0% found this document useful (0 votes)
46 views

Log

The document contains audit logs recording security permissions for processes running in an untrusted app container on Android. It shows: 1) Initially, some processes like gboard_prop and sysfs are denied permissions. 2) Then init processes like run_init01.sh and initlinker32 are granted execute permissions for files to launch the app. 3) As the app loads, permissions are granted for processes like zygote, system_server and the app's activities to access files, ashmem and other resources needed to run.

Uploaded by

Kathon Danang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Log

The document contains audit logs recording security permissions for processes running in an untrusted app container on Android. It shows: 1) Initially, some processes like gboard_prop and sysfs are denied permissions. 2) Then init processes like run_init01.sh and initlinker32 are granted execute permissions for files to launch the app. 3) As the app loads, permissions are granted for processes like zygote, system_server and the app's activities to access files, ashmem and other resources needed to run.

Uploaded by

Kathon Danang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

--------- beginning of main

01-31 00:19:50.389 16879 16879 W getprop : type=1400 audit(0.0:155621): avc: denied


{ map } for path="/dev/__properties__/u:object_r:gboard_prop:s0" dev="tmpfs"
ino=16505 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:gboard_prop:s0 tclass=file permissive=0
01-31 00:19:50.541 16785 16785 W BuglyThread-2: type=1400 audit(0.0:155622): avc:
denied { read } for name="type" dev="sysfs" ino=37877
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
01-31 00:19:52.409 16928 16928 W sh : type=1400 audit(0.0:155626): avc:
granted { execute } for name="run_init01.sh" dev="mmcblk0p42" ino=721471
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:52.773 16928 16928 W run_init01.sh: type=1400 audit(0.0:155629): avc:
granted { execute } for name="init" dev="mmcblk0p42" ino=721490
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:53.801 17028 17028 W init : type=1400 audit(0.0:155635): avc:
granted { execute } for name="initlinker32" dev="mmcblk0p42" ino=745743
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:53.805 17028 17028 W initlinker32: type=1400 audit(0.0:155637): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/bin/initlinker32"
dev="mmcblk0p42" ino=745743 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:53.809 16962 16962 W init : type=1400 audit(0.0:155638): avc: denied
{ read } for name="/" dev="cgroup" ino=1
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768 tcontext=u:object_r:cgroup:s0
tclass=dir permissive=0
01-31 00:19:55.001 17032 17032 W initlinker32: type=1400 audit(0.0:155828): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:19:55.013 17078 17078 W init : type=1400 audit(0.0:155829): avc:
granted { execute } for name="initlinker32" dev="mmcblk0p42" ino=745743
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:55.013 17078 17078 W init : type=1400 audit(0.0:155830): avc:
granted { execute_no_trans } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/bin/initlinker32"
dev="mmcblk0p42" ino=745743 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:55.013 17079 17079 W init : type=1400 audit(0.0:155831): avc:
granted { execute } for name="initlinker32" dev="mmcblk0p42" ino=745743
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:56.325 17089 17089 W zygote : type=1400 audit(0.0:156198): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libart.so" dev="mmcblk0p42"
ino=721564 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:56.333 17089 17089 W zygote : type=1400 audit(0.0:156199): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libbacktrace_libc++.so"
dev="mmcblk0p42" ino=721576 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:56.433 17089 17089 W zygote : type=1400 audit(0.0:156201): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:19:56.433 17089 17089 W zygote : type=1400 audit(0.0:156202): avc:
granted { execute } for path="/data/data/com.vmos.web/osimg/r/ot01/data/dalvik-
cache/arm/system@[email protected]" dev="mmcblk0p42" ino=786752
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:57.753 17089 17089 W main : type=1400 audit(0.0:156274): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libmedia_jni.so"
dev="mmcblk0p42" ino=721668 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:57.761 17089 17089 W main : type=1400 audit(0.0:156275): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libexif.so" dev="mmcblk0p42"
ino=721601 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:57.769 17082 17082 W initlinker32: type=1400 audit(0.0:156276): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libhostlibui.so"
dev="mmcblk0p42" ino=721632 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:57.769 17089 17089 W main : type=1400 audit(0.0:156277): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libjhead.so" dev="mmcblk0p42"
ino=721646 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:57.773 17089 17089 W main : type=1400 audit(0.0:156278): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libmtp.so" dev="mmcblk0p42"
ino=721671 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:19:59.257 17127 17127 W BootAnimation: type=1400 audit(0.0:156315): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libhostlibui.so"
dev="mmcblk0p42" ino=721632 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:00.601 17089 17089 W main : type=1400 audit(0.0:156316): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libandroid.so"
dev="mmcblk0p42" ino=721558 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:00.605 17089 17089 W main : type=1400 audit(0.0:156317): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libcompiler_rt.so"
dev="mmcblk0p42" ino=721589 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:00.609 17089 17089 W main : type=1400 audit(0.0:156318): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libjnigraphics.so"
dev="mmcblk0p42" ino=721648 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:00.685 17089 17089 W main : type=1400 audit(0.0:156320): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:01.833 17180 17180 W system_server: type=1400 audit(0.0:156487): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:01.973 17180 17180 I chatty : uid=10001(com.vmos.web) system_server
identical 3 lines
01-31 00:20:01.985 17180 17180 W system_server: type=1400 audit(0.0:156491): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:02.845 17180 17180 W system_server: type=1400 audit(0.0:156520): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:03.337 17180 17180 W system_server: type=1400 audit(0.0:156521): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:03.685 17180 17180 W system_server: type=1400 audit(0.0:156522): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:03.893 17180 17180 I chatty : uid=10001(com.vmos.web) system_server
identical 4 lines
01-31 00:20:03.897 17180 17180 W system_server: type=1400 audit(0.0:156532): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:03.897 17180 17180 W system_server: type=1400 audit(0.0:156533): avc:
granted { execute } for path="/data/data/com.vmos.web/osimg/r/ot01/system/priv-
app/SettingsProvider/arm/SettingsProvider.odex" dev="mmcblk0p42" ino=778517
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:03.905 17180 17180 W system_server: type=1400 audit(0.0:156534): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:04.901 17180 17180 W system_server: type=1400 audit(0.0:156603): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:04.937 17180 17180 W system_server: type=1400 audit(0.0:156604): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:04.941 17180 17180 W PowerManagerSer: type=1400 audit(0.0:156605): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:04.945 17180 17180 W system_server: type=1400 audit(0.0:156606): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:05.905 17180 17180 W Binder_3: type=1400 audit(0.0:157070): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:05.913 17180 17180 W Binder_3: type=1400 audit(0.0:157072): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:05.917 17180 17180 W system_server: type=1400 audit(0.0:157073): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:05.917 17513 17513 W ContactsProvide: type=1400 audit(0.0:157074): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:06.921 17386 17386 W m.android.phone: type=1400 audit(0.0:157267): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:06.937 17386 17386 W m.android.phone: type=1400 audit(0.0:157268): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:06.973 17430 17430 W RenderThread: type=1400 audit(0.0:157269): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libRSDriver.so"
dev="mmcblk0p42" ino=721702 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:06.977 17430 17430 W RenderThread: type=1400 audit(0.0:157270): avc:
granted { execute } for
path="/data/data/com.vmos.web/osimg/r/ot01/system/lib/libRSCpuRef.so"
dev="mmcblk0p42" ino=721701 scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:app_data_file:s0:c1,c256,c512,c768 tclass=file
01-31 00:20:06.985 17386 17386 W m.android.phone: type=1400 audit(0.0:157271): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:07.957 17310 17310 W hwuiTask1: type=1400 audit(0.0:157321): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:07.961 17310 17310 W hwuiTask2: type=1400 audit(0.0:157322): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:08.161 17386 17386 W Binder_5: type=1400 audit(0.0:157323): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:08.185 17386 17386 W Binder_5: type=1400 audit(0.0:157324): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file
01-31 00:20:08.245 17089 17089 W main : type=1400 audit(0.0:157325): avc:
granted { open } for path="/dev/ashmem" dev="tmpfs" ino=10566
scontext=u:r:untrusted_app_27:s0:c1,c256,c512,c768
tcontext=u:object_r:ashmem_device:s0 tclass=chr_file

You might also like