Copying file /etc/recovery.fstab to /cache/recovery/recovery.fstab
  874. I:Version number saved to '/cache/recovery/.version'
  875. I:Unable to mount '/usb_otg'
  876. I:Actual block device: '', current file system: 'vfat'
  877. I:TWFunc::Set_Brightness: Setting brightness control to 114
  878. I:TWFunc::Fixup_Time: Pre-fix date and time: 2015-12-29--11-53-05
  879. I:TWFunc::Fixup_Time: Setting time offset from file /sys/class/rtc/rtc0/since_epoch
  880. I:TWFunc::Fixup_Time: Date and time corrected: 2015-12-29--11-53-05
  881. I:Enabling MTP during startup
  882. I:Starting MTP
  883. Starting MTP
  884. I:Get_Max_FileSize::maxFileSize: 17592186044416
  885. I:sending message to add 65539 '/data/media/0' 'Internal Storage'
  886. I:Message sent, add storage ID: 65539
  887. I:Get_Max_FileSize::maxFileSize: 18014398509481984
  888. I:sending message to add 65537 '/external_sd' 'Micro SDcard'
  889. I:Message sent, add storage ID: 65537
  890. MTP Enabled
  891. I:Switching packages (TWRP)
  892. created new mtpserver object
  893. MtpServer::run fd: 20
  894. mtppipe add storage 65539 '/data/media/0'
  895. MtpStorage id: 65539 path: /data/media/0
  896. mtppipe add storage 65537 '/external_sd'
  897. MtpStorage id: 65537 path: /external_sd
  898. I:Set page: 'multirom_main'
  899. I:Set page: 'multirom_list'
  900. I:Set page: 'multirom_add'
  901. I:Set page: 'multirom_add_source'
  902. I:Set page: 'multirom_add_select'
  903. I:MROMInstaller: base folder: data (min: 150MB def: 1024MB)
  904. I:MROMInstaller: base folder: system (min: 450MB def: 2688MB)
  905. I:MROMInstaller: base folder: cache (min: 50MB def: 436MB)
  906. I:Set page: 'multirom_add_start_process'
  907. I:Set page: 'multirom_add_confirm_action'
  908. I:Set page: 'multirom_action_page'
  909. I:operation_start: 'Installing'
  910. Installing ROM M8_GPE_5.07.1700.8_stock_C...
  911. Creating folders and images for type 1
  912. I:Running cmd "chcon u:object_r:system_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/system";chcon u:object_r:system_data_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/data";chcon u:object_r:cache_file:s0 "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/cache";"
  913. Flashing ZIP file /external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip
  914. ROM: M8_GPE_5.07.1700.8_stock_C
  915. Preparing ZIP file...
  916. rm: can't remove '/tmp/mr_update.zip': No such file or directory
  917. I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
  918. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
  919. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
  920. I:ZIP size limit for /tmp: 779.50 MB
  921. Copying ZIP to /tmp...
  922. I:Running cmd "cp "/external_sd/01_ROM/GPE/M8_GPE_5.07.1700.8_stock_CDMA_Edition_CPTB.zip" /tmp/mr_update.zip"
  923. I:Running cmd "cd /tmp && zip "/tmp/mr_update.zip" META-INF/com/google/android/updater-script"
  924. updating: META-INF/com/google/android/updater-script (deflated 69%)
  925. Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
  926. I:sending message to remove 65539
  927. I:Message sent, remove storage ID: 65539
  928. mtppipe remove storage 65539
  929. I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
  930. I:Processing '/data_t'
  931. I:Created '/data_t' folder.
  932. I:Processing '/system'
  933. I:Processing '/cache'
  934. I:Recreating /cache/recovery folder.
  935.  
  936.  
  937. Partition Logs:
  938. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  939.  
  940. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  941. Primary_Block_Device: /dev/block/mmcblk0p42
  942. Display_Name: Boot
  943. Storage_Name: boot
  944. Backup_Path: /boot
  945. Backup_Name: boot
  946. Backup_Display_Name: Boot
  947. Storage_Path: /boot
  948. Current_File_System: emmc
  949. Fstab_File_System: emmc
  950. Backup_Method: dd
  951.  
  952. /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2839MB Free: 18084MB Backup Size: 2839MB Raw size: 27246198784
  953.  
  954. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  955. Symlink_Path: /realdata/media/0
  956. Symlink_Mount_Point: /sdcard
  957. Primary_Block_Device: /dev/block/mmcblk0p47
  958. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  959. Display_Name: Realdata
  960. Storage_Name: Internal Storage
  961. Backup_Path: /data
  962. Backup_Name: data
  963. Backup_Display_Name: Data
  964. Storage_Path: /realdata/media/0
  965. Current_File_System: ext4
  966. Fstab_File_System: ext4
  967. Backup_Method: files
  968. MTP_Storage_ID: 65539
  969.  
  970. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  971.  
  972. Flags: IsPresent
  973. Primary_Block_Device: /dev/block/mmcblk0p24
  974. Display_Name: misc
  975. Storage_Name: misc
  976. Backup_Path: /misc
  977. Backup_Name: misc
  978. Backup_Display_Name: misc
  979. Storage_Path: /misc
  980. Current_File_System: emmc
  981. Fstab_File_System: emmc
  982. Backup_Method: dd
  983.  
  984. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  985.  
  986. Flags: IsPresent Can_Flash_Img
  987. Primary_Block_Device: /dev/block/mmcblk0p43
  988. Display_Name: Recovery
  989. Storage_Name: recovery
  990. Backup_Path: /recovery
  991. Backup_Name: recovery
  992. Backup_Display_Name: Recovery
  993. Storage_Path: /recovery
  994. Current_File_System: emmc
  995. Fstab_File_System: emmc
  996. Backup_Method: dd
  997.  
  998. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  999.  
  1000. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1001. Primary_Block_Device: /dev/block/mmcblk0p39
  1002. Display_Name: devlog
  1003. Storage_Name: devlog
  1004. Backup_Path: /devlog
  1005. Backup_Name: devlog
  1006. Backup_Display_Name: devlog
  1007. Storage_Path: /devlog
  1008. Current_File_System: ext4
  1009. Fstab_File_System: ext4
  1010. Backup_Method: files
  1011.  
  1012. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  1013.  
  1014. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1015. Primary_Block_Device: /dev/block/mmcblk0p37
  1016. Display_Name: carrier
  1017. Storage_Name: carrier
  1018. Backup_Path: /carrier
  1019. Backup_Name: carrier
  1020. Backup_Display_Name: carrier
  1021. Storage_Path: /carrier
  1022. Current_File_System: ext4
  1023. Fstab_File_System: ext4
  1024. Backup_Method: files
  1025.  
  1026. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  1027.  
  1028. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1029. Primary_Block_Device: /dev/block/mmcblk0p41
  1030. Display_Name: reserve
  1031. Storage_Name: reserve
  1032. Backup_Path: /reserve
  1033. Backup_Name: reserve
  1034. Backup_Display_Name: reserve
  1035. Storage_Path: /reserve
  1036. Current_File_System: vfat
  1037. Fstab_File_System: vfat
  1038. Backup_Method: files
  1039.  
  1040. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 74627MB Free: 14540MB Backup Size: 8MB Raw size: 93503619072
  1041.  
  1042. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  1043. Symlink_Path: /external_sd/.android_secure
  1044. Symlink_Mount_Point: /and-sec
  1045. Primary_Block_Device: /dev/block/mmcblk1p1
  1046. Alternate_Block_Device: /dev/block/mmcblk1
  1047. Display_Name: Micro SDcard
  1048. Storage_Name: Micro SDcard
  1049. Backup_Path: /and-sec
  1050. Backup_Name: and-sec
  1051. Backup_Display_Name: Android Secure
  1052. Storage_Path: /external_sd
  1053. Current_File_System: exfat
  1054. Fstab_File_System: vfat
  1055. Backup_Method: files
  1056. MTP_Storage_ID: 65537
  1057.  
  1058. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  1059.  
  1060. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  1061. Primary_Block_Device: /dev/block/mmcblk1p2
  1062. Display_Name: SD-Ext
  1063. Storage_Name: SD-Ext
  1064. Backup_Path: /sd_ext
  1065. Backup_Name: sd_ext
  1066. Backup_Display_Name: SD-Ext
  1067. Storage_Path: /sd_ext
  1068. Current_File_System: ext4
  1069. Fstab_File_System: ext4
  1070. Backup_Method: files
  1071.  
  1072. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1073.  
  1074. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  1075. Primary_Block_Device: /dev/block/sda1
  1076. Alternate_Block_Device: /dev/block/sda
  1077. Display_Name: USB-OTG
  1078. Storage_Name: USB-OTG
  1079. Backup_Path: /usb_otg
  1080. Backup_Name: usb_otg
  1081. Backup_Display_Name: USB-OTG
  1082. Storage_Path: /usb_otg
  1083. Current_File_System: vfat
  1084. Fstab_File_System: vfat
  1085. Backup_Method: files
  1086. MTP_Storage_ID: 65538
  1087.  
  1088. /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1089.  
  1090. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
  1091. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
  1092. Display_Name: Data
  1093. Storage_Name: data_t
  1094. Backup_Path: /data
  1095. Backup_Name: data
  1096. Backup_Display_Name: Data
  1097. Storage_Path: /data_t
  1098. Current_File_System: ext4
  1099. Fstab_File_System: ext4
  1100. Bind_Of: /realdata
  1101. Backup_Method: files
  1102.  
  1103. /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1104.  
  1105. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1106. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
  1107. Display_Name: System
  1108. Storage_Name: System
  1109. Backup_Path: /system
  1110. Backup_Name: system
  1111. Backup_Display_Name: System
  1112. Storage_Path: /system
  1113. Current_File_System: ext4
  1114. Fstab_File_System: ext4
  1115. Bind_Of: /realdata
  1116. Backup_Method: files
  1117.  
  1118. /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1119.  
  1120. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1121. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
  1122. Display_Name: Cache
  1123. Storage_Name: Cache
  1124. Backup_Path: /cache
  1125. Backup_Name: cache
  1126. Backup_Display_Name: Cache
  1127. Storage_Path: /cache
  1128. Current_File_System: ext4
  1129. Fstab_File_System: ext4
  1130. Bind_Of: /realdata
  1131. Backup_Method: files
  1132.  
  1133. I:Running cmd "dd if="/dev/block/mmcblk0p42" of="/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img""
  1134. 32768+0 records in
  1135. 32768+0 records out
  1136. 16777216 bytes (16.0MB) copied, 0.632143 seconds, 25.3MB/s
  1137. Current boot sector was used as base for fake boot.img!
  1138. I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
  1139. I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
  1140. I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
  1141. ZIP uses block updates
  1142. Creating system.img...
  1143. I:Creating image with cmd: make_ext4fs -l 2720M -a "/system" -S /file_contexts "/realdata/media/0/multirom/system.img"
  1144. Creating filesystem with parameters:
  1145. Size: 2852126720
  1146. Block size: 4096
  1147. Blocks per group: 32768
  1148. Inodes per group: 7920
  1149. Inode size: 256
  1150. Journal blocks: 10880
  1151. Label:
  1152. Blocks: 696320
  1153. Block groups: 22
  1154. Reserved block group size: 175
  1155. Created filesystem with 11/174240 inodes and 22879/696320 blocks
  1156. I:Running cmd "losetup "/dev/block/loop0" "/realdata/media/0/multirom/system.img""
  1157. I:Running cmd "mv "/dev/block/mmcblk0p45" "/dev/block/mmcblk0p45-orig" && ln -s "/dev/block/loop0" "/dev/block/mmcblk0p45""
  1158. I:Running cmd "rm "/realdata/media/0/multirom/system.img""
  1159. I:Running cmd "echo "/dev/block/mmcblk0p45" > /tmp/mrom_fakesyspart"
  1160. Installing '/tmp/mr_update.zip'...
  1161. Checking for MD5 file...
  1162. Skipping MD5 check: no MD5 file found
  1163. I:Zip contains SELinux file_contexts file in its root. Extracting to /file_contexts
  1164. I:Legacy property environment initialized.
  1165.  
  1166.  
  1167.  
  1168. M8 GPE 5.07.1700.8 stock - CDMA Edition Installer
  1169. Built with SuperR's Kitchen
  1170.  
  1171.  
  1172.  
  1173.  
  1174.  
  1175. minzip: Extracted 2 file(s)
  1176.  
  1177. about to run program [/tmp/install/bin/backuptool.sh] with 2 args
  1178.  
  1179. Extracting system...
  1180.  
  1181. blockimg version is 1
  1182. erasing 688128 blocks
  1183. writing 247628 blocks of new data
  1184. wrote 247628 blocks; expected 247628
  1185. max alloc needed was 0
  1186. about to run program [/sbin/sh] with 3 args
  1187. chattr: stat /system/*: No such file or directory
  1188. about to run program [/tmp/install/bin/backuptool.sh] with 2 args
  1189.  
  1190.  
  1191. Extracting boot image...
  1192.  
  1193. M8 GPE 5.07.1700.8 stock - CDMA Edition Installed
  1194. script succeeded: result was [M8 GPE 5.07.1700.8 stock - CDMA Edition Installed]I:Legacy property environment disabled.
  1195. rm: can't remove 'META-INF/com/google/android': No such file or directory
  1196. ZIP successfully installed
  1197. I:Running cmd "busybox umount -d /tmpsystem"
  1198. I:Running cmd "rm "/dev/block/mmcblk0p45""
  1199. I:Running cmd "mv "/dev/block/mmcblk0p45"-orig "/dev/block/mmcblk0p45""
  1200. I:Running cmd "rm "/dev/block/mmcblk0p42""
  1201. I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
  1202. Restoring mounts...
  1203. losetup: /dev/block/loop0: No such device or address
  1204. losetup: /dev/block/loop1: No such device or address
  1205. losetup: /dev/block/loop2: No such device or address
  1206. losetup: /dev/block/loop3: No such device or address
  1207. losetup: /dev/block/loop4: No such device or address
  1208. losetup: /dev/block/loop5: No such device or address
  1209. losetup: /dev/block/loop6: No such device or address
  1210. losetup: /dev/block/loop7: No such device or address
  1211. I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
  1212. Updating partition details...
  1213. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  1214. I:Data backup size is 2839MB, free: 17102MB.
  1215. I:sending message to remove 65539
  1216. mtppipe remove storage 65539
  1217. I:Message sent, remove storage ID: 65539
  1218. I:Unable to mount '/usb_otg'
  1219. I:Actual block device: '', current file system: 'vfat'
  1220. ...done
  1221. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  1222. Extracting contents of boot.img...
  1223. I:Running cmd "rm -r "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/"*"
  1224. rm: can't remove '/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/*': No such file or directory
  1225. rm: can't remove '/tmp/boot': No such file or directory
  1226. Ramdisk uses GZIP compression
  1227. 4444 blocks
  1228. I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1229. I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1230. I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1231. I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1232. cp: can't stat '/tmp/boot/main_init': No such file or directory
  1233. I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1234. I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1235. I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1236. I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1237. I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1238. I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1239. I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1240. I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1241. cp: can't stat '/tmp/boot/cache': No such file or directory
  1242. I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1243. I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1244. I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/""
  1245. cp: can't stat '/tmp/boot//cache': No such file or directory
  1246. I:Running cmd "mv "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/init" "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot/main_init""
  1247. I:Running cmd "cd "/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
  1248. rm: can't remove 'cmdline': No such file or directory
  1249. rm: can't remove 'ramdisk.gz': No such file or directory
  1250. rm: can't remove 'zImage': No such file or directory
  1251. Injecting boot.img..
  1252. I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms//M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
  1253. I:Set page: 'multirom_action_complete'
  1254. I:operation_end - status=0
  1255. I:Set page: 'clear_vars'
  1256. I:Set page: 'multirom_add'
  1257. I:Set page: 'multirom_main'
  1258. I:Set page: 'multirom_list'
  1259. I:Set page: 'multirom_manage'
  1260. I:Set page: 'multirom_manage_flash_select'
  1261. I:Set page: 'multirom_manage_flash_confirm'
  1262. I:Set page: 'multirom_action_page'
  1263. I:operation_start: 'Flashing'
  1264. Flashing ZIP file /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
  1265. ROM: M8_GPE_5.07.1700.8_stock_C
  1266. Preparing ZIP file...
  1267. rm: can't remove '/tmp/mr_update.zip': No such file or directory
  1268. I:Running cmd "mkdir -p /tmp/META-INF/com/google/android/"
  1269. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/META-INF/com/google/android/updater-script
  1270. About to execute:sed -i s/range_sha1.*(.*\/dev\/block\/.*).*==.*".*"/\/sbin\/true/ /tmp/mrom_last_updater_script
  1271. No need to change ZIP.
  1272. Changing mounts to ROM M8_GPE_5.07.1700.8_stock_C...
  1273. I:sending message to remove 65539
  1274. I:Message sent, remove storage ID: 65539
  1275. mtppipe remove storage 65539
  1276. I:mount -o bind '/realdata/media/0' '/sdcard' process ended with RC=0
  1277. I:Processing '/data_t'
  1278. I:Processing '/system'
  1279. I:Processing '/cache'
  1280.  
  1281.  
  1282. Partition Logs:
  1283. /boot | /dev/block/mmcblk0p42 | Size: 16MB Raw size: 0
  1284.  
  1285. Flags: Can_Be_Backed_Up IsPresent Can_Flash_Img
  1286. Primary_Block_Device: /dev/block/mmcblk0p42
  1287. Display_Name: Boot
  1288. Storage_Name: boot
  1289. Backup_Path: /boot
  1290. Backup_Name: boot
  1291. Backup_Display_Name: Boot
  1292. Storage_Path: /boot
  1293. Current_File_System: emmc
  1294. Fstab_File_System: emmc
  1295. Backup_Method: dd
  1296.  
  1297. /realdata | /dev/block/mmcblk0p47 | Size: 25532MB Used: 2839MB Free: 17102MB Backup Size: 2839MB Raw size: 27246198784
  1298.  
  1299. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Can_Be_Encrypted Has_Data_Media Can_Encrypt_Backup Use_Userdata_Encryption Is_Storage Is_Settings_Storage
  1300. Symlink_Path: /realdata/media/0
  1301. Symlink_Mount_Point: /sdcard
  1302. Primary_Block_Device: /dev/block/mmcblk0p47
  1303. Crypto_Key_Location: /dev/block/platform/msm_sdcc.1/by-name/extra
  1304. Display_Name: Realdata
  1305. Storage_Name: Internal Storage
  1306. Backup_Path: /data
  1307. Backup_Name: data
  1308. Backup_Display_Name: Data
  1309. Storage_Path: /realdata/media/0
  1310. Current_File_System: ext4
  1311. Fstab_File_System: ext4
  1312. Backup_Method: files
  1313. MTP_Storage_ID: 65539
  1314.  
  1315. /misc | /dev/block/mmcblk0p24 | Size: 1MB Raw size: 0
  1316.  
  1317. Flags: IsPresent
  1318. Primary_Block_Device: /dev/block/mmcblk0p24
  1319. Display_Name: misc
  1320. Storage_Name: misc
  1321. Backup_Path: /misc
  1322. Backup_Name: misc
  1323. Backup_Display_Name: misc
  1324. Storage_Path: /misc
  1325. Current_File_System: emmc
  1326. Fstab_File_System: emmc
  1327. Backup_Method: dd
  1328.  
  1329. /recovery | /dev/block/mmcblk0p43 | Size: 24MB Raw size: 0
  1330.  
  1331. Flags: IsPresent Can_Flash_Img
  1332. Primary_Block_Device: /dev/block/mmcblk0p43
  1333. Display_Name: Recovery
  1334. Storage_Name: recovery
  1335. Backup_Path: /recovery
  1336. Backup_Name: recovery
  1337. Backup_Display_Name: Recovery
  1338. Storage_Path: /recovery
  1339. Current_File_System: emmc
  1340. Fstab_File_System: emmc
  1341. Backup_Method: dd
  1342.  
  1343. /devlog | /dev/block/mmcblk0p39 | Size: 29MB Used: 26MB Free: 3MB Backup Size: 26MB Raw size: 31457280
  1344.  
  1345. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1346. Primary_Block_Device: /dev/block/mmcblk0p39
  1347. Display_Name: devlog
  1348. Storage_Name: devlog
  1349. Backup_Path: /devlog
  1350. Backup_Name: devlog
  1351. Backup_Display_Name: devlog
  1352. Storage_Path: /devlog
  1353. Current_File_System: ext4
  1354. Fstab_File_System: ext4
  1355. Backup_Method: files
  1356.  
  1357. /carrier | /dev/block/mmcblk0p37 | Size: 24MB Used: 10MB Free: 14MB Backup Size: 10MB Raw size: 26214400
  1358.  
  1359. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1360. Primary_Block_Device: /dev/block/mmcblk0p37
  1361. Display_Name: carrier
  1362. Storage_Name: carrier
  1363. Backup_Path: /carrier
  1364. Backup_Name: carrier
  1365. Backup_Display_Name: carrier
  1366. Storage_Path: /carrier
  1367. Current_File_System: ext4
  1368. Fstab_File_System: ext4
  1369. Backup_Method: files
  1370.  
  1371. /reserve | /dev/block/mmcblk0p41 | Size: 45MB Used: 9MB Free: 36MB Backup Size: 9MB Raw size: 48128000
  1372.  
  1373. Flags: Can_Be_Mounted Can_Be_Wiped IsPresent
  1374. Primary_Block_Device: /dev/block/mmcblk0p41
  1375. Display_Name: reserve
  1376. Storage_Name: reserve
  1377. Backup_Path: /reserve
  1378. Backup_Name: reserve
  1379. Backup_Display_Name: reserve
  1380. Storage_Path: /reserve
  1381. Current_File_System: vfat
  1382. Fstab_File_System: vfat
  1383. Backup_Method: files
  1384.  
  1385. /external_sd | /dev/block/mmcblk1p1 | Size: 89168MB Used: 74627MB Free: 14540MB Backup Size: 8MB Raw size: 93503619072
  1386.  
  1387. Flags: Can_Be_Mounted Can_Be_Wiped Can_Be_Backed_Up Wipe_Available_in_GUI Removable IsPresent Has_Android_Secure Is_Storage
  1388. Symlink_Path: /external_sd/.android_secure
  1389. Symlink_Mount_Point: /and-sec
  1390. Primary_Block_Device: /dev/block/mmcblk1p1
  1391. Alternate_Block_Device: /dev/block/mmcblk1
  1392. Display_Name: Micro SDcard
  1393. Storage_Name: Micro SDcard
  1394. Backup_Path: /and-sec
  1395. Backup_Name: and-sec
  1396. Backup_Display_Name: Android Secure
  1397. Storage_Path: /external_sd
  1398. Current_File_System: exfat
  1399. Fstab_File_System: vfat
  1400. Backup_Method: files
  1401. MTP_Storage_ID: 65537
  1402.  
  1403. /sd_ext | /dev/block/mmcblk1p2 | Size: 32205MB Used: 6261MB Free: 25943MB Backup Size: 6261MB Raw size: 34359738368
  1404.  
  1405. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable IsPresent
  1406. Primary_Block_Device: /dev/block/mmcblk1p2
  1407. Display_Name: SD-Ext
  1408. Storage_Name: SD-Ext
  1409. Backup_Path: /sd_ext
  1410. Backup_Name: sd_ext
  1411. Backup_Display_Name: SD-Ext
  1412. Storage_Path: /sd_ext
  1413. Current_File_System: ext4
  1414. Fstab_File_System: ext4
  1415. Backup_Method: files
  1416.  
  1417. /usb_otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1418.  
  1419. Flags: Can_Be_Mounted Can_Be_Wiped Wipe_Available_in_GUI Removable Is_Storage
  1420. Primary_Block_Device: /dev/block/sda1
  1421. Alternate_Block_Device: /dev/block/sda
  1422. Display_Name: USB-OTG
  1423. Storage_Name: USB-OTG
  1424. Backup_Path: /usb_otg
  1425. Backup_Name: usb_otg
  1426. Backup_Display_Name: USB-OTG
  1427. Storage_Path: /usb_otg
  1428. Current_File_System: vfat
  1429. Fstab_File_System: vfat
  1430. Backup_Method: files
  1431. MTP_Storage_ID: 65538
  1432.  
  1433. /data | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1434.  
  1435. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up IsPresent Ignore_Blkid
  1436. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/data
  1437. Display_Name: Data
  1438. Storage_Name: data_t
  1439. Backup_Path: /data
  1440. Backup_Name: data
  1441. Backup_Display_Name: Data
  1442. Storage_Path: /data_t
  1443. Current_File_System: ext4
  1444. Fstab_File_System: ext4
  1445. Bind_Of: /realdata
  1446. Backup_Method: files
  1447.  
  1448. /system | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1449.  
  1450. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1451. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/system
  1452. Display_Name: System
  1453. Storage_Name: System
  1454. Backup_Path: /system
  1455. Backup_Name: system
  1456. Backup_Display_Name: System
  1457. Storage_Path: /system
  1458. Current_File_System: ext4
  1459. Fstab_File_System: ext4
  1460. Bind_Of: /realdata
  1461. Backup_Method: files
  1462.  
  1463. /cache | /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB Raw size: 0
  1464.  
  1465. Flags: Can_Be_Mounted Can_Be_Wiped Use_Rm_Rf Can_Be_Backed_Up Wipe_During_Factory_Reset Wipe_Available_in_GUI IsPresent Ignore_Blkid
  1466. Primary_Block_Device: /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/cache
  1467. Display_Name: Cache
  1468. Storage_Name: Cache
  1469. Backup_Path: /cache
  1470. Backup_Name: cache
  1471. Backup_Display_Name: Cache
  1472. Storage_Path: /cache
  1473. Current_File_System: ext4
  1474. Fstab_File_System: ext4
  1475. Bind_Of: /realdata
  1476. Backup_Method: files
  1477.  
  1478. I:Running cmd "echo '/dev/block/mmcblk0p42' > /tmp/mrom_fakebootpart"
  1479. I:Running cmd "mv "/dev/block/mmcblk0p42" "/dev/block/mmcblk0p42-orig""
  1480. I:Running cmd "ln -s "/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" "/dev/block/mmcblk0p42""
  1481. Installing '/external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip'...
  1482. Checking for MD5 file...
  1483. Skipping MD5 check: no MD5 file found
  1484. I:Zip does not contain SELinux file_contexts file in its root.
  1485. I:Legacy property environment initialized.
  1486. + fd=24
  1487. + zip=/external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
  1488. + rm -Rf /tmp/superuser
  1489. + mkdir -p /tmp/superuser
  1490. + unzip -o /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip -d /tmp/superuser/
  1491. Archive: /external_sd/06_Tools/Root/phh_seSuperuser/superuser-tmp.zip
  1492. creating: scripts/
  1493. inflating: scripts/bootimg.sh
  1494. inflating: scripts/.gitignore
  1495. creating: scripts/su/
  1496. inflating: scripts/su/changes.sh
  1497. inflating: scripts/su/su-communication.sh
  1498. inflating: scripts/su/rights.sh
  1499. inflating: scripts/README.md
  1500. inflating: scripts/gitversion
  1501. creating: scripts/keystore_tools/
  1502. inflating: scripts/keystore_tools/README
  1503. inflating: scripts/keystore_tools/make_key
  1504. inflating: scripts/keystore_tools/BootKeystoreSigner.jar
  1505. inflating: scripts/keystore_tools/BootSignature.jar
  1506. creating: scripts/havealoha/
  1507. inflating: scripts/havealoha/changes.sh
  1508. creating: scripts/bin/
  1509. inflating: scripts/bin/su-x86
  1510. inflating: scripts/bin/sepolicy-inject
  1511. inflating: scripts/bin/bootimg-repack
  1512. inflating: scripts/bin/su-arm
  1513. inflating: scripts/bin/strip-cpio
  1514. inflating: scripts/bin/bootimg-extract
  1515. inflating: config.txt
  1516. creating: META-INF/
  1517. creating: META-INF/com/
  1518. creating: META-INF/com/google/
  1519. creating: META-INF/com/google/android/
  1520. inflating: META-INF/com/google/android/updater-script
  1521. inflating: META-INF/com/google/android/update-binary
  1522. + cat /tmp/superuser/config.txt
  1523. + modes=eng verity crypt
  1524. + cd /tmp/superuser/scripts/su/
  1525. + fstab=/etc/recovery.fstab
  1526. + [ ! -f /etc/recovery.fstab ]
  1527. + fstab=/etc/recovery.fstab.bak
  1528. + grep -E \b/boot\b /etc/recovery.fstab.bak
  1529. + grep -oE /dev/[a-zA-Z0-9_./-]*
  1530. + bootimg=/dev/block/platform/msm_sdcc.1/by-name/boot
  1531. + [ -z /dev/block/platform/msm_sdcc.1/by-name/boot ]
  1532. + ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
  1533. + echo ui_print Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot
  1534. + sh -x ../bootimg.sh /dev/block/platform/msm_sdcc.1/by-name/boot eng verity crypt
  1535. Found bootimg @ /dev/block/platform/msm_sdcc.1/by-name/boot+ export TMPDIR=/tmp/
  1536. + which mktemp
  1537. /sbin/mktemp
  1538. + [ 4 == 0 ]
  1539. + set -e
  1540. + [ -f eng ]
  1541. + scr=/tmp/superuser/scripts/su/changes.sh
  1542. + trap cleanup EXIT
  1543. + readlink -f ../bootimg.sh
  1544. + dirname /tmp/superuser/scripts/bootimg.sh
  1545. + scriptdir=/tmp/superuser/scripts
  1546. + chmod 0755 /tmp/superuser/scripts/bin/sepolicy-inject
  1547. + chmod 0755 /tmp/superuser/scripts/bin/bootimg-repack
  1548. + chmod 0755 /tmp/superuser/scripts/bin/bootimg-extract
  1549. + [[ toto2 =~ toto ]]
  1550. sh: =~: unknown operand
  1551. + r_file_perms=getattr open read ioctl lock
  1552. + x_file_perms=getattr execute execute_no_trans
  1553. + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1554. + w_file_perms=open append write
  1555. + rw_file_perms=getattr open read ioctl lock open append write
  1556. + rwx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1557. + rw_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  1558. + create_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  1559. + rw_stream_socket_perms=ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  1560. + create_stream_socket_perms=create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  1561. + r_dir_perms=open getattr read search ioctl
  1562. + w_dir_perms=open search write add_name remove_name
  1563. + ra_dir_perms=open getattr read search ioctl add name write
  1564. + rw_dir_perms=open getattr read search ioctl open search write add_name remove_name
  1565. + create_dir_perms=create reparent rename rmdir setattr open getattr read search ioctl open search write add_name remove_name
  1566. + startBootImgEdit /dev/block/platform/msm_sdcc.1/by-name/boot
  1567. + readlink -f /dev/block/platform/msm_sdcc.1/by-name/boot
  1568. + f=/realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  1569. + homedir=/tmp/superuser/scripts/su
  1570. + mktemp -d
  1571. + bootimg_extract=/tmp/tmp.d38AAY
  1572. + cd /tmp/tmp.d38AAY
  1573. + /tmp/superuser/scripts/bin/bootimg-extract /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  1574. + mktemp -d
  1575. + d2=/tmp/tmp.Etg5oQ
  1576. + cd /tmp/tmp.Etg5oQ
  1577. + [ -f /tmp/tmp.d38AAY/ramdisk.gz ]
  1578. + gunzip -c
  1579. + cpio -i
  1580. 11039 blocks
  1581. + gunzip -c
  1582. + INITRAMFS_FILES=
  1583. + file init
  1584. ../bootimg.sh: line 1: file: not found
  1585. + grep -q Intel
  1586. + DST_ARCH=arm
  1587. + /tmp/superuser/scripts/bin/sepolicy-inject -e -s gatekeeper_service -P sepolicy
  1588. libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
  1589. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1590. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1591. + ANDROID=23
  1592. + shift
  1593. + [ -n ]
  1594. + . /tmp/superuser/scripts/su/changes.sh
  1595. + dirname /tmp/superuser/scripts/su/changes.sh
  1596. + . /tmp/superuser/scripts/su/su-communication.sh
  1597. + dirname /tmp/superuser/scripts/su/changes.sh
  1598. + . /tmp/superuser/scripts/su/rights.sh
  1599. + r_file_perms=getattr open read ioctl lock
  1600. + x_file_perms=getattr execute execute_no_trans
  1601. + rx_file_perms=getattr open read ioctl lock getattr execute execute_no_trans
  1602. + w_file_perms=open append write
  1603. + cp /tmp/superuser/scripts/bin/su-arm sbin/su
  1604. + addFile sbin/su
  1605. + [ -n ]
  1606. + echo
  1607. + grep -qE \bsbin/su\b
  1608. + INITRAMFS_FILES= sbin/su
  1609. + chmod 0755 sbin/su
  1610. + selinuxmode=user
  1611. + noverity=0
  1612. + nocrypt=0
  1613. + adb=0
  1614. + [ 3 -ge 1 ]
  1615. + selinuxmode=eng
  1616. + shift
  1617. + [ 2 -ge 1 ]
  1618. + noverity=0
  1619. + shift
  1620. + [ 1 -ge 1 ]
  1621. + nocrypt=0
  1622. + shift
  1623. + [ 0 -ge 1 ]
  1624. + [ -f sepolicy ]
  1625. + /tmp/superuser/scripts/bin/sepolicy-inject -z su -P sepolicy
  1626. source type su does not exist: 0,1007
  1627. libsepol.policydb_index_others: security: 1 users, 2 roles, 1006 types, 0 bools
  1628. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1629. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1630. libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
  1631. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1632. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1633. + /tmp/superuser/scripts/bin/sepolicy-inject -z su_device -P sepolicy
  1634. source type su_device does not exist: 0,1008
  1635. libsepol.policydb_index_others: security: 1 users, 2 roles, 1007 types, 0 bools
  1636. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1637. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1638. libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
  1639. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1640. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1641. + /tmp/superuser/scripts/bin/sepolicy-inject -z su_daemon -P sepolicy
  1642. source type su_daemon does not exist: 0,1009
  1643. libsepol.policydb_index_others: security: 1 users, 2 roles, 1008 types, 0 bools
  1644. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1645. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1646. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1647. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1648. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1649. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy
  1650. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1651. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1652. libsepol.policydb_index_others: security: 87 classes, 9677 rules, 0 cond rules
  1653. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -f device -c dir -t su_device -P sepolicy
  1654. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1655. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1656. libsepol.policydb_index_others: security: 87 classes, 9678 rules, 0 cond rules
  1657. + allow su_device tmpfs filesystem associate
  1658. + addFile sepolicy
  1659. + [ -n ]
  1660. + echo sbin/su
  1661. + grep -qE \bsepolicy\b
  1662. + INITRAMFS_FILES= sbin/su sepolicy
  1663. + [ -z su_device -o -z tmpfs -o -z filesystem -o -z associate ]
  1664. + echo associate
  1665. + tr ,
  1666. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_device -t tmpfs -c filesystem -p associate -P sepolicy
  1667. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1668. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1669. libsepol.policydb_index_others: security: 87 classes, 9679 rules, 0 cond rules
  1670. + allowSuClient shell
  1671. + allow shell rootfs file execute_no_trans execute
  1672. + addFile sepolicy
  1673. + [ -n ]
  1674. + echo sbin/su sepolicy
  1675. + grep -qE \bsepolicy\b
  1676. + [ -z shell -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1677. + echo execute_no_trans execute
  1678. + tr ,
  1679. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1680. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1681. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1682. libsepol.policydb_index_others: security: 87 classes, 9680 rules, 0 cond rules
  1683. + allow shell su_daemon unix_stream_socket connectto getopt
  1684. + addFile sepolicy
  1685. + [ -n ]
  1686. + echo sbin/su sepolicy
  1687. + grep -qE \bsepolicy\b
  1688. + [ -z shell -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1689. + echo connectto getopt
  1690. + tr ,
  1691. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1692. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1693. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1694. libsepol.policydb_index_others: security: 87 classes, 9681 rules, 0 cond rules
  1695. + allow shell su_device dir search read
  1696. + addFile sepolicy
  1697. + [ -n ]
  1698. + echo sbin/su sepolicy
  1699. + grep -qE \bsepolicy\b
  1700. + [ -z shell -o -z su_device -o -z dir -o -z search read ]
  1701. + echo search read
  1702. + tr ,
  1703. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c dir -p search,read -P sepolicy
  1704. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1705. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1706. libsepol.policydb_index_others: security: 87 classes, 9682 rules, 0 cond rules
  1707. + allow shell su_device sock_file read write
  1708. + addFile sepolicy
  1709. + [ -n ]
  1710. + echo sbin/su sepolicy
  1711. + grep -qE \bsepolicy\b
  1712. + [ -z shell -o -z su_device -o -z sock_file -o -z read write ]
  1713. + echo read write
  1714. + tr ,
  1715. + /tmp/superuser/scripts/bin/sepolicy-inject -s shell -t su_device -c sock_file -p read,write -P sepolicy
  1716. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1717. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1718. libsepol.policydb_index_others: security: 87 classes, 9683 rules, 0 cond rules
  1719. + allow su_daemon shell fd use
  1720. + addFile sepolicy
  1721. + [ -n ]
  1722. + echo sbin/su sepolicy
  1723. + grep -qE \bsepolicy\b
  1724. + [ -z su_daemon -o -z shell -o -z fd -o -z use ]
  1725. + echo use
  1726. + tr ,
  1727. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fd -p use -P sepolicy
  1728. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1729. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1730. libsepol.policydb_index_others: security: 87 classes, 9684 rules, 0 cond rules
  1731. + allow su_daemon shell fifo_file read write getattr ioctl
  1732. + addFile sepolicy
  1733. + [ -n ]
  1734. + echo sbin/su sepolicy
  1735. + grep -qE \bsepolicy\b
  1736. + [ -z su_daemon -o -z shell -o -z fifo_file -o -z read write getattr ioctl ]
  1737. + echo read write getattr ioctl
  1738. + tr ,
  1739. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  1740. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1741. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1742. libsepol.policydb_index_others: security: 87 classes, 9685 rules, 0 cond rules
  1743. + allow su_daemon shell dir search
  1744. + addFile sepolicy
  1745. + [ -n ]
  1746. + echo sbin/su sepolicy
  1747. + grep -qE \bsepolicy\b
  1748. + [ -z su_daemon -o -z shell -o -z dir -o -z search ]
  1749. + echo search
  1750. + tr ,
  1751. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c dir -p search -P sepolicy
  1752. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1753. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1754. libsepol.policydb_index_others: security: 87 classes, 9686 rules, 0 cond rules
  1755. + allow su_daemon shell file read open
  1756. + addFile sepolicy
  1757. + [ -n ]
  1758. + echo sbin/su sepolicy
  1759. + grep -qE \bsepolicy\b
  1760. + [ -z su_daemon -o -z shell -o -z file -o -z read open ]
  1761. + echo read open
  1762. + tr ,
  1763. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c file -p read,open -P sepolicy
  1764. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1765. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1766. libsepol.policydb_index_others: security: 87 classes, 9687 rules, 0 cond rules
  1767. + allow su_daemon shell lnk_file read
  1768. + addFile sepolicy
  1769. + [ -n ]
  1770. + echo sbin/su sepolicy
  1771. + grep -qE \bsepolicy\b
  1772. + [ -z su_daemon -o -z shell -o -z lnk_file -o -z read ]
  1773. + echo read
  1774. + tr ,
  1775. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell -c lnk_file -p read -P sepolicy
  1776. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1777. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1778. libsepol.policydb_index_others: security: 87 classes, 9688 rules, 0 cond rules
  1779. + allow su_daemon su_daemon capability sys_ptrace
  1780. + addFile sepolicy
  1781. + [ -n ]
  1782. + echo sbin/su sepolicy
  1783. + grep -qE \bsepolicy\b
  1784. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  1785. + echo sys_ptrace
  1786. + tr ,
  1787. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  1788. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1789. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1790. libsepol.policydb_index_others: security: 87 classes, 9689 rules, 0 cond rules
  1791. + allow su shell fd use
  1792. + addFile sepolicy
  1793. + [ -n ]
  1794. + echo sbin/su sepolicy
  1795. + grep -qE \bsepolicy\b
  1796. + [ -z su -o -z shell -o -z fd -o -z use ]
  1797. + echo use
  1798. + tr ,
  1799. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fd -p use -P sepolicy
  1800. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1801. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1802. libsepol.policydb_index_others: security: 87 classes, 9690 rules, 0 cond rules
  1803. + allow su shell fifo_file read write
  1804. + addFile sepolicy
  1805. + [ -n ]
  1806. + echo sbin/su sepolicy
  1807. + grep -qE \bsepolicy\b
  1808. + [ -z su -o -z shell -o -z fifo_file -o -z read write ]
  1809. + echo read write
  1810. + tr ,
  1811. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell -c fifo_file -p read,write -P sepolicy
  1812. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1813. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1814. libsepol.policydb_index_others: security: 87 classes, 9691 rules, 0 cond rules
  1815. + allowSuClient untrusted_app
  1816. + allow untrusted_app rootfs file execute_no_trans execute
  1817. + addFile sepolicy
  1818. + [ -n ]
  1819. + echo sbin/su sepolicy
  1820. + grep -qE \bsepolicy\b
  1821. + [ -z untrusted_app -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1822. + echo execute_no_trans execute
  1823. + tr ,
  1824. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1825. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1826. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1827. libsepol.policydb_index_others: security: 87 classes, 9692 rules, 0 cond rules
  1828. + allow untrusted_app su_daemon unix_stream_socket connectto getopt
  1829. + addFile sepolicy
  1830. + [ -n ]
  1831. + echo sbin/su sepolicy
  1832. + grep -qE \bsepolicy\b
  1833. + [ -z untrusted_app -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1834. + echo connectto getopt
  1835. + tr ,
  1836. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1837. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1838. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1839. libsepol.policydb_index_others: security: 87 classes, 9693 rules, 0 cond rules
  1840. + allow untrusted_app su_device dir search read
  1841. + addFile sepolicy
  1842. + [ -n ]
  1843. + echo sbin/su sepolicy
  1844. + grep -qE \bsepolicy\b
  1845. + [ -z untrusted_app -o -z su_device -o -z dir -o -z search read ]
  1846. + echo search read
  1847. + tr ,
  1848. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c dir -p search,read -P sepolicy
  1849. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1850. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1851. libsepol.policydb_index_others: security: 87 classes, 9694 rules, 0 cond rules
  1852. + allow untrusted_app su_device sock_file read write
  1853. + addFile sepolicy
  1854. + [ -n ]
  1855. + echo sbin/su sepolicy
  1856. + grep -qE \bsepolicy\b
  1857. + [ -z untrusted_app -o -z su_device -o -z sock_file -o -z read write ]
  1858. + echo read write
  1859. + tr ,
  1860. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su_device -c sock_file -p read,write -P sepolicy
  1861. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1862. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1863. libsepol.policydb_index_others: security: 87 classes, 9695 rules, 0 cond rules
  1864. + allow su_daemon untrusted_app fd use
  1865. + addFile sepolicy
  1866. + [ -n ]
  1867. + echo sbin/su sepolicy
  1868. + grep -qE \bsepolicy\b
  1869. + [ -z su_daemon -o -z untrusted_app -o -z fd -o -z use ]
  1870. + echo use
  1871. + tr ,
  1872. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fd -p use -P sepolicy
  1873. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1874. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1875. libsepol.policydb_index_others: security: 87 classes, 9696 rules, 0 cond rules
  1876. + allow su_daemon untrusted_app fifo_file read write getattr ioctl
  1877. + addFile sepolicy
  1878. + [ -n ]
  1879. + echo sbin/su sepolicy
  1880. + grep -qE \bsepolicy\b
  1881. + [ -z su_daemon -o -z untrusted_app -o -z fifo_file -o -z read write getattr ioctl ]
  1882. + echo read write getattr ioctl
  1883. + tr ,
  1884. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  1885. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1886. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1887. libsepol.policydb_index_others: security: 87 classes, 9697 rules, 0 cond rules
  1888. + allow su_daemon untrusted_app dir search
  1889. + addFile sepolicy
  1890. + [ -n ]
  1891. + echo sbin/su sepolicy
  1892. + grep -qE \bsepolicy\b
  1893. + [ -z su_daemon -o -z untrusted_app -o -z dir -o -z search ]
  1894. + echo search
  1895. + tr ,
  1896. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c dir -p search -P sepolicy
  1897. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1898. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1899. libsepol.policydb_index_others: security: 87 classes, 9698 rules, 0 cond rules
  1900. + allow su_daemon untrusted_app file read open
  1901. + addFile sepolicy
  1902. + [ -n ]
  1903. + echo sbin/su sepolicy
  1904. + grep -qE \bsepolicy\b
  1905. + [ -z su_daemon -o -z untrusted_app -o -z file -o -z read open ]
  1906. + echo read open
  1907. + tr ,
  1908. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c file -p read,open -P sepolicy
  1909. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1910. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1911. libsepol.policydb_index_others: security: 87 classes, 9699 rules, 0 cond rules
  1912. + allow su_daemon untrusted_app lnk_file read
  1913. + addFile sepolicy
  1914. + [ -n ]
  1915. + echo sbin/su sepolicy
  1916. + grep -qE \bsepolicy\b
  1917. + [ -z su_daemon -o -z untrusted_app -o -z lnk_file -o -z read ]
  1918. + echo read
  1919. + tr ,
  1920. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app -c lnk_file -p read -P sepolicy
  1921. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1922. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1923. libsepol.policydb_index_others: security: 87 classes, 9700 rules, 0 cond rules
  1924. + allow su_daemon su_daemon capability sys_ptrace
  1925. + addFile sepolicy
  1926. + [ -n ]
  1927. + echo sbin/su sepolicy
  1928. + grep -qE \bsepolicy\b
  1929. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  1930. + echo sys_ptrace
  1931. + tr ,
  1932. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  1933. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1934. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1935. libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
  1936. + allow su untrusted_app fd use
  1937. + addFile sepolicy
  1938. + [ -n ]
  1939. + echo sbin/su sepolicy
  1940. + grep -qE \bsepolicy\b
  1941. + [ -z su -o -z untrusted_app -o -z fd -o -z use ]
  1942. + echo use
  1943. + tr ,
  1944. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fd -p use -P sepolicy
  1945. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1946. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1947. libsepol.policydb_index_others: security: 87 classes, 9701 rules, 0 cond rules
  1948. + allow su untrusted_app fifo_file read write
  1949. + addFile sepolicy
  1950. + [ -n ]
  1951. + echo sbin/su sepolicy
  1952. + grep -qE \bsepolicy\b
  1953. + [ -z su -o -z untrusted_app -o -z fifo_file -o -z read write ]
  1954. + echo read write
  1955. + tr ,
  1956. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p read,write -P sepolicy
  1957. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1958. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1959. libsepol.policydb_index_others: security: 87 classes, 9702 rules, 0 cond rules
  1960. + allowSuClient su
  1961. + allow su rootfs file execute_no_trans execute
  1962. + addFile sepolicy
  1963. + [ -n ]
  1964. + echo sbin/su sepolicy
  1965. + grep -qE \bsepolicy\b
  1966. + [ -z su -o -z rootfs -o -z file -o -z execute_no_trans execute ]
  1967. + echo execute_no_trans execute
  1968. + tr ,
  1969. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p execute_no_trans,execute -P sepolicy
  1970. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1971. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1972. libsepol.policydb_index_others: security: 87 classes, 9703 rules, 0 cond rules
  1973. + allow su su_daemon unix_stream_socket connectto getopt
  1974. + addFile sepolicy
  1975. + [ -n ]
  1976. + echo sbin/su sepolicy
  1977. + grep -qE \bsepolicy\b
  1978. + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z connectto getopt ]
  1979. + echo connectto getopt
  1980. + tr ,
  1981. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p connectto,getopt -P sepolicy
  1982. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1983. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1984. libsepol.policydb_index_others: security: 87 classes, 9704 rules, 0 cond rules
  1985. + allow su su_device dir search read
  1986. + addFile sepolicy
  1987. + [ -n ]
  1988. + echo sbin/su sepolicy
  1989. + grep -qE \bsepolicy\b
  1990. + [ -z su -o -z su_device -o -z dir -o -z search read ]
  1991. + echo search read
  1992. + tr ,
  1993. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c dir -p search,read -P sepolicy
  1994. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  1995. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  1996. libsepol.policydb_index_others: security: 87 classes, 9705 rules, 0 cond rules
  1997. + allow su su_device sock_file read write
  1998. + addFile sepolicy
  1999. + [ -n ]
  2000. + echo sbin/su sepolicy
  2001. + grep -qE \bsepolicy\b
  2002. + [ -z su -o -z su_device -o -z sock_file -o -z read write ]
  2003. + echo read write
  2004. + tr ,
  2005. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_device -c sock_file -p read,write -P sepolicy
  2006. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2007. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2008. libsepol.policydb_index_others: security: 87 classes, 9706 rules, 0 cond rules
  2009. + allow su_daemon su fd use
  2010. + addFile sepolicy
  2011. + [ -n ]
  2012. + echo sbin/su sepolicy
  2013. + grep -qE \bsepolicy\b
  2014. + [ -z su_daemon -o -z su -o -z fd -o -z use ]
  2015. + echo use
  2016. + tr ,
  2017. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fd -p use -P sepolicy
  2018. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2019. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2020. libsepol.policydb_index_others: security: 87 classes, 9707 rules, 0 cond rules
  2021. + allow su_daemon su fifo_file read write getattr ioctl
  2022. + addFile sepolicy
  2023. + [ -n ]
  2024. + echo sbin/su sepolicy
  2025. + grep -qE \bsepolicy\b
  2026. + [ -z su_daemon -o -z su -o -z fifo_file -o -z read write getattr ioctl ]
  2027. + echo read write getattr ioctl
  2028. + tr ,
  2029. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c fifo_file -p read,write,getattr,ioctl -P sepolicy
  2030. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2031. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2032. libsepol.policydb_index_others: security: 87 classes, 9708 rules, 0 cond rules
  2033. + allow su_daemon su dir search
  2034. + addFile sepolicy
  2035. + [ -n ]
  2036. + echo sbin/su sepolicy
  2037. + grep -qE \bsepolicy\b
  2038. + [ -z su_daemon -o -z su -o -z dir -o -z search ]
  2039. + echo search
  2040. + tr ,
  2041. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c dir -p search -P sepolicy
  2042. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2043. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2044. libsepol.policydb_index_others: security: 87 classes, 9709 rules, 0 cond rules
  2045. + allow su_daemon su file read open
  2046. + addFile sepolicy
  2047. + [ -n ]
  2048. + echo sbin/su sepolicy
  2049. + grep -qE \bsepolicy\b
  2050. + [ -z su_daemon -o -z su -o -z file -o -z read open ]
  2051. + echo read open
  2052. + tr ,
  2053. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c file -p read,open -P sepolicy
  2054. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2055. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2056. libsepol.policydb_index_others: security: 87 classes, 9710 rules, 0 cond rules
  2057. + allow su_daemon su lnk_file read
  2058. + addFile sepolicy
  2059. + [ -n ]
  2060. + echo sbin/su sepolicy
  2061. + grep -qE \bsepolicy\b
  2062. + [ -z su_daemon -o -z su -o -z lnk_file -o -z read ]
  2063. + echo read
  2064. + tr ,
  2065. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c lnk_file -p read -P sepolicy
  2066. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2067. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2068. libsepol.policydb_index_others: security: 87 classes, 9711 rules, 0 cond rules
  2069. + allow su_daemon su_daemon capability sys_ptrace
  2070. + addFile sepolicy
  2071. + [ -n ]
  2072. + echo sbin/su sepolicy
  2073. + grep -qE \bsepolicy\b
  2074. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_ptrace ]
  2075. + echo sys_ptrace
  2076. + tr ,
  2077. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_ptrace -P sepolicy
  2078. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2079. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2080. libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
  2081. + allow su su fd use
  2082. + addFile sepolicy
  2083. + [ -n ]
  2084. + echo sbin/su sepolicy
  2085. + grep -qE \bsepolicy\b
  2086. + [ -z su -o -z su -o -z fd -o -z use ]
  2087. + echo use
  2088. + tr ,
  2089. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fd -p use -P sepolicy
  2090. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2091. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2092. libsepol.policydb_index_others: security: 87 classes, 9712 rules, 0 cond rules
  2093. + allow su su fifo_file read write
  2094. + addFile sepolicy
  2095. + [ -n ]
  2096. + echo sbin/su sepolicy
  2097. + grep -qE \bsepolicy\b
  2098. + [ -z su -o -z su -o -z fifo_file -o -z read write ]
  2099. + echo read write
  2100. + tr ,
  2101. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p read,write -P sepolicy
  2102. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2103. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2104. libsepol.policydb_index_others: security: 87 classes, 9713 rules, 0 cond rules
  2105. + /tmp/superuser/scripts/bin/sepolicy-inject -e -s ssd_tool -P sepolicy
  2106. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2107. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2108. libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
  2109. + allow init su_daemon process transition
  2110. + addFile sepolicy
  2111. + [ -n ]
  2112. + echo sbin/su sepolicy
  2113. + grep -qE \bsepolicy\b
  2114. + [ -z init -o -z su_daemon -o -z process -o -z transition ]
  2115. + echo transition
  2116. + tr ,
  2117. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p transition -P sepolicy
  2118. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2119. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2120. libsepol.policydb_index_others: security: 87 classes, 9714 rules, 0 cond rules
  2121. + noaudit init su_daemon process rlimitinh siginh noatsecure
  2122. + addFile sepolicy
  2123. + [ -n ]
  2124. + echo sbin/su sepolicy
  2125. + grep -qE \bsepolicy\b
  2126. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p rlimitinh -P sepolicy
  2127. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2128. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2129. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2130. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p siginh -P sepolicy
  2131. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2132. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2133. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2134. + /tmp/superuser/scripts/bin/sepolicy-inject -s init -t su_daemon -c process -p noatsecure -P sepolicy
  2135. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2136. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2137. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2138. + suDaemonRights
  2139. + allow su_daemon rootfs file entrypoint
  2140. + addFile sepolicy
  2141. + [ -n ]
  2142. + echo sbin/su sepolicy
  2143. + grep -qE \bsepolicy\b
  2144. + [ -z su_daemon -o -z rootfs -o -z file -o -z entrypoint ]
  2145. + echo entrypoint
  2146. + tr ,
  2147. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t rootfs -c file -p entrypoint -P sepolicy
  2148. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2149. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2150. libsepol.policydb_index_others: security: 87 classes, 9715 rules, 0 cond rules
  2151. + allow su_daemon su_daemon dir search read
  2152. + addFile sepolicy
  2153. + [ -n ]
  2154. + echo sbin/su sepolicy
  2155. + grep -qE \bsepolicy\b
  2156. + [ -z su_daemon -o -z su_daemon -o -z dir -o -z search read ]
  2157. + echo search read
  2158. + tr ,
  2159. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c dir -p search,read -P sepolicy
  2160. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2161. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2162. libsepol.policydb_index_others: security: 87 classes, 9716 rules, 0 cond rules
  2163. + allow su_daemon su_daemon file read write open
  2164. + addFile sepolicy
  2165. + [ -n ]
  2166. + echo sbin/su sepolicy
  2167. + grep -qE \bsepolicy\b
  2168. + [ -z su_daemon -o -z su_daemon -o -z file -o -z read write open ]
  2169. + echo read write open
  2170. + tr ,
  2171. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c file -p read,write,open -P sepolicy
  2172. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2173. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2174. libsepol.policydb_index_others: security: 87 classes, 9717 rules, 0 cond rules
  2175. + allow su_daemon su_daemon lnk_file read
  2176. + addFile sepolicy
  2177. + [ -n ]
  2178. + echo sbin/su sepolicy
  2179. + grep -qE \bsepolicy\b
  2180. + [ -z su_daemon -o -z su_daemon -o -z lnk_file -o -z read ]
  2181. + echo read
  2182. + tr ,
  2183. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c lnk_file -p read -P sepolicy
  2184. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2185. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2186. libsepol.policydb_index_others: security: 87 classes, 9718 rules, 0 cond rules
  2187. + allow su_daemon su_daemon unix_dgram_socket create connect write
  2188. + addFile sepolicy
  2189. + [ -n ]
  2190. + echo sbin/su sepolicy
  2191. + grep -qE \bsepolicy\b
  2192. + [ -z su_daemon -o -z su_daemon -o -z unix_dgram_socket -o -z create connect write ]
  2193. + echo create connect write
  2194. + tr ,
  2195. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_dgram_socket -p create,connect,write -P sepolicy
  2196. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2197. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2198. libsepol.policydb_index_others: security: 87 classes, 9719 rules, 0 cond rules
  2199. + allow su_daemon su_daemon unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2200. + addFile sepolicy
  2201. + [ -n ]
  2202. + echo sbin/su sepolicy
  2203. + grep -qE \bsepolicy\b
  2204. + [ -z su_daemon -o -z su_daemon -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  2205. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2206. + tr ,
  2207. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  2208. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2209. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2210. libsepol.policydb_index_others: security: 87 classes, 9720 rules, 0 cond rules
  2211. + allow su_daemon devpts chr_file read write open
  2212. + addFile sepolicy
  2213. + [ -n ]
  2214. + echo sbin/su sepolicy
  2215. + grep -qE \bsepolicy\b
  2216. + [ -z su_daemon -o -z devpts -o -z chr_file -o -z read write open ]
  2217. + echo read write open
  2218. + tr ,
  2219. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t devpts -c chr_file -p read,write,open -P sepolicy
  2220. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2221. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2222. libsepol.policydb_index_others: security: 87 classes, 9721 rules, 0 cond rules
  2223. + allow su_daemon untrusted_app_devpts chr_file read write open
  2224. + addFile sepolicy
  2225. + [ -n ]
  2226. + echo sbin/su sepolicy
  2227. + grep -qE \bsepolicy\b
  2228. + [ -z su_daemon -o -z untrusted_app_devpts -o -z chr_file -o -z read write open ]
  2229. + echo read write open
  2230. + tr ,
  2231. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t untrusted_app_devpts -c chr_file -p read,write,open -P sepolicy
  2232. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2233. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2234. libsepol.policydb_index_others: security: 87 classes, 9722 rules, 0 cond rules
  2235. + allow su_daemon su_daemon capability setuid setgid
  2236. + addFile sepolicy
  2237. + [ -n ]
  2238. + echo sbin/su sepolicy
  2239. + grep -qE \bsepolicy\b
  2240. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z setuid setgid ]
  2241. + echo setuid setgid
  2242. + tr ,
  2243. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p setuid,setgid -P sepolicy
  2244. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2245. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2246. libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
  2247. + allow su_daemon app_data_file dir getattr search write add_name
  2248. + addFile sepolicy
  2249. + [ -n ]
  2250. + echo sbin/su sepolicy
  2251. + grep -qE \bsepolicy\b
  2252. + [ -z su_daemon -o -z app_data_file -o -z dir -o -z getattr search write add_name ]
  2253. + echo getattr search write add_name
  2254. + tr ,
  2255. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c dir -p getattr,search,write,add_name -P sepolicy
  2256. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2257. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2258. libsepol.policydb_index_others: security: 87 classes, 9723 rules, 0 cond rules
  2259. + allow su_daemon app_data_file file getattr read open lock
  2260. + addFile sepolicy
  2261. + [ -n ]
  2262. + echo sbin/su sepolicy
  2263. + grep -qE \bsepolicy\b
  2264. + [ -z su_daemon -o -z app_data_file -o -z file -o -z getattr read open lock ]
  2265. + echo getattr read open lock
  2266. + tr ,
  2267. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t app_data_file -c file -p getattr,read,open,lock -P sepolicy
  2268. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2269. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2270. libsepol.policydb_index_others: security: 87 classes, 9724 rules, 0 cond rules
  2271. + allow su_daemon su_daemon capability dac_override
  2272. + addFile sepolicy
  2273. + [ -n ]
  2274. + echo sbin/su sepolicy
  2275. + grep -qE \bsepolicy\b
  2276. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z dac_override ]
  2277. + echo dac_override
  2278. + tr ,
  2279. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p dac_override -P sepolicy
  2280. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2281. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2282. libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
  2283. + allow su_daemon su_daemon process fork sigchld
  2284. + addFile sepolicy
  2285. + [ -n ]
  2286. + echo sbin/su sepolicy
  2287. + grep -qE \bsepolicy\b
  2288. + [ -z su_daemon -o -z su_daemon -o -z process -o -z fork sigchld ]
  2289. + echo fork sigchld
  2290. + tr ,
  2291. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p fork,sigchld -P sepolicy
  2292. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2293. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2294. libsepol.policydb_index_others: security: 87 classes, 9725 rules, 0 cond rules
  2295. + allow su_daemon toolbox_exec file execute read open execute_no_trans
  2296. + addFile sepolicy
  2297. + [ -n ]
  2298. + echo sbin/su sepolicy
  2299. + grep -qE \bsepolicy\b
  2300. + [ -z su_daemon -o -z toolbox_exec -o -z file -o -z execute read open execute_no_trans ]
  2301. + echo execute read open execute_no_trans
  2302. + tr ,
  2303. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t toolbox_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
  2304. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2305. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2306. libsepol.policydb_index_others: security: 87 classes, 9726 rules, 0 cond rules
  2307. + allow su_daemon device dir write add_name
  2308. + addFile sepolicy
  2309. + [ -n ]
  2310. + echo sbin/su sepolicy
  2311. + grep -qE \bsepolicy\b
  2312. + [ -z su_daemon -o -z device -o -z dir -o -z write add_name ]
  2313. + echo write add_name
  2314. + tr ,
  2315. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t device -c dir -p write,add_name -P sepolicy
  2316. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2317. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2318. libsepol.policydb_index_others: security: 87 classes, 9727 rules, 0 cond rules
  2319. + allow su_daemon su_device dir create setattr remove_name add_name
  2320. + addFile sepolicy
  2321. + [ -n ]
  2322. + echo sbin/su sepolicy
  2323. + grep -qE \bsepolicy\b
  2324. + [ -z su_daemon -o -z su_device -o -z dir -o -z create setattr remove_name add_name ]
  2325. + echo create setattr remove_name add_name
  2326. + tr ,
  2327. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p create,setattr,remove_name,add_name -P sepolicy
  2328. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2329. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2330. libsepol.policydb_index_others: security: 87 classes, 9728 rules, 0 cond rules
  2331. + allow su_daemon su_device sock_file create unlink
  2332. + addFile sepolicy
  2333. + [ -n ]
  2334. + echo sbin/su sepolicy
  2335. + grep -qE \bsepolicy\b
  2336. + [ -z su_daemon -o -z su_device -o -z sock_file -o -z create unlink ]
  2337. + echo create unlink
  2338. + tr ,
  2339. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c sock_file -p create,unlink -P sepolicy
  2340. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2341. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2342. libsepol.policydb_index_others: security: 87 classes, 9729 rules, 0 cond rules
  2343. + allow su_daemon zygote_exec file execute read open execute_no_trans
  2344. + addFile sepolicy
  2345. + [ -n ]
  2346. + echo sbin/su sepolicy
  2347. + grep -qE \bsepolicy\b
  2348. + [ -z su_daemon -o -z zygote_exec -o -z file -o -z execute read open execute_no_trans ]
  2349. + echo execute read open execute_no_trans
  2350. + tr ,
  2351. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t zygote_exec -c file -p execute,read,open,execute_no_trans -P sepolicy
  2352. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2353. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2354. libsepol.policydb_index_others: security: 87 classes, 9730 rules, 0 cond rules
  2355. + allow su_daemon su_device dir search write add_name
  2356. + addFile sepolicy
  2357. + [ -n ]
  2358. + echo sbin/su sepolicy
  2359. + grep -qE \bsepolicy\b
  2360. + [ -z su_daemon -o -z su_device -o -z dir -o -z search write add_name ]
  2361. + echo search write add_name
  2362. + tr ,
  2363. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p search,write,add_name -P sepolicy
  2364. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2365. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2366. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2367. + allow su_daemon su_daemon process setexec
  2368. + addFile sepolicy
  2369. + [ -n ]
  2370. + echo sbin/su sepolicy
  2371. + grep -qE \bsepolicy\b
  2372. + [ -z su_daemon -o -z su_daemon -o -z process -o -z setexec ]
  2373. + echo setexec
  2374. + tr ,
  2375. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c process -p setexec -P sepolicy
  2376. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2377. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2378. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2379. + allow su_daemon shell_exec file execute read open
  2380. + addFile sepolicy
  2381. + [ -n ]
  2382. + echo sbin/su sepolicy
  2383. + grep -qE \bsepolicy\b
  2384. + [ -z su_daemon -o -z shell_exec -o -z file -o -z execute read open ]
  2385. + echo execute read open
  2386. + tr ,
  2387. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t shell_exec -c file -p execute,read,open -P sepolicy
  2388. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2389. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2390. libsepol.policydb_index_others: security: 87 classes, 9731 rules, 0 cond rules
  2391. + allow su_daemon su_daemon capability chown
  2392. + addFile sepolicy
  2393. + [ -n ]
  2394. + echo sbin/su sepolicy
  2395. + grep -qE \bsepolicy\b
  2396. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z chown ]
  2397. + echo chown
  2398. + tr ,
  2399. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p chown -P sepolicy
  2400. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2401. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2402. libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
  2403. + suDaemonTo su
  2404. + allow su_daemon su process transition
  2405. + addFile sepolicy
  2406. + [ -n ]
  2407. + echo sbin/su sepolicy
  2408. + grep -qE \bsepolicy\b
  2409. + [ -z su_daemon -o -z su -o -z process -o -z transition ]
  2410. + echo transition
  2411. + tr ,
  2412. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p transition -P sepolicy
  2413. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2414. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2415. libsepol.policydb_index_others: security: 87 classes, 9732 rules, 0 cond rules
  2416. + noaudit su_daemon su process siginh rlimitinh noatsecure
  2417. + addFile sepolicy
  2418. + [ -n ]
  2419. + echo sbin/su sepolicy
  2420. + grep -qE \bsepolicy\b
  2421. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p siginh -P sepolicy
  2422. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2423. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2424. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2425. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p rlimitinh -P sepolicy
  2426. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2427. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2428. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2429. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su -c process -p noatsecure -P sepolicy
  2430. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2431. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2432. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2433. + allowLog su
  2434. + allow su logdw_socket sock_file write
  2435. + addFile sepolicy
  2436. + [ -n ]
  2437. + echo sbin/su sepolicy
  2438. + grep -qE \bsepolicy\b
  2439. + [ -z su -o -z logdw_socket -o -z sock_file -o -z write ]
  2440. + echo write
  2441. + tr ,
  2442. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdw_socket -c sock_file -p write -P sepolicy
  2443. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2444. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2445. libsepol.policydb_index_others: security: 87 classes, 9733 rules, 0 cond rules
  2446. + allow su logd unix_dgram_socket sendto
  2447. + addFile sepolicy
  2448. + [ -n ]
  2449. + echo sbin/su sepolicy
  2450. + grep -qE \bsepolicy\b
  2451. + [ -z su -o -z logd -o -z unix_dgram_socket -o -z sendto ]
  2452. + echo sendto
  2453. + tr ,
  2454. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_dgram_socket -p sendto -P sepolicy
  2455. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2456. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2457. libsepol.policydb_index_others: security: 87 classes, 9734 rules, 0 cond rules
  2458. + allow logd su dir search
  2459. + addFile sepolicy
  2460. + [ -n ]
  2461. + echo sbin/su sepolicy
  2462. + grep -qE \bsepolicy\b
  2463. + [ -z logd -o -z su -o -z dir -o -z search ]
  2464. + echo search
  2465. + tr ,
  2466. + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c dir -p search -P sepolicy
  2467. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2468. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2469. libsepol.policydb_index_others: security: 87 classes, 9735 rules, 0 cond rules
  2470. + allow logd su file read open getattr
  2471. + addFile sepolicy
  2472. + [ -n ]
  2473. + echo sbin/su sepolicy
  2474. + grep -qE \bsepolicy\b
  2475. + [ -z logd -o -z su -o -z file -o -z read open getattr ]
  2476. + echo read open getattr
  2477. + tr ,
  2478. + /tmp/superuser/scripts/bin/sepolicy-inject -s logd -t su -c file -p read,open,getattr -P sepolicy
  2479. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2480. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2481. libsepol.policydb_index_others: security: 87 classes, 9736 rules, 0 cond rules
  2482. + allow su su dir search read
  2483. + addFile sepolicy
  2484. + [ -n ]
  2485. + echo sbin/su sepolicy
  2486. + grep -qE \bsepolicy\b
  2487. + [ -z su -o -z su -o -z dir -o -z search read ]
  2488. + echo search read
  2489. + tr ,
  2490. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c dir -p search,read -P sepolicy
  2491. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2492. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2493. libsepol.policydb_index_others: security: 87 classes, 9737 rules, 0 cond rules
  2494. + allow su su unix_dgram_socket create connect write
  2495. + addFile sepolicy
  2496. + [ -n ]
  2497. + echo sbin/su sepolicy
  2498. + grep -qE \bsepolicy\b
  2499. + [ -z su -o -z su -o -z unix_dgram_socket -o -z create connect write ]
  2500. + echo create connect write
  2501. + tr ,
  2502. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_dgram_socket -p create,connect,write -P sepolicy
  2503. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2504. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2505. libsepol.policydb_index_others: security: 87 classes, 9738 rules, 0 cond rules
  2506. + allow su su lnk_file read
  2507. + addFile sepolicy
  2508. + [ -n ]
  2509. + echo sbin/su sepolicy
  2510. + grep -qE \bsepolicy\b
  2511. + [ -z su -o -z su -o -z lnk_file -o -z read ]
  2512. + echo read
  2513. + tr ,
  2514. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c lnk_file -p read -P sepolicy
  2515. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2516. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2517. libsepol.policydb_index_others: security: 87 classes, 9739 rules, 0 cond rules
  2518. + allow su su file read
  2519. + addFile sepolicy
  2520. + [ -n ]
  2521. + echo sbin/su sepolicy
  2522. + grep -qE \bsepolicy\b
  2523. + [ -z su -o -z su -o -z file -o -z read ]
  2524. + echo read
  2525. + tr ,
  2526. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p read -P sepolicy
  2527. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2528. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2529. libsepol.policydb_index_others: security: 87 classes, 9740 rules, 0 cond rules
  2530. + allow su toolbox_exec file read
  2531. + addFile sepolicy
  2532. + [ -n ]
  2533. + echo sbin/su sepolicy
  2534. + grep -qE \bsepolicy\b
  2535. + [ -z su -o -z toolbox_exec -o -z file -o -z read ]
  2536. + echo read
  2537. + tr ,
  2538. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p read -P sepolicy
  2539. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2540. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2541. libsepol.policydb_index_others: security: 87 classes, 9741 rules, 0 cond rules
  2542. + allow su devpts chr_file read write open
  2543. + addFile sepolicy
  2544. + [ -n ]
  2545. + echo sbin/su sepolicy
  2546. + grep -qE \bsepolicy\b
  2547. + [ -z su -o -z devpts -o -z chr_file -o -z read write open ]
  2548. + echo read write open
  2549. + tr ,
  2550. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p read,write,open -P sepolicy
  2551. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2552. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2553. libsepol.policydb_index_others: security: 87 classes, 9742 rules, 0 cond rules
  2554. + suRights su
  2555. + allow su su_daemon fd use
  2556. + addFile sepolicy
  2557. + [ -n ]
  2558. + echo sbin/su sepolicy
  2559. + grep -qE \bsepolicy\b
  2560. + [ -z su -o -z su_daemon -o -z fd -o -z use ]
  2561. + echo use
  2562. + tr ,
  2563. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c fd -p use -P sepolicy
  2564. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2565. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2566. libsepol.policydb_index_others: security: 87 classes, 9743 rules, 0 cond rules
  2567. + allow su su_daemon process sigchld
  2568. + addFile sepolicy
  2569. + [ -n ]
  2570. + echo sbin/su sepolicy
  2571. + grep -qE \bsepolicy\b
  2572. + [ -z su -o -z su_daemon -o -z process -o -z sigchld ]
  2573. + echo sigchld
  2574. + tr ,
  2575. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c process -p sigchld -P sepolicy
  2576. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2577. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2578. libsepol.policydb_index_others: security: 87 classes, 9744 rules, 0 cond rules
  2579. + allow su su_daemon unix_stream_socket read write
  2580. + addFile sepolicy
  2581. + [ -n ]
  2582. + echo sbin/su sepolicy
  2583. + grep -qE \bsepolicy\b
  2584. + [ -z su -o -z su_daemon -o -z unix_stream_socket -o -z read write ]
  2585. + echo read write
  2586. + tr ,
  2587. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su_daemon -c unix_stream_socket -p read,write -P sepolicy
  2588. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2589. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2590. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2591. + allow su_daemon su_daemon capability sys_admin
  2592. + addFile sepolicy
  2593. + [ -n ]
  2594. + echo sbin/su sepolicy
  2595. + grep -qE \bsepolicy\b
  2596. + [ -z su_daemon -o -z su_daemon -o -z capability -o -z sys_admin ]
  2597. + echo sys_admin
  2598. + tr ,
  2599. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_daemon -c capability -p sys_admin -P sepolicy
  2600. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2601. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2602. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2603. + allow servicemanager su dir search read
  2604. + addFile sepolicy
  2605. + [ -n ]
  2606. + echo sbin/su sepolicy
  2607. + grep -qE \bsepolicy\b
  2608. + [ -z servicemanager -o -z su -o -z dir -o -z search read ]
  2609. + echo search read
  2610. + tr ,
  2611. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c dir -p search,read -P sepolicy
  2612. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2613. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2614. libsepol.policydb_index_others: security: 87 classes, 9745 rules, 0 cond rules
  2615. + allow servicemanager su file open read
  2616. + addFile sepolicy
  2617. + [ -n ]
  2618. + echo sbin/su sepolicy
  2619. + grep -qE \bsepolicy\b
  2620. + [ -z servicemanager -o -z su -o -z file -o -z open read ]
  2621. + echo open read
  2622. + tr ,
  2623. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c file -p open,read -P sepolicy
  2624. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2625. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2626. libsepol.policydb_index_others: security: 87 classes, 9746 rules, 0 cond rules
  2627. + allow servicemanager su process getattr
  2628. + addFile sepolicy
  2629. + [ -n ]
  2630. + echo sbin/su sepolicy
  2631. + grep -qE \bsepolicy\b
  2632. + [ -z servicemanager -o -z su -o -z process -o -z getattr ]
  2633. + echo getattr
  2634. + tr ,
  2635. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c process -p getattr -P sepolicy
  2636. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2637. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2638. libsepol.policydb_index_others: security: 87 classes, 9747 rules, 0 cond rules
  2639. + allow servicemanager su binder transfer
  2640. + addFile sepolicy
  2641. + [ -n ]
  2642. + echo sbin/su sepolicy
  2643. + grep -qE \bsepolicy\b
  2644. + [ -z servicemanager -o -z su -o -z binder -o -z transfer ]
  2645. + echo transfer
  2646. + tr ,
  2647. + /tmp/superuser/scripts/bin/sepolicy-inject -s servicemanager -t su -c binder -p transfer -P sepolicy
  2648. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2649. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2650. libsepol.policydb_index_others: security: 87 classes, 9748 rules, 0 cond rules
  2651. + [ 23 -ge 20 ]
  2652. + allow system_server su binder call
  2653. + addFile sepolicy
  2654. + [ -n ]
  2655. + echo sbin/su sepolicy
  2656. + grep -qE \bsepolicy\b
  2657. + [ -z system_server -o -z su -o -z binder -o -z call ]
  2658. + echo call
  2659. + tr ,
  2660. + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call -P sepolicy
  2661. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2662. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2663. libsepol.policydb_index_others: security: 87 classes, 9749 rules, 0 cond rules
  2664. + allow su shell_exec zygote_exec dalvikcache_data_file rootfs system_file file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2665. + addFile sepolicy
  2666. + [ -n ]
  2667. + echo sbin/su sepolicy
  2668. + grep -qE \bsepolicy\b
  2669. + [ -z su -o -z shell_exec zygote_exec dalvikcache_data_file rootfs system_file -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
  2670. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2671. + tr ,
  2672. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2673. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2674. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2675. libsepol.policydb_index_others: security: 87 classes, 9750 rules, 0 cond rules
  2676. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2677. + tr ,
  2678. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t zygote_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2679. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2680. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2681. libsepol.policydb_index_others: security: 87 classes, 9751 rules, 0 cond rules
  2682. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2683. + tr ,
  2684. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2685. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2686. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2687. libsepol.policydb_index_others: security: 87 classes, 9752 rules, 0 cond rules
  2688. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2689. + tr ,
  2690. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2691. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2692. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2693. libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
  2694. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2695. + tr ,
  2696. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2697. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2698. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2699. libsepol.policydb_index_others: security: 87 classes, 9753 rules, 0 cond rules
  2700. + allow su dalvikcache_data_file rootfs system_file lnk_file read getattr
  2701. + addFile sepolicy
  2702. + [ -n ]
  2703. + echo sbin/su sepolicy
  2704. + grep -qE \bsepolicy\b
  2705. + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z lnk_file -o -z read getattr ]
  2706. + echo read getattr
  2707. + tr ,
  2708. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c lnk_file -p read,getattr -P sepolicy
  2709. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2710. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2711. libsepol.policydb_index_others: security: 87 classes, 9754 rules, 0 cond rules
  2712. + echo read getattr
  2713. + tr ,
  2714. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c lnk_file -p read,getattr -P sepolicy
  2715. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2716. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2717. libsepol.policydb_index_others: security: 87 classes, 9755 rules, 0 cond rules
  2718. + echo read getattr
  2719. + tr ,
  2720. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c lnk_file -p read,getattr -P sepolicy
  2721. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2722. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2723. libsepol.policydb_index_others: security: 87 classes, 9756 rules, 0 cond rules
  2724. + allow su dalvikcache_data_file rootfs system_file dir open getattr read search ioctl
  2725. + addFile sepolicy
  2726. + [ -n ]
  2727. + echo sbin/su sepolicy
  2728. + grep -qE \bsepolicy\b
  2729. + [ -z su -o -z dalvikcache_data_file rootfs system_file -o -z dir -o -z open getattr read search ioctl ]
  2730. + echo open getattr read search ioctl
  2731. + tr ,
  2732. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t dalvikcache_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2733. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2734. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2735. libsepol.policydb_index_others: security: 87 classes, 9757 rules, 0 cond rules
  2736. + echo open getattr read search ioctl
  2737. + tr ,
  2738. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2739. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2740. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2741. libsepol.policydb_index_others: security: 87 classes, 9758 rules, 0 cond rules
  2742. + echo open getattr read search ioctl
  2743. + tr ,
  2744. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  2745. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2746. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2747. libsepol.policydb_index_others: security: 87 classes, 9759 rules, 0 cond rules
  2748. + [ 23 -ge 23 ]
  2749. + allow su toolbox_exec file getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2750. + addFile sepolicy
  2751. + [ -n ]
  2752. + echo sbin/su sepolicy
  2753. + grep -qE \bsepolicy\b
  2754. + [ -z su -o -z toolbox_exec -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans entrypoint ]
  2755. + echo getattr open read ioctl lock getattr execute execute_no_trans entrypoint
  2756. + tr ,
  2757. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t toolbox_exec -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans,entrypoint -P sepolicy
  2758. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2759. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2760. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2761. + allow su devpts chr_file getattr ioctl
  2762. + addFile sepolicy
  2763. + [ -n ]
  2764. + echo sbin/su sepolicy
  2765. + grep -qE \bsepolicy\b
  2766. + [ -z su -o -z devpts -o -z chr_file -o -z getattr ioctl ]
  2767. + echo getattr ioctl
  2768. + tr ,
  2769. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t devpts -c chr_file -p getattr,ioctl -P sepolicy
  2770. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2771. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2772. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2773. + [ 23 -ge 20 ]
  2774. + allow su system_server servicemanager binder call transfer
  2775. + addFile sepolicy
  2776. + [ -n ]
  2777. + echo sbin/su sepolicy
  2778. + grep -qE \bsepolicy\b
  2779. + [ -z su -o -z system_server servicemanager -o -z binder -o -z call transfer ]
  2780. + echo call transfer
  2781. + tr ,
  2782. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_server -c binder -p call,transfer -P sepolicy
  2783. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2784. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2785. libsepol.policydb_index_others: security: 87 classes, 9760 rules, 0 cond rules
  2786. + echo call transfer
  2787. + tr ,
  2788. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c binder -p call,transfer -P sepolicy
  2789. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2790. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2791. libsepol.policydb_index_others: security: 87 classes, 9761 rules, 0 cond rules
  2792. + [ 23 -ge 23 ]
  2793. + allow su activity_service service_manager find
  2794. + addFile sepolicy
  2795. + [ -n ]
  2796. + echo sbin/su sepolicy
  2797. + grep -qE \bsepolicy\b
  2798. + [ -z su -o -z activity_service -o -z service_manager -o -z find ]
  2799. + echo find
  2800. + tr ,
  2801. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t activity_service -c service_manager -p find -P sepolicy
  2802. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2803. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2804. libsepol.policydb_index_others: security: 87 classes, 9762 rules, 0 cond rules
  2805. + [ 23 -ge 20 ]
  2806. + allow su untrusted_app_devpts chr_file read write open getattr ioctl
  2807. + addFile sepolicy
  2808. + [ -n ]
  2809. + echo sbin/su sepolicy
  2810. + grep -qE \bsepolicy\b
  2811. + [ -z su -o -z untrusted_app_devpts -o -z chr_file -o -z read write open getattr ioctl ]
  2812. + echo read write open getattr ioctl
  2813. + tr ,
  2814. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app_devpts -c chr_file -p read,write,open,getattr,ioctl -P sepolicy
  2815. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2816. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2817. libsepol.policydb_index_others: security: 87 classes, 9763 rules, 0 cond rules
  2818. + allow su su file getattr open read ioctl lock getattr execute execute_no_trans
  2819. + addFile sepolicy
  2820. + [ -n ]
  2821. + echo sbin/su sepolicy
  2822. + grep -qE \bsepolicy\b
  2823. + [ -z su -o -z su -o -z file -o -z getattr open read ioctl lock getattr execute execute_no_trans ]
  2824. + echo getattr open read ioctl lock getattr execute execute_no_trans
  2825. + tr ,
  2826. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c file -p getattr,open,read,ioctl,lock,getattr,execute,execute_no_trans -P sepolicy
  2827. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2828. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2829. libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
  2830. + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2831. + addFile sepolicy
  2832. + [ -n ]
  2833. + echo sbin/su sepolicy
  2834. + grep -qE \bsepolicy\b
  2835. + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  2836. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  2837. + tr ,
  2838. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  2839. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2840. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2841. libsepol.policydb_index_others: security: 87 classes, 9764 rules, 0 cond rules
  2842. + allow su su process sigchld setpgid setsched fork signal execmem getsched
  2843. + addFile sepolicy
  2844. + [ -n ]
  2845. + echo sbin/su sepolicy
  2846. + grep -qE \bsepolicy\b
  2847. + [ -z su -o -z su -o -z process -o -z sigchld setpgid setsched fork signal execmem getsched ]
  2848. + echo sigchld setpgid setsched fork signal execmem getsched
  2849. + tr ,
  2850. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p sigchld,setpgid,setsched,fork,signal,execmem,getsched -P sepolicy
  2851. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2852. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2853. libsepol.policydb_index_others: security: 87 classes, 9765 rules, 0 cond rules
  2854. + allow su su fifo_file getattr open read ioctl lock open append write
  2855. + addFile sepolicy
  2856. + [ -n ]
  2857. + echo sbin/su sepolicy
  2858. + grep -qE \bsepolicy\b
  2859. + [ -z su -o -z su -o -z fifo_file -o -z getattr open read ioctl lock open append write ]
  2860. + echo getattr open read ioctl lock open append write
  2861. + tr ,
  2862. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c fifo_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
  2863. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2864. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2865. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2866. + suL0 su
  2867. + suBackL0 su
  2868. + [ 23 -ge 20 ]
  2869. + allow system_server su binder call transfer
  2870. + addFile sepolicy
  2871. + [ -n ]
  2872. + echo sbin/su sepolicy
  2873. + grep -qE \bsepolicy\b
  2874. + [ -z system_server -o -z su -o -z binder -o -z call transfer ]
  2875. + echo call transfer
  2876. + tr ,
  2877. + /tmp/superuser/scripts/bin/sepolicy-inject -s system_server -t su -c binder -p call,transfer -P sepolicy
  2878. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2879. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2880. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2881. + allow untrusted_app su unix_stream_socket ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
  2882. + addFile sepolicy
  2883. + [ -n ]
  2884. + echo sbin/su sepolicy
  2885. + grep -qE \bsepolicy\b
  2886. + [ -z untrusted_app -o -z su -o -z unix_stream_socket -o -z ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto ]
  2887. + echo ioctl read getattr write setattr lock append bind connect getopt setopt shutdown connectto
  2888. + tr ,
  2889. + /tmp/superuser/scripts/bin/sepolicy-inject -s untrusted_app -t su -c unix_stream_socket -p ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,connectto -P sepolicy
  2890. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2891. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2892. libsepol.policydb_index_others: security: 87 classes, 9766 rules, 0 cond rules
  2893. + allow surfaceflinger su process sigchld
  2894. + addFile sepolicy
  2895. + [ -n ]
  2896. + echo sbin/su sepolicy
  2897. + grep -qE \bsepolicy\b
  2898. + [ -z surfaceflinger -o -z su -o -z process -o -z sigchld ]
  2899. + echo sigchld
  2900. + tr ,
  2901. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t su -c process -p sigchld -P sepolicy
  2902. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2903. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2904. libsepol.policydb_index_others: security: 87 classes, 9767 rules, 0 cond rules
  2905. + suMiscL0 su
  2906. + allow su su capability sys_nice
  2907. + addFile sepolicy
  2908. + [ -n ]
  2909. + echo sbin/su sepolicy
  2910. + grep -qE \bsepolicy\b
  2911. + [ -z su -o -z su -o -z capability -o -z sys_nice ]
  2912. + echo sys_nice
  2913. + tr ,
  2914. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_nice -P sepolicy
  2915. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2916. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2917. libsepol.policydb_index_others: security: 87 classes, 9768 rules, 0 cond rules
  2918. + suReadLogs su
  2919. + allow su kernel system syslog_read syslog_mod
  2920. + addFile sepolicy
  2921. + [ -n ]
  2922. + echo sbin/su sepolicy
  2923. + grep -qE \bsepolicy\b
  2924. + [ -z su -o -z kernel -o -z system -o -z syslog_read syslog_mod ]
  2925. + echo syslog_read syslog_mod
  2926. + tr ,
  2927. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t kernel -c system -p syslog_read,syslog_mod -P sepolicy
  2928. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2929. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2930. libsepol.policydb_index_others: security: 87 classes, 9769 rules, 0 cond rules
  2931. + allow su su capability2 syslog
  2932. + addFile sepolicy
  2933. + [ -n ]
  2934. + echo sbin/su sepolicy
  2935. + grep -qE \bsepolicy\b
  2936. + [ -z su -o -z su -o -z capability2 -o -z syslog ]
  2937. + echo syslog
  2938. + tr ,
  2939. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability2 -p syslog -P sepolicy
  2940. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2941. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2942. libsepol.policydb_index_others: security: 87 classes, 9770 rules, 0 cond rules
  2943. + [ 23 -ge 20 ]
  2944. + allow su logdr_socket sock_file write
  2945. + addFile sepolicy
  2946. + [ -n ]
  2947. + echo sbin/su sepolicy
  2948. + grep -qE \bsepolicy\b
  2949. + [ -z su -o -z logdr_socket -o -z sock_file -o -z write ]
  2950. + echo write
  2951. + tr ,
  2952. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logdr_socket -c sock_file -p write -P sepolicy
  2953. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2954. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2955. libsepol.policydb_index_others: security: 87 classes, 9771 rules, 0 cond rules
  2956. + allow su logd unix_stream_socket connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  2957. + addFile sepolicy
  2958. + [ -n ]
  2959. + echo sbin/su sepolicy
  2960. + grep -qE \bsepolicy\b
  2961. + [ -z su -o -z logd -o -z unix_stream_socket -o -z connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  2962. + echo connectto ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  2963. + tr ,
  2964. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logd -c unix_stream_socket -p connectto,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  2965. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2966. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2967. libsepol.policydb_index_others: security: 87 classes, 9772 rules, 0 cond rules
  2968. + [ 23 -ge 22 ]
  2969. + allow su logcat_exec file getattr execute
  2970. + addFile sepolicy
  2971. + [ -n ]
  2972. + echo sbin/su sepolicy
  2973. + grep -qE \bsepolicy\b
  2974. + [ -z su -o -z logcat_exec -o -z file -o -z getattr execute ]
  2975. + echo getattr execute
  2976. + tr ,
  2977. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t logcat_exec -c file -p getattr,execute -P sepolicy
  2978. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2979. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2980. libsepol.policydb_index_others: security: 87 classes, 9773 rules, 0 cond rules
  2981. + suNetworkL0 su
  2982. + /tmp/superuser/scripts/bin/sepolicy-inject -a netdomain -s su -P sepolicy
  2983. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2984. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2985. libsepol.policydb_index_others: security: 87 classes, 9774 rules, 0 cond rules
  2986. + /tmp/superuser/scripts/bin/sepolicy-inject -a bluetoothdomain -s su -P sepolicy
  2987. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  2988. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  2989. libsepol.policydb_index_others: security: 87 classes, 9774 rules, 0 cond rules
  2990. + suL1 su
  2991. + suMiscL1 su
  2992. + allowFSRWX su shell_data_file
  2993. + allowFSRW su shell_data_file
  2994. + allow su shell_data_file dir open getattr read search ioctl open search write add_name remove_name create
  2995. + addFile sepolicy
  2996. + [ -n ]
  2997. + echo sbin/su sepolicy
  2998. + grep -qE \bsepolicy\b
  2999. + [ -z su -o -z shell_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3000. + echo open getattr read search ioctl open search write add_name remove_name create
  3001. + tr ,
  3002. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3003. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3004. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3005. libsepol.policydb_index_others: security: 87 classes, 9774 rules, 0 cond rules
  3006. + allow su shell_data_file file getattr open read ioctl lock open append write create setattr
  3007. + addFile sepolicy
  3008. + [ -n ]
  3009. + echo sbin/su sepolicy
  3010. + grep -qE \bsepolicy\b
  3011. + [ -z su -o -z shell_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3012. + echo getattr open read ioctl lock open append write create setattr
  3013. + tr ,
  3014. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3015. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3016. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3017. libsepol.policydb_index_others: security: 87 classes, 9775 rules, 0 cond rules
  3018. + allow su shell_data_file lnk_file read getattr
  3019. + addFile sepolicy
  3020. + [ -n ]
  3021. + echo sbin/su sepolicy
  3022. + grep -qE \bsepolicy\b
  3023. + [ -z su -o -z shell_data_file -o -z lnk_file -o -z read getattr ]
  3024. + echo read getattr
  3025. + tr ,
  3026. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c lnk_file -p read,getattr -P sepolicy
  3027. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3028. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3029. libsepol.policydb_index_others: security: 87 classes, 9776 rules, 0 cond rules
  3030. + allow su shell_data_file file getattr execute execute_no_trans
  3031. + addFile sepolicy
  3032. + [ -n ]
  3033. + echo sbin/su sepolicy
  3034. + grep -qE \bsepolicy\b
  3035. + [ -z su -o -z shell_data_file -o -z file -o -z getattr execute execute_no_trans ]
  3036. + echo getattr execute execute_no_trans
  3037. + tr ,
  3038. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t shell_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
  3039. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3040. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3041. libsepol.policydb_index_others: security: 87 classes, 9777 rules, 0 cond rules
  3042. + [ 23 -ge 20 ]
  3043. + [ 23 -ge 23 ]
  3044. + allowFSR su storage_file mnt_user_file
  3045. + allow su storage_file mnt_user_file dir open getattr read search ioctl
  3046. + addFile sepolicy
  3047. + [ -n ]
  3048. + echo sbin/su sepolicy
  3049. + grep -qE \bsepolicy\b
  3050. + [ -z su -o -z storage_file mnt_user_file -o -z dir -o -z open getattr read search ioctl ]
  3051. + echo open getattr read search ioctl
  3052. + tr ,
  3053. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3054. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3055. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3056. libsepol.policydb_index_others: security: 87 classes, 9777 rules, 0 cond rules
  3057. + echo open getattr read search ioctl
  3058. + tr ,
  3059. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3060. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3061. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3062. libsepol.policydb_index_others: security: 87 classes, 9778 rules, 0 cond rules
  3063. + allow su storage_file mnt_user_file file getattr open read ioctl lock
  3064. + addFile sepolicy
  3065. + [ -n ]
  3066. + echo sbin/su sepolicy
  3067. + grep -qE \bsepolicy\b
  3068. + [ -z su -o -z storage_file mnt_user_file -o -z file -o -z getattr open read ioctl lock ]
  3069. + echo getattr open read ioctl lock
  3070. + tr ,
  3071. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3072. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3073. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3074. libsepol.policydb_index_others: security: 87 classes, 9779 rules, 0 cond rules
  3075. + echo getattr open read ioctl lock
  3076. + tr ,
  3077. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3078. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3079. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3080. libsepol.policydb_index_others: security: 87 classes, 9780 rules, 0 cond rules
  3081. + allow su storage_file mnt_user_file lnk_file read getattr
  3082. + addFile sepolicy
  3083. + [ -n ]
  3084. + echo sbin/su sepolicy
  3085. + grep -qE \bsepolicy\b
  3086. + [ -z su -o -z storage_file mnt_user_file -o -z lnk_file -o -z read getattr ]
  3087. + echo read getattr
  3088. + tr ,
  3089. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t storage_file -c lnk_file -p read,getattr -P sepolicy
  3090. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3091. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3092. libsepol.policydb_index_others: security: 87 classes, 9781 rules, 0 cond rules
  3093. + echo read getattr
  3094. + tr ,
  3095. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t mnt_user_file -c lnk_file -p read,getattr -P sepolicy
  3096. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3097. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3098. libsepol.policydb_index_others: security: 87 classes, 9782 rules, 0 cond rules
  3099. + [ 23 -ge 20 ]
  3100. + allowFSR su fuse
  3101. + allow su fuse dir open getattr read search ioctl
  3102. + addFile sepolicy
  3103. + [ -n ]
  3104. + echo sbin/su sepolicy
  3105. + grep -qE \bsepolicy\b
  3106. + [ -z su -o -z fuse -o -z dir -o -z open getattr read search ioctl ]
  3107. + echo open getattr read search ioctl
  3108. + tr ,
  3109. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3110. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3111. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3112. libsepol.policydb_index_others: security: 87 classes, 9783 rules, 0 cond rules
  3113. + allow su fuse file getattr open read ioctl lock
  3114. + addFile sepolicy
  3115. + [ -n ]
  3116. + echo sbin/su sepolicy
  3117. + grep -qE \bsepolicy\b
  3118. + [ -z su -o -z fuse -o -z file -o -z getattr open read ioctl lock ]
  3119. + echo getattr open read ioctl lock
  3120. + tr ,
  3121. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3122. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3123. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3124. libsepol.policydb_index_others: security: 87 classes, 9784 rules, 0 cond rules
  3125. + allow su fuse lnk_file read getattr
  3126. + addFile sepolicy
  3127. + [ -n ]
  3128. + echo sbin/su sepolicy
  3129. + grep -qE \bsepolicy\b
  3130. + [ -z su -o -z fuse -o -z lnk_file -o -z read getattr ]
  3131. + echo read getattr
  3132. + tr ,
  3133. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t fuse -c lnk_file -p read,getattr -P sepolicy
  3134. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3135. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3136. libsepol.policydb_index_others: security: 87 classes, 9785 rules, 0 cond rules
  3137. + allow su su process ptrace
  3138. + addFile sepolicy
  3139. + [ -n ]
  3140. + echo sbin/su sepolicy
  3141. + grep -qE \bsepolicy\b
  3142. + [ -z su -o -z su -o -z process -o -z ptrace ]
  3143. + echo ptrace
  3144. + tr ,
  3145. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c process -p ptrace -P sepolicy
  3146. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3147. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3148. libsepol.policydb_index_others: security: 87 classes, 9786 rules, 0 cond rules
  3149. + suServicesL1 su
  3150. + [ 23 -ge 20 ]
  3151. + allow su servicemanager service_manager list
  3152. + addFile sepolicy
  3153. + [ -n ]
  3154. + echo sbin/su sepolicy
  3155. + grep -qE \bsepolicy\b
  3156. + [ -z su -o -z servicemanager -o -z service_manager -o -z list ]
  3157. + echo list
  3158. + tr ,
  3159. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t servicemanager -c service_manager -p list -P sepolicy
  3160. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3161. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3162. libsepol.policydb_index_others: security: 87 classes, 9786 rules, 0 cond rules
  3163. + [ 23 -ge 23 ]
  3164. + allow su =service_manager_type-gatekeeper_service service_manager find
  3165. + addFile sepolicy
  3166. + [ -n ]
  3167. + echo sbin/su sepolicy
  3168. + grep -qE \bsepolicy\b
  3169. + [ -z su -o -z =service_manager_type-gatekeeper_service -o -z service_manager -o -z find ]
  3170. + echo find
  3171. + tr ,
  3172. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t =service_manager_type-gatekeeper_service -c service_manager -p find -P sepolicy
  3173. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3174. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3175. libsepol.policydb_index_others: security: 87 classes, 9787 rules, 0 cond rules
  3176. + suNetworkL1 su
  3177. + allow su su netlink_route_socket create setopt bind getattr write nlmsg_read read
  3178. + addFile sepolicy
  3179. + [ -n ]
  3180. + echo sbin/su sepolicy
  3181. + grep -qE \bsepolicy\b
  3182. + [ -z su -o -z su -o -z netlink_route_socket -o -z create setopt bind getattr write nlmsg_read read ]
  3183. + echo create setopt bind getattr write nlmsg_read read
  3184. + tr ,
  3185. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p create,setopt,bind,getattr,write,nlmsg_read,read -P sepolicy
  3186. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3187. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3188. libsepol.policydb_index_others: security: 87 classes, 9910 rules, 0 cond rules
  3189. + [ 23 -ge 20 ]
  3190. + allowFSR su net_data_file
  3191. + allow su net_data_file dir open getattr read search ioctl
  3192. + addFile sepolicy
  3193. + [ -n ]
  3194. + echo sbin/su sepolicy
  3195. + grep -qE \bsepolicy\b
  3196. + [ -z su -o -z net_data_file -o -z dir -o -z open getattr read search ioctl ]
  3197. + echo open getattr read search ioctl
  3198. + tr ,
  3199. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c dir -p open,getattr,read,search,ioctl -P sepolicy
  3200. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3201. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3202. libsepol.policydb_index_others: security: 87 classes, 9911 rules, 0 cond rules
  3203. + allow su net_data_file file getattr open read ioctl lock
  3204. + addFile sepolicy
  3205. + [ -n ]
  3206. + echo sbin/su sepolicy
  3207. + grep -qE \bsepolicy\b
  3208. + [ -z su -o -z net_data_file -o -z file -o -z getattr open read ioctl lock ]
  3209. + echo getattr open read ioctl lock
  3210. + tr ,
  3211. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c file -p getattr,open,read,ioctl,lock -P sepolicy
  3212. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3213. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3214. libsepol.policydb_index_others: security: 87 classes, 9912 rules, 0 cond rules
  3215. + allow su net_data_file lnk_file read getattr
  3216. + addFile sepolicy
  3217. + [ -n ]
  3218. + echo sbin/su sepolicy
  3219. + grep -qE \bsepolicy\b
  3220. + [ -z su -o -z net_data_file -o -z lnk_file -o -z read getattr ]
  3221. + echo read getattr
  3222. + tr ,
  3223. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t net_data_file -c lnk_file -p read,getattr -P sepolicy
  3224. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3225. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3226. libsepol.policydb_index_others: security: 87 classes, 9913 rules, 0 cond rules
  3227. + true
  3228. + suL3 su
  3229. + suFirewall su
  3230. + suToApps su
  3231. + allow su untrusted_app fifo_file ioctl getattr
  3232. + addFile sepolicy
  3233. + [ -n ]
  3234. + echo sbin/su sepolicy
  3235. + grep -qE \bsepolicy\b
  3236. + [ -z su -o -z untrusted_app -o -z fifo_file -o -z ioctl getattr ]
  3237. + echo ioctl getattr
  3238. + tr ,
  3239. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t untrusted_app -c fifo_file -p ioctl,getattr -P sepolicy
  3240. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3241. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3242. libsepol.policydb_index_others: security: 87 classes, 9914 rules, 0 cond rules
  3243. + allow su app_data_file dir search getattr
  3244. + addFile sepolicy
  3245. + [ -n ]
  3246. + echo sbin/su sepolicy
  3247. + grep -qE \bsepolicy\b
  3248. + [ -z su -o -z app_data_file -o -z dir -o -z search getattr ]
  3249. + echo search getattr
  3250. + tr ,
  3251. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c dir -p search,getattr -P sepolicy
  3252. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3253. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3254. libsepol.policydb_index_others: security: 87 classes, 9914 rules, 0 cond rules
  3255. + allow su app_data_file file getattr execute read open execute_no_trans
  3256. + addFile sepolicy
  3257. + [ -n ]
  3258. + echo sbin/su sepolicy
  3259. + grep -qE \bsepolicy\b
  3260. + [ -z su -o -z app_data_file -o -z file -o -z getattr execute read open execute_no_trans ]
  3261. + echo getattr execute read open execute_no_trans
  3262. + tr ,
  3263. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t app_data_file -c file -p getattr,execute,read,open,execute_no_trans -P sepolicy
  3264. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3265. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3266. libsepol.policydb_index_others: security: 87 classes, 9915 rules, 0 cond rules
  3267. + allow su su unix_stream_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  3268. + addFile sepolicy
  3269. + [ -n ]
  3270. + echo sbin/su sepolicy
  3271. + grep -qE \bsepolicy\b
  3272. + [ -z su -o -z su -o -z unix_stream_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept ]
  3273. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown listen accept
  3274. + tr ,
  3275. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c unix_stream_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown,listen,accept -P sepolicy
  3276. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3277. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3278. libsepol.policydb_index_others: security: 87 classes, 9916 rules, 0 cond rules
  3279. + allow su su rawip_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3280. + addFile sepolicy
  3281. + [ -n ]
  3282. + echo sbin/su sepolicy
  3283. + grep -qE \bsepolicy\b
  3284. + [ -z su -o -z su -o -z rawip_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3285. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3286. + tr ,
  3287. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c rawip_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3288. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3289. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3290. libsepol.policydb_index_others: security: 87 classes, 9916 rules, 0 cond rules
  3291. + allow su su udp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3292. + addFile sepolicy
  3293. + [ -n ]
  3294. + echo sbin/su sepolicy
  3295. + grep -qE \bsepolicy\b
  3296. + [ -z su -o -z su -o -z udp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3297. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3298. + tr ,
  3299. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c udp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3300. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3301. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3302. libsepol.policydb_index_others: security: 87 classes, 9917 rules, 0 cond rules
  3303. + allow su su tcp_socket create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3304. + addFile sepolicy
  3305. + [ -n ]
  3306. + echo sbin/su sepolicy
  3307. + grep -qE \bsepolicy\b
  3308. + [ -z su -o -z su -o -z tcp_socket -o -z create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown ]
  3309. + echo create ioctl read getattr write setattr lock append bind connect getopt setopt shutdown
  3310. + tr ,
  3311. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c tcp_socket -p create,ioctl,read,getattr,write,setattr,lock,append,bind,connect,getopt,setopt,shutdown -P sepolicy
  3312. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3313. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3314. libsepol.policydb_index_others: security: 87 classes, 9918 rules, 0 cond rules
  3315. + allow su su capability net_raw net_admin
  3316. + addFile sepolicy
  3317. + [ -n ]
  3318. + echo sbin/su sepolicy
  3319. + grep -qE \bsepolicy\b
  3320. + [ -z su -o -z su -o -z capability -o -z net_raw net_admin ]
  3321. + echo net_raw net_admin
  3322. + tr ,
  3323. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p net_raw,net_admin -P sepolicy
  3324. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3325. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3326. libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
  3327. + allow su su netlink_route_socket nlmsg_write
  3328. + addFile sepolicy
  3329. + [ -n ]
  3330. + echo sbin/su sepolicy
  3331. + grep -qE \bsepolicy\b
  3332. + [ -z su -o -z su -o -z netlink_route_socket -o -z nlmsg_write ]
  3333. + echo nlmsg_write
  3334. + tr ,
  3335. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c netlink_route_socket -p nlmsg_write -P sepolicy
  3336. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3337. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3338. libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
  3339. + suBind
  3340. + allow su_daemon su_exec file mounton read
  3341. + addFile sepolicy
  3342. + [ -n ]
  3343. + echo sbin/su sepolicy
  3344. + grep -qE \bsepolicy\b
  3345. + [ -z su_daemon -o -z su_exec -o -z file -o -z mounton read ]
  3346. + echo mounton read
  3347. + tr ,
  3348. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_exec -c file -p mounton,read -P sepolicy
  3349. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3350. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3351. libsepol.policydb_index_others: security: 87 classes, 9919 rules, 0 cond rules
  3352. + allowFSRWX su_daemon su_device
  3353. + allowFSRW su_daemon su_device
  3354. + allow su_daemon su_device dir open getattr read search ioctl open search write add_name remove_name create
  3355. + addFile sepolicy
  3356. + [ -n ]
  3357. + echo sbin/su sepolicy
  3358. + grep -qE \bsepolicy\b
  3359. + [ -z su_daemon -o -z su_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3360. + echo open getattr read search ioctl open search write add_name remove_name create
  3361. + tr ,
  3362. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3363. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3364. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3365. libsepol.policydb_index_others: security: 87 classes, 9920 rules, 0 cond rules
  3366. + allow su_daemon su_device file getattr open read ioctl lock open append write create setattr
  3367. + addFile sepolicy
  3368. + [ -n ]
  3369. + echo sbin/su sepolicy
  3370. + grep -qE \bsepolicy\b
  3371. + [ -z su_daemon -o -z su_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3372. + echo getattr open read ioctl lock open append write create setattr
  3373. + tr ,
  3374. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3375. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3376. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3377. libsepol.policydb_index_others: security: 87 classes, 9920 rules, 0 cond rules
  3378. + allow su_daemon su_device lnk_file read getattr
  3379. + addFile sepolicy
  3380. + [ -n ]
  3381. + echo sbin/su sepolicy
  3382. + grep -qE \bsepolicy\b
  3383. + [ -z su_daemon -o -z su_device -o -z lnk_file -o -z read getattr ]
  3384. + echo read getattr
  3385. + tr ,
  3386. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c lnk_file -p read,getattr -P sepolicy
  3387. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3388. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3389. libsepol.policydb_index_others: security: 87 classes, 9921 rules, 0 cond rules
  3390. + allow su_daemon su_device file getattr execute execute_no_trans
  3391. + addFile sepolicy
  3392. + [ -n ]
  3393. + echo sbin/su sepolicy
  3394. + grep -qE \bsepolicy\b
  3395. + [ -z su_daemon -o -z su_device -o -z file -o -z getattr execute execute_no_trans ]
  3396. + echo getattr execute execute_no_trans
  3397. + tr ,
  3398. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p getattr,execute,execute_no_trans -P sepolicy
  3399. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3400. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3401. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3402. + allow su_daemon su_device file relabelfrom
  3403. + addFile sepolicy
  3404. + [ -n ]
  3405. + echo sbin/su sepolicy
  3406. + grep -qE \bsepolicy\b
  3407. + [ -z su_daemon -o -z su_device -o -z file -o -z relabelfrom ]
  3408. + echo relabelfrom
  3409. + tr ,
  3410. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t su_device -c file -p relabelfrom -P sepolicy
  3411. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3412. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3413. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3414. + allow su_daemon system_file file relabelto
  3415. + addFile sepolicy
  3416. + [ -n ]
  3417. + echo sbin/su sepolicy
  3418. + grep -qE \bsepolicy\b
  3419. + [ -z su_daemon -o -z system_file -o -z file -o -z relabelto ]
  3420. + echo relabelto
  3421. + tr ,
  3422. + /tmp/superuser/scripts/bin/sepolicy-inject -s su_daemon -t system_file -c file -p relabelto -P sepolicy
  3423. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3424. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3425. libsepol.policydb_index_others: security: 87 classes, 9922 rules, 0 cond rules
  3426. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedobject -s su_device -P sepolicy
  3427. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3428. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3429. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3430. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su_daemon -P sepolicy
  3431. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3432. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3433. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3434. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s su -P sepolicy
  3435. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3436. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3437. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3438. + [ eng == power -o eng == eng ]
  3439. + suL6 su
  3440. + suBackL6 su
  3441. + allowFSRWX surfaceflinger app_data_file
  3442. + allowFSRW surfaceflinger app_data_file
  3443. + allow surfaceflinger app_data_file dir open getattr read search ioctl open search write add_name remove_name create
  3444. + addFile sepolicy
  3445. + [ -n ]
  3446. + echo sbin/su sepolicy
  3447. + grep -qE \bsepolicy\b
  3448. + [ -z surfaceflinger -o -z app_data_file -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3449. + echo open getattr read search ioctl open search write add_name remove_name create
  3450. + tr ,
  3451. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3452. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3453. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3454. libsepol.policydb_index_others: security: 87 classes, 9923 rules, 0 cond rules
  3455. + allow surfaceflinger app_data_file file getattr open read ioctl lock open append write create setattr
  3456. + addFile sepolicy
  3457. + [ -n ]
  3458. + echo sbin/su sepolicy
  3459. + grep -qE \bsepolicy\b
  3460. + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3461. + echo getattr open read ioctl lock open append write create setattr
  3462. + tr ,
  3463. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3464. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3465. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3466. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3467. + allow surfaceflinger app_data_file lnk_file read getattr
  3468. + addFile sepolicy
  3469. + [ -n ]
  3470. + echo sbin/su sepolicy
  3471. + grep -qE \bsepolicy\b
  3472. + [ -z surfaceflinger -o -z app_data_file -o -z lnk_file -o -z read getattr ]
  3473. + echo read getattr
  3474. + tr ,
  3475. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c lnk_file -p read,getattr -P sepolicy
  3476. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3477. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3478. libsepol.policydb_index_others: security: 87 classes, 9924 rules, 0 cond rules
  3479. + allow surfaceflinger app_data_file file getattr execute execute_no_trans
  3480. + addFile sepolicy
  3481. + [ -n ]
  3482. + echo sbin/su sepolicy
  3483. + grep -qE \bsepolicy\b
  3484. + [ -z surfaceflinger -o -z app_data_file -o -z file -o -z getattr execute execute_no_trans ]
  3485. + echo getattr execute execute_no_trans
  3486. + tr ,
  3487. + /tmp/superuser/scripts/bin/sepolicy-inject -s surfaceflinger -t app_data_file -c file -p getattr,execute,execute_no_trans -P sepolicy
  3488. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3489. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3490. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3491. + /tmp/superuser/scripts/bin/sepolicy-inject -a mlstrustedsubject -s surfaceflinger -P sepolicy
  3492. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3493. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3494. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3495. + suL8 su
  3496. + suMiscL8 su
  3497. + allow su system_file file mounton
  3498. + addFile sepolicy
  3499. + [ -n ]
  3500. + echo sbin/su sepolicy
  3501. + grep -qE \bsepolicy\b
  3502. + [ -z su -o -z system_file -o -z file -o -z mounton ]
  3503. + echo mounton
  3504. + tr ,
  3505. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t system_file -c file -p mounton -P sepolicy
  3506. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3507. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3508. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3509. + allow su su capability sys_admin
  3510. + addFile sepolicy
  3511. + [ -n ]
  3512. + echo sbin/su sepolicy
  3513. + grep -qE \bsepolicy\b
  3514. + [ -z su -o -z su -o -z capability -o -z sys_admin ]
  3515. + echo sys_admin
  3516. + tr ,
  3517. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
  3518. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3519. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3520. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3521. + suL9 su
  3522. + suMiscL9 su
  3523. + allow su labeledfs filesystem remount unmount
  3524. + addFile sepolicy
  3525. + [ -n ]
  3526. + echo sbin/su sepolicy
  3527. + grep -qE \bsepolicy\b
  3528. + [ -z su -o -z labeledfs -o -z filesystem -o -z remount unmount ]
  3529. + echo remount unmount
  3530. + tr ,
  3531. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t labeledfs -c filesystem -p remount,unmount -P sepolicy
  3532. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3533. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3534. libsepol.policydb_index_others: security: 87 classes, 9925 rules, 0 cond rules
  3535. + allow su rootfs filesystem remount
  3536. + addFile sepolicy
  3537. + [ -n ]
  3538. + echo sbin/su sepolicy
  3539. + grep -qE \bsepolicy\b
  3540. + [ -z su -o -z rootfs -o -z filesystem -o -z remount ]
  3541. + echo remount
  3542. + tr ,
  3543. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t rootfs -c filesystem -p remount -P sepolicy
  3544. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3545. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3546. libsepol.policydb_index_others: security: 87 classes, 9926 rules, 0 cond rules
  3547. + allowFSRW su block_device
  3548. + allow su block_device dir open getattr read search ioctl open search write add_name remove_name create
  3549. + addFile sepolicy
  3550. + [ -n ]
  3551. + echo sbin/su sepolicy
  3552. + grep -qE \bsepolicy\b
  3553. + [ -z su -o -z block_device -o -z dir -o -z open getattr read search ioctl open search write add_name remove_name create ]
  3554. + echo open getattr read search ioctl open search write add_name remove_name create
  3555. + tr ,
  3556. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c dir -p open,getattr,read,search,ioctl,open,search,write,add_name,remove_name,create -P sepolicy
  3557. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3558. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3559. libsepol.policydb_index_others: security: 87 classes, 9927 rules, 0 cond rules
  3560. + allow su block_device file getattr open read ioctl lock open append write create setattr
  3561. + addFile sepolicy
  3562. + [ -n ]
  3563. + echo sbin/su sepolicy
  3564. + grep -qE \bsepolicy\b
  3565. + [ -z su -o -z block_device -o -z file -o -z getattr open read ioctl lock open append write create setattr ]
  3566. + echo getattr open read ioctl lock open append write create setattr
  3567. + tr ,
  3568. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c file -p getattr,open,read,ioctl,lock,open,append,write,create,setattr -P sepolicy
  3569. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3570. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3571. libsepol.policydb_index_others: security: 87 classes, 9928 rules, 0 cond rules
  3572. + allow su block_device lnk_file read getattr
  3573. + addFile sepolicy
  3574. + [ -n ]
  3575. + echo sbin/su sepolicy
  3576. + grep -qE \bsepolicy\b
  3577. + [ -z su -o -z block_device -o -z lnk_file -o -z read getattr ]
  3578. + echo read getattr
  3579. + tr ,
  3580. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c lnk_file -p read,getattr -P sepolicy
  3581. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3582. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3583. libsepol.policydb_index_others: security: 87 classes, 9929 rules, 0 cond rules
  3584. + allow su block_device blk_file getattr open read ioctl lock open append write
  3585. + addFile sepolicy
  3586. + [ -n ]
  3587. + echo sbin/su sepolicy
  3588. + grep -qE \bsepolicy\b
  3589. + [ -z su -o -z block_device -o -z blk_file -o -z getattr open read ioctl lock open append write ]
  3590. + echo getattr open read ioctl lock open append write
  3591. + tr ,
  3592. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t block_device -c blk_file -p getattr,open,read,ioctl,lock,open,append,write -P sepolicy
  3593. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3594. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3595. libsepol.policydb_index_others: security: 87 classes, 9930 rules, 0 cond rules
  3596. + allow su su capability sys_admin
  3597. + addFile sepolicy
  3598. + [ -n ]
  3599. + echo sbin/su sepolicy
  3600. + grep -qE \bsepolicy\b
  3601. + [ -z su -o -z su -o -z capability -o -z sys_admin ]
  3602. + echo sys_admin
  3603. + tr ,
  3604. + /tmp/superuser/scripts/bin/sepolicy-inject -s su -t su -c capability -p sys_admin -P sepolicy
  3605. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3606. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3607. libsepol.policydb_index_others: security: 87 classes, 9931 rules, 0 cond rules
  3608. + [ eng == eng ]
  3609. + /tmp/superuser/scripts/bin/sepolicy-inject -Z su -P sepolicy
  3610. libsepol.policydb_index_others: security: 1 users, 2 roles, 1009 types, 0 bools
  3611. libsepol.policydb_index_others: security: 1 sens, 1024 cats
  3612. libsepol.policydb_index_others: security: 87 classes, 9931 rules, 0 cond rules
  3613. + [ 0 -ne 0 -o 0 -ne 0 ]
  3614. + [ 0 -ne 0 ]
  3615. + sed -i /flash_recovery/a \ disabled init.rc
  3616. + sed -i /on init/a \ chmod 0755 /sbin init.rc
  3617. + echo -e service su /sbin/su --daemon\n\tclass main\n\tseclabel u:r:su_daemon:s0\n
  3618. + addFile init.rc
  3619. + [ -n ]
  3620. + echo sbin/su sepolicy
  3621. + grep -qE \binit.rc\b
  3622. + INITRAMFS_FILES= sbin/su sepolicy init.rc
  3623. + VERSIONED=1
  3624. + [ -n 1 ]
  3625. + [ -f /tmp/superuser/scripts/gitversion ]
  3626. + cat /tmp/superuser/scripts/gitversion
  3627. + rev=645f25c
  3628. + echo 645f25c
  3629. + addFile super-bootimg
  3630. + [ -n ]
  3631. + echo sbin/su sepolicy init.rc
  3632. + grep -qE \bsuper-bootimg\b
  3633. + INITRAMFS_FILES= sbin/su sepolicy init.rc super-bootimg
  3634. + doneBootImgEdit
  3635. + echo sbin/su sepolicy init.rc super-bootimg
  3636. + tr \n
  3637. + cpio -o -H newc
  3638. + [ -f /tmp/tmp.d38AAY/ramdisk.gz ]
  3639. + /tmp/superuser/scripts/bin/strip-cpio ramdisk1
  3640. 070701:.
  3641. 070701:mrom_enc
  3642. 070701:mrom_enc/libQSEEComAPI.so
  3643. 070701:mrom_enc/libc.so
  3644. 070701:mrom_enc/libcryptfslollipop.so
  3645. 070701:mrom_enc/libcrypto.so
  3646. 070701:mrom_enc/libcutils.so
  3647. 070701:mrom_enc/libdl.so
  3648. 070701:mrom_enc/libhardware.so
  3649. 070701:mrom_enc/liblog.so
  3650. 070701:mrom_enc/libm.so
  3651. 070701:mrom_enc/libstdc++.so
  3652. 070701:mrom_enc/libstlport.so
  3653. 070701:mrom_enc/libutils.so
  3654. 070701:mrom_enc/linker
  3655. 070701:mrom_enc/res
  3656. 070701:mrom_enc/res/Roboto-Regular.ttf
  3657. 070701:mrom_enc/trampoline_encmnt
  3658. 070701:mrom_enc/vendor
  3659. 070701:mrom_enc/vendor/firmware
  3660. 070701:mrom_enc/vendor/firmware/cmnlib.b00
  3661. 070701:mrom_enc/vendor/firmware/cmnlib.b01
  3662. 070701:mrom_enc/vendor/firmware/cmnlib.b02
  3663. 070701:mrom_enc/vendor/firmware/cmnlib.b03
  3664. 070701:mrom_enc/vendor/firmware/cmnlib.mdt
  3665. 070701:mrom_enc/vendor/firmware/keymaster
  3666. 070701:mrom_enc/vendor/firmware/keymaster/keymaster.b00
  3667. 070701:mrom_enc/vendor/firmware/keymaster/keymaster.b01
  3668. 070701:mrom_enc/vendor/firmware/keymaster/keymaster.b02
  3669. 070701:mrom_enc/vendor/firmware/keymaster/keymaster.b03
  3670. 070701:mrom_enc/vendor/firmware/keymaster/keymaster.mdt
  3671. 070701:mrom_enc/vendor/lib
  3672. 070701:mrom_enc/vendor/lib/hw
  3673. 070701:mrom_enc/vendor/lib/hw/keystore.default.so
  3674. 070701:mrom.fstab
  3675. 070701:init
  3676. 070701:main_init
  3677. 070701:init.qcom.wifi.sh
  3678. 070701:init.qcom.firmware_links.sh
  3679. 070701:init.qcom.factory.sh
  3680. 070701:ueventd.qcom.rc
  3681. 070701:init.qcom.class_core.sh
  3682. 070701:ueventd.rc
  3683. 070701:service_contexts
  3684. 070701:sbin
  3685. 070701:sbin/watchdogd
  3686. 070701:sbin/ueventd
  3687. 070701:sbin/mfgsrv
  3688. 070701:sbin/adbd
  3689. 070701:sbin/sfc
  3690. 070701:sbin/healthd
  3691. 070701:sbin/crashdump
  3692. 070701:sbin/gzip_recvy
  3693. 070701:system
  3694. 070701:data
  3695. 070701:init.usbdiag.sh
  3696. 070701:init.trace.rc
  3697. 070701:init.ril.rc
  3698. 070701:init.qcom.early_boot.sh
  3699. 070701:proc
  3700. 070701:ueventd.target.rc
  3701. 070701:init.power.rc
  3702. 070701:init.qcom.post_boot.sh
  3703. 070701:cwkeys
  3704. 070701:sepolicy
  3705. 070701:init.environ.rc
  3706. 070701:init.project.rc
  3707. 070701:fstab.qcom
  3708. 070701:res
  3709. 070701:res/images
  3710. 070701:res/images/charger
  3711. 070701:res/images/charger/battery_fail.png
  3712. 070701:res/images/charger/battery_scale.png
  3713. 070701:init.htc.audio.sh
  3714. 070701:init.zygote32.rc
  3715. 070701:init.rc
  3716. 070701:init.network.sh
  3717. 070701:init.target.rc
  3718. 070701:property_contexts
  3719. 070701:dev
  3720. 070701:file_contexts
  3721. 070701:init.qcom.ril.sh
  3722. 070701:oem
  3723. 070701:sys
  3724. 070701:init.qcom.audio.sh
  3725. 070701:selinux_version
  3726. 070701:init.qcom.syspart_fixup.sh
  3727. 070701:charger
  3728. 070701:seapp_contexts
  3729. 070701:init.qcom.ssr.sh
  3730. 070701:init.usb.rc
  3731. 070701:verity_key
  3732. 070701:init.qcom.sh
  3733. 070701:default.prop
  3734. + cat initramfs-stripped ramdisk2
  3735. + gzip -9 -c
  3736. + cd /tmp/tmp.d38AAY
  3737. + rm -Rf /tmp/tmp.Etg5oQ
  3738. + /tmp/superuser/scripts/bin/bootimg-repack /realdata/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img
  3739. + cp new-boot.img /tmp/superuser/scripts/su
  3740. + cd /tmp/superuser/scripts/su
  3741. + rm -Rf /tmp/tmp.d38AAY
  3742. + [ -f /tmp/superuser/scripts/keystore.x509.pem -a -f /tmp/superuser/scripts/keystore.pk8 ]
  3743. + cleanup
  3744. + rm -Rf /tmp/tmp.d38AAY /tmp/tmp.Etg5oQ
  3745. + ui_print Generated /new-boot.img
  3746. + echo ui_print Generated /new-boot.img
  3747. + dd if=new-boot.img of=/dev/block/platform/msm_sdcc.1/by-name/boot bs=8192
  3748. Generated /new-boot.img1369+1 records in
  3749. 1369+1 records out
  3750. 11220992 bytes (10.7MB) copied, 0.104113 seconds, 102.8MB/s
  3751. + ui_print Flashed root-ed boot.img
  3752. + echo ui_print Flashed root-ed boot.img
  3753. Flashed root-ed boot.imgI:Legacy property environment disabled.
  3754. rm: can't remove 'META-INF/com/google/android': No such file or directory
  3755. ZIP successfully installed
  3756. I:Running cmd "rm "/dev/block/mmcblk0p42""
  3757. I:Running cmd "mv "/dev/block/mmcblk0p42"-orig "/dev/block/mmcblk0p42""
  3758. Restoring mounts...
  3759. losetup: /dev/block/loop0: No such device or address
  3760. losetup: /dev/block/loop1: No such device or address
  3761. losetup: /dev/block/loop2: No such device or address
  3762. losetup: /dev/block/loop3: No such device or address
  3763. losetup: /dev/block/loop4: No such device or address
  3764. losetup: /dev/block/loop5: No such device or address
  3765. losetup: /dev/block/loop6: No such device or address
  3766. losetup: /dev/block/loop7: No such device or address
  3767. I:Partition /external_sd is mounted during TWPartitionManager::Pop_Context()
  3768. Updating partition details...
  3769. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  3770. I:Data backup size is 2839MB, free: 17104MB.
  3771. I:sending message to remove 65539
  3772. mtppipe remove storage 65539
  3773. I:Message sent, remove storage ID: 65539
  3774. I:Unable to mount '/usb_otg'
  3775. I:Actual block device: '', current file system: 'vfat'
  3776. ...done
  3777. I:mount -o bind '/data/media/0' '/sdcard' process ended with RC=0
  3778. Extracting contents of boot.img...
  3779. I:Running cmd "rm -r "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/"*"
  3780. rm: can't remove '/tmp/boot': No such file or directory
  3781. Ramdisk uses GZIP compression
  3782. cpio: unrecognized file type
  3783. I:Running cmd "cp -a /tmp/boot/*.rc "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3784. I:Running cmd "cp -a /tmp/boot/default.prop "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3785. I:Running cmd "cp -a /tmp/boot/init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3786. I:Running cmd "cp -a /tmp/boot/main_init "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3787. I:Running cmd "cp -a /tmp/boot/fstab.* "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3788. I:Running cmd "cp -a /tmp/boot/file_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3789. I:Running cmd "cp -a /tmp/boot/property_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3790. I:Running cmd "cp -a /tmp/boot/seapp_contexts "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3791. I:Running cmd "cp -a /tmp/boot/sepolicy "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3792. I:Running cmd "cp -a /tmp/boot/system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3793. I:Running cmd "cp -a /tmp/boot/data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3794. I:Running cmd "cp -a /tmp/boot/cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3795. cp: can't stat '/tmp/boot/cache': No such file or directory
  3796. I:Running cmd "cp -a /tmp/boot//system "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3797. I:Running cmd "cp -a /tmp/boot//data "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3798. I:Running cmd "cp -a /tmp/boot//cache "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot/""
  3799. cp: can't stat '/tmp/boot//cache': No such file or directory
  3800. I:Running cmd "cd "/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot" && rm cmdline ramdisk.gz zImage"
  3801. rm: can't remove 'cmdline': No such file or directory
  3802. rm: can't remove 'ramdisk.gz': No such file or directory
  3803. rm: can't remove 'zImage': No such file or directory
  3804. Injecting boot.img..
  3805. I:Running cmd ""/data/media/0/multirom/trampoline" --inject="/data/media/0/multirom/roms/M8_GPE_5.07.1700.8_stock_C/boot.img" --mrom_dir="/data/media/0/multirom" -f"
  3806. I:Set page: 'multirom_action_complete'
  3807. I:operation_end - status=1
  3808. I:Set page: 'main'
  3809. I:Set page: 'clear_vars'
  3810. I:Set page: 'main2'
  3811. I:Set page: 'mount'
  3812. I:Set page: 'main'
  3813. I:Set page: 'clear_vars'
  3814. I:Set page: 'main2'
  3815. I:Set page: 'advanced'
  3816. I:Set page: 'confirm_action'
  3817. I:Set page: 'action_page'
  3818. I:operation_start: 'Copy Log'
  3819. I:Copying file /tmp/recovery.log to /external_sd/recovery.log
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement