AVC denied warning leads to crash in android app - android

I have an app which is crashing from time to time and the only reason for the crash I can thing of, has to be the following LogCat content (yep, two times the same line):
07-19 18:16:16.636 W/the.app: type=1400 audit(0.0:4418): avc: denied { read } for comm=4173796E635461736B202331 name="mem" dev="debugfs" ino=81636 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
07-19 18:16:16.636 W/the.app: type=1400 audit(0.0:4419): avc: denied { read } for comm=4173796E635461736B202331 name="mem" dev="debugfs" ino=81636 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
Followed by "Force finishing activity". The biggest "surprise" here is, that it is sometimes working totally fine, but more often not. I have no idea what I can do with those messages.
Device: Zuk Z2 Pro (rooted)
OS: Android 6.0.1 (ZUI 2.0)

Related

How to solve Access denied finding property "camera.aux.packagelist" and W/Gralloc3: allocator 3.x is not supported" errors?

I am getting these "Access denied finding property "camera.aux.packagelist"" errors when using camera 2 api in android studio. It does not create some crashes and camera works but still what are these errors and how to solve them?
Also how to solve "W/Gralloc3: allocator 3.x is not supported" error?
I have provided logs below.
E/libc: Access denied finding property "camera.aux.packagelist"
W/le.ocrdetection: type=1400 audit(0.0:5957056): avc: denied { read } for name="u:object_r:camera_prop:s0" dev="tmpfs" ino=13808 scontext=u:r:untrusted_app:s0:c187,c257,c512,c768 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=0
E/libc: Access denied finding property "camera.aux.packagelist"
Access denied finding property "camera.aux.packagelist"
W/le.ocrdetection: type=1400 audit(0.0:5957058): avc: denied { read } for name="u:object_r:camera_prop:s0" dev="tmpfs" ino=13808 scontext=u:r:untrusted_app:s0:c187,c257,c512,c768 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=0
W/CameraManagerGlobal: [soar.cts] ignore the status update of camera: 2
W/le.ocrdetection: type=1400 audit(0.0:5957059): avc: denied { read } for name="u:object_r:camera_prop:s0" dev="tmpfs" ino=13808 scontext=u:r:untrusted_app:s0:c187,c257,c512,c768 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=0
E/libc: Access denied finding property "camera.aux.packagelist"
W/CameraManagerGlobal: [soar.cts] ignore the status update of camera: 3
W/le.ocrdetection: type=1400 audit(0.0:5957060): avc: denied { read } for name="u:object_r:camera_prop:s0" dev="tmpfs" ino=13808 scontext=u:r:untrusted_app:s0:c187,c257,c512,c768 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=0
E/libc: Access denied finding property "camera.aux.packagelist"
W/CameraManagerGlobal: [soar.cts] ignore the status update of camera: 4
E/libc: Access denied finding property "camera.aux.packagelist"
W/CameraManagerGlobal: [soar.cts] ignore the status update of camera: 5
E/libc: Access denied finding property "camera.aux.packagelist"
E/libc: Access denied finding property "camera.aux.packagelist"
Access denied finding property "camera.aux.packagelist"
W/CameraManagerGlobal: ignore the torch status update of camera: 3
E/libc: Access denied finding property "camera.aux.packagelist"
W/CameraManagerGlobal: ignore the torch status update of camera: 4
I/Screen: height :2037
width :1080
D/TextureView: TextureView Width : 1080 TextureView Height : 1440
E/libc: Access denied finding property "persist.vendor.camera.privapp.list"
E/libc: Access denied finding property "camera.aux.packagelist"
E/libc: Access denied finding property "camera.aux.packagelist"
W/Gralloc3: allocator 3.x is not supported```

AVC denied when trying to debug flutter app

I've asked around and done some research on it but can't seem to find a fix
I/example.localme( 3862): type=1400 audit(0.0:2646): avc: denied {
write } for name="cache" dev="sdb3" ino=82035
scontext=u:r:untrusted_app:s0:c512,c768
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
I/example.localme( 3862): type=1400 audit(0.0:2647): avc: denied {
add_name } for name="localmeGMGRPB"
scontext=u:r:untrusted_app:s0:c512,c768
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
I/example.localme( 3862): type=1400 audit(0.0:2648): avc: denied {
create } for name="localmeGMGRPB"
scontext=u:r:untrusted_app:s0:c512,c768
tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir
permissive=1
I had the same issue and it turned out to be a network / connection issue with the simulator.
Possible solutions:
Turn on WiFi connection
Factory reset the simulator (This solved my issue)
Add internet permission if you are targeting older android versions:
<uses-permission android:name="android.permission.INTERNET"/>

What does this log message mean in android studio log during interaction of native code with USB device?

I get this warning when I try to read a USB device
06-14 15:19:57.926 14580-14580/sadboy.circadian W/adboy.circadian: type=1400 audit(0.0:671): avc: denied { search } for name="usb" dev="tmpfs" ino=6196 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:usb_device:s0 tclass=dir permissive=0

Android: App crashed on nougat devices

I have a sdk which has some native code. I am building the code into the shared libraries manually and copied those .so files to jniLibs folder. And I am using that sdk in an App. It was working fine with 5, 6 but with Nougat, it just got crashed every time I opened the App.
Note: I have updated the target version to 25 in the build.gradle file.
This is the error Log:
03-31 16:02:32.553 2050-2050/com.vinoth.sampleApp W/s.sampleApp: type=1400 audit(0.0:152): avc: denied { create } for uid=10156 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=netlink_kobject_uevent_socket permissive=0
03-31 16:02:32.553 2050-2050/com.vinoth.sampleApp W/s.sampleApp: type=1400 audit(0.0:153): avc: denied { read } for uid=10156 name="devices" dev="sysfs" ino=6380 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
[ 03-31 16:02:32.563 382: 382 W/ ]
debuggerd: handling request: pid=2050 uid=10156 gid=10156 tid=2050
I have searched about this but ended up with no clue.
Someone please help. Thanks in advance.

avc denied even with proper policy added

On AOSP build, I am getting following avc denied messages,
01-01 00:01:28.600 1458-1458/? W/iw﹕ type=1400 audit(0.0:5): avc: denied { create } for scontext=u:r:system_app:s0 tcontext=u:r:system_app:s0 tclass=netlink_socket permissive=0
01-01 00:01:28.660 1460-1460/? W/ndc﹕ type=1400 audit(0.0:6): avc: denied { write } for name="netd" dev="tmpfs" ino=1575 scontext=u:r:system_app:s0 tcontext=u:object_r:netd_socket:s0 tclass=sock_file permissive=0
01-01 00:01:28.720 1461-1461/? W/ndc﹕ type=1400 audit(0.0:7): avc: denied { write } for name="netd" dev="tmpfs" ino=1575 scontext=u:r:system_app:s0 tcontext=u:object_r:netd_socket:s0 tclass=sock_file permissive=0
01-01 00:01:28.790 1462-1462/? W/ndc﹕ type=1400 audit(0.0:8): avc: denied { write } for name="netd" dev="tmpfs" ino=1575 scontext=u:r:system_app:s0 tcontext=u:object_r:netd_socket:s0 tclass=sock_file permissive=0
01-01 00:01:28.860 1463-1463/? W/ndc﹕ type=1400 audit(0.0:9): avc: denied { write } for name="netd" dev="tmpfs" ino=1575 scontext=u:r:system_app:s0 tcontext=u:object_r:netd_socket:s0 tclass=sock_file permissive=0
Using the audit2allow I got following
allow system_app netd_socket:sock_file write;
allow system_app self:netlink_socket create;
I have added the same to device/<vendor-path>/sepolicy/system_app.te
Also excluded system app from neverallow policy as below in external/sepolicy/app.te
neverallow { appdomain -system_app }
self:{
netlink_socket
netlink_firewall_socket
netlink_tcpdiag_socket
netlink_nflog_socket
netlink_xfrm_socket
netlink_audit_socket
netlink_ip6fw_socket
netlink_dnrt_socket
} *;
But still getting the same permission denied avc logs.
Cannot see anything wrong from your change. Suppose your sepolicy change was not building into kernel.
pls try make kernelclean and rebuild kernel, vim at the following file:
out/target/product/xxxx/obj/ETC/sepolicy_intermediates/policy.conf
All the sepolicy should in the policy.conf, grep your new adding policy to check if it has been compiled into kernel.

Categories

Resources