Skip to content

Instantly share code, notes, and snippets.

@skinzor
Created October 13, 2018 15:24
Show Gist options
  • Select an option

  • Save skinzor/e2e036fe45d19b70192d0ff5031a4039 to your computer and use it in GitHub Desktop.

Select an option

Save skinzor/e2e036fe45d19b70192d0ff5031a4039 to your computer and use it in GitHub Desktop.
Selinux denials on LineageOS 15
38,29568,3810095864,-;type=1400 audit(1537897839.090:637): avc: denied { search } for pid=552 comm="CAM_startsensor" name="leds" dev="sysfs" ino=18887 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
38,29569,3810095882,-;type=1400 audit(1537897839.090:638): avc: denied { read } for pid=552 comm="CAM_startsensor" name="dual_leds" dev="sysfs" ino=27876 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
38,29570,3810095984,-;type=1400 audit(1537897839.090:638): avc: denied { read } for pid=552 comm="CAM_startsensor" name="dual_leds" dev="sysfs" ino=27876 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
38,29571,3810095995,-;type=1400 audit(1537897839.090:639): avc: denied { open } for pid=552 comm="CAM_startsensor" path="/sys/devices/soc/soc:qcom,camera-flash/leds/dual_leds" dev="sysfs" ino=27876 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
38,29593,3810168379,+;type=1400 audit(1537897839.090:639): avc: denied { open } for pid=552 comm="CAM_startsensor" path="/sys/devices/soc/soc:qcom,camera-flash/leds/dual_leds" dev="sysfs" ino=27876 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
38,29594,3810168401,-;type=1400 audit(1537897839.170:640): avc: denied { write } for pid=474 comm="provider@2.4-se" name="cam_socket1" dev="mmcblk0p61" ino=10578 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=sock_file permissive=1
38,29611,3811281815,-;type=1400 audit(1537897839.170:640): avc: denied { write } for pid=474 comm="provider@2.4-se" name="cam_socket1" dev="mmcblk0p61" ino=10578 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=sock_file permissive=1
38,30998,3978774069,-;type=1400 audit(1537898056.275:684): avc: denied { read write } for pid=557 comm="android.hardwar" name="fp_stats_all" dev="mmcblk0p37" ino=8566 scontext=u:r:init:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1
38,30999,3978774179,-;type=1400 audit(1537898056.275:684): avc: denied { read write } for pid=557 comm="android.hardwar" name="fp_stats_all" dev="mmcblk0p37" ino=8566 scontext=u:r:init:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1
38,31000,3978774188,-;type=1400 audit(1537898056.275:685): avc: denied { open } for pid=557 comm="android.hardwar" path="/log/fingerprint/fp_stats_all" dev="mmcblk0p37" ino=8566 scontext=u:r:init:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1
38,31024,3978823487,-;type=1400 audit(1537898056.275:685): avc: denied { open } for pid=557 comm="android.hardwar" path="/log/fingerprint/fp_stats_all" dev="mmcblk0p37" ino=8566 scontext=u:r:init:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=1
=============================================================================
38,2748,8752232,-;type=1400 audit(1537991002.880:78): avc: denied { unlink } for pid=561 comm="mm-qcamera-daem" name="cam_socket1" dev="mmcblk0p61" ino=125059 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:camera_data_file:s0 tclass=sock_file permissive=1
38,2750,8752405,-;type=1400 audit(1537991002.880:79): avc: denied { create } for pid=561 comm="mm-qcamera-daem" name="cam_socket1" scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:camera_data_file:s0 tclass=sock_file permissive=1
38,2143,5613947,-;type=1400 audit(62917758.389:35): avc: denied { read } for pid=562 comm="mac_addr_normal" name="u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=6304 scontext=u:r:macaddr:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
38,2145,5614091,-;type=1400 audit(62917758.389:36): avc: denied { open } for pid=562 comm="mac_addr_normal" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=6304 scontext=u:r:macaddr:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
38,2147,5614166,-;type=1400 audit(62917758.389:37): avc: denied { getattr } for pid=562 comm="mac_addr_normal" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=6304 scontext=u:r:macaddr:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
38,2126,5521634,-;type=1400 audit(62917758.319:32): avc: denied { read write } for pid=528 comm="qmuxd" name="diag" dev="tmpfs" ino=14871 scontext=u:r:qmuxd:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=1
38,2128,5522249,-;type=1400 audit(62917758.319:33): avc: denied { open } for pid=528 comm="qmuxd" path="/dev/diag" dev="tmpfs" ino=14871 scontext=u:r:qmuxd:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=1
38,2130,5522352,-;type=1400 audit(62917758.319:34): avc: denied { ioctl } for pid=528 comm="qmuxd" path="/dev/diag" dev="tmpfs" ino=14871 ioctlcmd=20 scontext=u:r:qmuxd:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=1
38,1927,5104758,-;type=1400 audit(62917757.899:4): avc: denied { write } for pid=501 comm="rmt_storage" name="rmts" dev="debugfs" ino=14585 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1
38,1985,5157352,-;type=1400 audit(62917757.899:5): avc: denied { open } for pid=501 comm="rmt_storage" path="/sys/kernel/debug/rmt_storage/rmts" dev="debugfs" ino=14585 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1
11,2055,5283002,-;selinux: avc: denied { set } for property=HL1CANL01M pid=510 uid=0 gid=0 scontext=u:r:oeminfo:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1\x0a
38,59734,23334411123,-;type=1400 audit(1538048571.882:2591): avc: denied { call } for pid=566 comm="android.hardwar" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1
38,59878,23337172572,-;type=1400 audit(1538048574.642:2596): avc: denied { call } for pid=1043 comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:init:s0 tclass=binder permissive=1
38,2742,8669317,-;type=1400 audit(1537991002.790:77): avc: denied { open } for pid=561 comm="mm-qcamera-daem" path="/sys/devices/soc/1b0c000.qcom,cci/1b0c000.qcom,cci:qcom,camera@3/video4linux/video1/name" dev="sysfs" ino=38492 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
=============================================================================
38,2012,45045681,-;type=1400 audit(63088759.839:5): avc: denied { search } for pid=510 comm="rmt_storage" name="rmt_storage" dev="debugfs" ino=14971 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:debugfs_rmt_storage:s0 tclass=dir permissive=1
38,2347,46770243,-;type=1400 audit(1538162004.794:55): avc: denied { ioctl } for pid=536 comm="rild" path="/vendor/radio/qcril_database/qcril.db" dev="mmcblk0p57" ino=916 ioctlcmd=f50c scontext=u:r:rild:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
38,2742,48447972,-;type=1400 audit(1538162006.474:61): avc: denied { read } for pid=562 comm="mm-qcamera-daem" name="name" dev="sysfs" ino=40019 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:video4linux_sysfs:s0 tclass=file permissive=1
38,2744,48448121,-;type=1400 audit(1538162006.474:62): avc: denied { open } for pid=562 comm="mm-qcamera-daem" path="/sys/devices/soc/1b0c000.qcom,cci/1b0c000.qcom,cci:qcom,camera@3/video4linux/video1/name" dev="sysfs" ino=40019 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:video4linux_sysfs:s0 tclass=file permissive=1
38,2746,48448192,-;type=1400 audit(1538162006.474:63): avc: denied { read } for pid=562 comm="mm-qcamera-daem" name="name" dev="sysfs" ino=40112 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
38,2748,48448256,-;type=1400 audit(1538162006.474:64): avc: denied { open } for pid=562 comm="mm-qcamera-daem" path="/sys/devices/soc/1b0c000.qcom,cci/1b0c000.qcom,cci:qcom,camera@4/video4linux/video2/name" dev="sysfs" ino=40112 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
38,2754,48521133,-;type=1400 audit(1538162006.554:65): avc: denied { unlink } for pid=562 comm="mm-qcamera-daem" name="cam_socket1" dev="mmcblk0p61" ino=20161 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:camera_socket:s0 tclass=sock_file permissive=1
38,2
38,2829,48775251,-;type=1400 audit(1538162006.804:66): avc: denied { unlink } for pid=562 comm="mm-qcamera-daem" name="cam_socket2" dev="mmcblk0p61" ino=124548 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:camera_socket:s0 tclass=sock_file permissive=1
=============================================================================
hwcan:/ # ls -l /dev/block/bootdevice/by-name/ | grep 'mcblk0p24'
lrwxrwxrwx 1 root root 21 1972-01-01 08:00 dsp -> /dev/block/mmcblk0p24
5,1801,29434634,-;audit: type=1400 audit(63093667.239:3): avc: denied { read } for pid=432 comm="e2fsck" name="mmcblk0p24" dev="tmpfs" ino=224 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=1
5,1802,29434690,-;audit: type=1400 audit(63093667.239:4): avc: denied { open } for pid=432 comm="e2fsck" path="/dev/block/mmcblk0p24" dev="tmpfs" ino=224 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=1
5,1803,29434780,-;audit: type=1400 audit(63093667.239:5): avc: denied { write } for pid=432 comm="e2fsck" name="mmcblk0p24" dev="tmpfs" ino=224 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=1
5,1805,29434870,-;audit: type=1400 audit(63093667.239:6): avc: denied { ioctl } for pid=432 comm="e2fsck" path="/dev/block/mmcblk0p24" dev="tmpfs" ino=224 ioctlcmd=127c scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=1
38,2155,44518244,-;type=1400 audit(1538166925.594:30): avc: denied { create } for pid=534 comm="cnss_diag" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,2157,44518310,-;type=1400 audit(1538166925.594:31): avc: denied { bind } for pid=534 comm="cnss_diag" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,2159,44518374,-;type=1400 audit(1538166925.594:32): avc: denied { append } for pid=534 comm="cnss_diag" name="cnss_diag.conf" dev="mmcblk0p61" ino=45946 scontext=u:r:init:s0 tcontext=u:object_r:wifi_data_file:s0 tclass=file permissive=1
38,2163,44518519,-;type=1400 audit(1538166925.594:34): avc: denied { append } for pid=534 comm="cnss_diag" name="host_driver_logs_current.txt" dev="mmcblk0p61" ino=13016 scontext=u:r:init:s0 tcontext=u:object_r:wcnss_data_file:s0 tclass=file permissive=1
38,2165,44518585,-;type=1400 audit(1538166925.594:35): avc: denied { read } for pid=534 comm="cnss_diag" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,3066,52144254,-;type=1400 audit(1538166933.224:67): avc: denied { read } for pid=534 comm="cnss_diag" name="primary" dev="tmpfs" ino=1228 scontext=u:r:init:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file permissive=1
38,2092,44332719,-;type=1400 audit(63093682.139:11): avc: denied { execute_no_trans } for pid=558 comm="init" path="/system/bin/cnss-daemon" dev="mmcblk0p60" ino=2253 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1
38,2105,44395597,-;type=1400 audit(1538166925.474:12): avc: denied { create } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,2107,44395763,-;type=1400 audit(1538166925.474:13): avc: denied { bind } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,3068,52144505,-;type=1400 audit(1538166933.224:68): avc: denied { read } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_socket permissive=1
38,2110,44401161,-;type=1400 audit(1538166925.484:14): avc: denied { create } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_route_socket permissive=1
38
38,2112,44404864,-;type=1400 audit(1538166925.484:15): avc: denied { bind } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_route_socket permissive=1
38,2124,44412378,-;type=1400 audit(1538166925.484:20): avc: denied { read } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_route_socket permissive=1
38,2116,44412029,-;type=1400 audit(1538166925.484:16): avc: denied { create } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_generic_socket permissive=1
38,2118,44412162,-;type=1400 audit(1538166925.484:17): avc: denied { setopt } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_generic_socket permissive=1
38,2120,44412243,-;type=1400 audit(1538166925.484:18): avc: denied { bind } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_generic_socket permissive=1
38,2122,44412314,-;type=1400 audit(1538166925.484:19): avc: denied { getattr } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=netlink_generic_socket permissive=1
38,2128,44412512,-;type=1400 audit(1538166925.484:22): avc: denied { create } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=socket permissive=1
38,2135,44426585,-;type=1400 audit(1538166925.494:25): avc: denied { read } for pid=558 comm="cnss-daemon" scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=socket permissive=1
38,2130,44412575,-;type=1400 audit(1538166925.484:23): avc: denied { ioctl } for pid=558 comm="cnss-daemon" path="socket:[16700]" dev="sockfs" ino=16700 ioctlcmd=c304 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=socket permissive=1
=============================================================================
38,3290,66738039,-;type=1400 audit(1538232978.425:94): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/soc/1c00000.qcom,kgsl-3d0/kgsl/kgsl-3d0/idle_timer" dev="sysfs" ino=24332 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=1
38,2133,44390818,-;type=1400 audit(1538232955.714:27): avc: denied { read } for pid=563 comm="android.hardwar" name="fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
38,2136,44392087,-;type=1400 audit(1538232955.714:28): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/platform/fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
38,2138,44392234,-;type=1400 audit(1538232955.714:29): avc: denied { read write } for pid=563 comm="android.hardwar" name="fingerprint" dev="tmpfs" ino=8315 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_device:s0 tclass=chr_file permissive=1
38,2140,44392307,-;type=1400 audit(1538232955.714:30): avc: denied { open } for pid=563 comm="android.hardwar" path="/dev/fingerprint" dev="tmpfs" ino=8315 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_device:s0 tclass=chr_file permissive=1
38,2142,44392373,-;type=1400 audit(1538232955.714:31): avc: denied { read } for pid=563 comm="android.hardwar" name="app_info" dev="proc" ino=4026532383 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:proc_app_info:s0 tclass=file permissive=1
38,2144,44392768,-;type=1400 audit(1538232955.714:32): avc: denied { open } for pid=563 comm="android.hardwar" path="/proc/app_info" dev="proc" ino=4026532383 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:proc_app_info:s0 tclass=file permissive=1
38,2146,44392842,-;type=1400 audit(1538232955.714:33): avc: denied { getattr } for pid=563 comm="android.hardwar" path="/proc/app_info" dev="proc" ino=4026532383 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:proc_app_info:s0 tclass=file permissive=1
38,2148,44392909,-;type=1400 audit(1538232955.714:34): avc: denied { connectto } for pid=563 comm="android.hardwar" path=0074635F6E735F736F636B6574 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:tee:s0 tclass=unix_stream_socket permissive=1
38,2152,44411506,-;type=1400 audit(1538232955.734:35): avc: denied { read } for pid=511 comm="teecd" scontext=u:r:tee:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=file permissive=1
38,2154,44414462,-;type=1400 audit(1538232955.734:36): avc: denied { search } for pid=511 comm="teecd" name="563" dev="proc" ino=17487 scontext=u:r:tee:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=dir permissive=1
38,2157,44420731,-;type=1400 audit(1538232955.734:37): avc: denied { open } for pid=511 comm="teecd" path="/proc/563/cmdline" dev="proc" ino=837 scontext=u:r:tee:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=file permissive=1
38,2159,44426800,-;type=1400 audit(1538232955.734:38): avc: denied { getattr } for pid=511 comm="teecd" path="/proc/563/cmdline" dev="proc" ino=837 scontext=u:r:tee:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=file permissive=1
38,2246,44758710,-;type=1400 audit(1538232956.074:41): avc: denied { ioctl } for pid=563 comm="android.hardwar" path="/dev/fingerprint" dev="tmpfs" ino=8315 ioctlcmd=6606 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_device:s0 tclass=chr_file permissive=1
38,2358,45400802,-;type=1400 audit(1538232956.724:51): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
38,2360,45401004,-;type=1400 audit(1538232956.724:52): avc: denied { read } for pid=563 comm="android.hardwar" name="fingerprint_chip_info" dev="sysfs" ino=27297 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,2362,45401089,-;type=1400 audit(1538232956.724:53): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/platform/fingerprint/fingerprint_chip_info" dev="sysfs" ino=27297 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,2384,45574415,-;type=1400 audit(1538232956.894:54): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="mmcblk0p61" ino=121317 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=dir permissive=1
38,2395,45609912,-;type=1400 audit(1538232956.924:55): avc: denied { read } for pid=563 comm="android.hardwar" name="fp_stats_tmp" dev="mmcblk0p61" ino=121321 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=file permissive=1
38,2397,45610175,-;type=1400 audit(1538232956.924:56): avc: denied { open } for pid=563 comm="android.hardwar" path="/data/log/fingerprint/fp_stats_tmp" dev="mmcblk0p61" ino=121321 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=file permissive=1
38,3006,51881599,-;type=1400 audit(1538232963.194:62): avc: denied { ioctl } for pid=563 comm="android.hardwar" path="/dev/fingerprint" dev="tmpfs" ino=8315 ioctlcmd=6602 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_device:s0 tclass=chr_file permissive=1
38,3016,51900439,-;type=1400 audit(1538232963.214:63): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
38,3018,51900574,-;type=1400 audit(1538232963.214:64): avc: denied { read } for pid=563 comm="android.hardwar" name="irq" dev="sysfs" ino=27296 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3020,51900653,-;type=1400 audit(1538232963.214:65): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/platform/fingerprint/irq" dev="sysfs" ino=27296 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3279,66736658,-;type=1400 audit(1538232978.425:89): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
38,3282,66736983,-;type=1400 audit(1538232978.425:90): avc: denied { write } for pid=563 comm="android.hardwar" name="irq" dev="sysfs" ino=27296 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3284,66737196,-;type=1400 audit(1538232978.425:91): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/platform/fingerprint/irq" dev="sysfs" ino=27296 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3286,66737412,-;type=1400 audit(1538232978.425:92): avc: denied { read } for pid=563 comm="android.hardwar" name="irq" dev="sysfs" ino=27296 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3289,66738014,-;type=1400 audit(1538232978.425:93): avc: denied { read write } for pid=563 comm="android.hardwar" name="idle_timer" dev="sysfs" ino=24332 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=1
38,3290,66738039,-;type=1400 audit(1538232978.425:94): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/soc/1c00000.qcom,kgsl-3d0/kgsl/kgsl-3d0/idle_timer" dev="sysfs" ino=24332 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=1
38,3292,66738304,-;type=1400 audit(1538232978.425:95): avc: denied { write } for pid=563 comm="android.hardwar" name="hwlog_jank" dev="tmpfs" ino=328 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:hwlog_jank_device:s0 tclass=chr_file permissive=1
38,3296,66822883,-;type=1400 audit(1538232978.425:96): avc: denied { open } for pid=563 comm="android.hardwar" path="/dev/hwlog_jank" dev="tmpfs" ino=328 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:hwlog_jank_device:s0 tclass=chr_file permissive=1
38,3297,66822898,-;type=1400 audit(1538232978.515:97): avc: denied { ioctl } for pid=563 comm="android.hardwar" path="/dev/fingerprint" dev="tmpfs" ino=8315 ioctlcmd=6602 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_device:s0 tclass=chr_file permissive=1
38,3321,67413344,-;type=1400 audit(1538232979.105:98): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="mmcblk0p61" ino=121317 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=dir permissive=1
38,3323,67413504,-;type=1400 audit(1538232979.105:99): avc: denied { read } for pid=563 comm="android.hardwar" name="fp_unlock" dev="mmcblk0p61" ino=121319 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=file permissive=1
38,3325,67413588,-;type=1400 audit(1538232979.105:100): avc: denied { open } for pid=563 comm="android.hardwar" path="/data/log/fingerprint/fp_unlock" dev="mmcblk0p61" ino=121319 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=file permissive=1
38,3327,67413660,-;type=1400 audit(1538232979.105:101): avc: denied { write } for pid=563 comm="android.hardwar" name="fp_unlock" dev="mmcblk0p61" ino=121319 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprintd_log_data_file:s0 tclass=file permissive=1
38,3329,67414296,-;type=1400 audit(1538232979.105:102): avc: denied { read } for pid=563 comm="android.hardwar" name="read_image_flag" dev="sysfs" ino=27299 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3331,67414490,-;type=1400 audit(1538232979.105:103): avc: denied { open } for pid=563 comm="android.hardwar" path="/sys/devices/platform/fingerprint/read_image_flag" dev="sysfs" ino=27299 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3333,67414579,-;type=1400 audit(1538232979.105:104): avc: denied { write } for pid=563 comm="android.hardwar" name="read_image_flag" dev="sysfs" ino=27299 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=file permissive=1
38,3358,67974431,-;type=1400 audit(1538232979.665:105): avc: denied { search } for pid=563 comm="android.hardwar" name="fingerprint" dev="sysfs" ino=27284 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fingerprint_sysfs:s0 tclass=dir permissive=1
=============================================================================
38,2328,45218696,-;type=1400 audit(1538238536.574:31): avc: denied { getattr } for pid=531 comm="rild" path="/vendor/radio/qcril_database/qcril.db" dev="mmcblk0p57" ino=916 scontext=u:r:rild:s0 tcontext=u:object_r:radio_data_file:s0 tclass=file permissive=1
38,2332,45218874,-;type=1400 audit(1538238536.574:33): avc: denied { read } for pid=531 comm="rild" name="qcril.db" dev="mmcblk0p57" ino=916 scontext=u:r:rild:s0 tcontext=u:object_r:radio_data_file:s0 tclass=file permissive=1
38,2336,45219001,-;type=1400 audit(1538238536.574:35): avc: denied { open } for pid=553 comm="rild" path="/vendor/radio/qcril_database/qcril.db" dev="mmcblk0p57" ino=916 scontext=u:r:rild:s0 tcontext=u:object_r:radio_data_file:s0 tclass=file permissive=1
38,2342,45219201,-;type=1400 audit(1538238536.574:37): avc: denied { lock } for pid=553 comm="rild" path="/vendor/radio/qcril_database/qcril.db" dev="mmcblk0p57" ino=916 scontext=u:r:rild:s0 tcontext=u:object_r:radio_data_file:s0 tclass=file permissive=1
=============================================================================
* Those denials occurs when i turn on bluetooth.
38,5581,2802855115,-;type=1400 audit(1538242854.781:170): avc: denied { search } for pid=485 comm="bluetooth@1.0-s" name="bluedroid" dev="mmcblk0p61" ino=45870 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:bluetooth_data_file:s0 tclass=dir permissive=1
38,5583,2802855232,-;type=1400 audit(1538242854.781:171): avc: denied { read } for pid=485 comm="bluetooth@1.0-s" name="macbt" dev="mmcblk0p61" ino=45874 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:bluetooth_data_file:s0 tclass=file permissive=1
38,5585,2802855335,-;type=1400 audit(1538242854.781:172): avc: denied { open } for pid=485 comm="bluetooth@1.0-s" path="/data/misc/bluedroid/macbt" dev="mmcblk0p61" ino=45874 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:bluetooth_data_file:s0 tclass=file permissive=1
=============================================================================
38,3601,68881307,-;type=1400 audit(1538244062.772:63): avc: denied { execute_no_trans } for pid=3178 comm="init" path="/vendor/bin/hci_qcomm_init" dev="mmcblk0p57" ino=1462 scontext=u:r:init:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
=============================================================================
hwcan:/ # find /sys -inum 34441
/sys/devices/soc/7000000.ssusb/7000000.dwc3/gadget/lun0/nofua
38,2140,48733518,-;type=1400 audit(1538842099.544:5): avc: denied { write } for pid=501 comm="sh" name="nofua" dev="sysfs" ino=34441 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
=============================================================================
hwcan:/ # find /sys -inum 34392
/sys/devices/virtual/android_usb/android0/f_rndis_qc/rndis_transports
38,2102,5847629,-;type=1400 audit(1539347237.819:9): avc: denied { write } for pid=517 comm="sh" name="rndis_transports" dev="sysfs" ino=34392 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
=============================================================================
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment