This repository was archived by the owner on Aug 18, 2025. It is now read-only.
forked from isar/isar
-
Notifications
You must be signed in to change notification settings - Fork 51
This repository was archived by the owner on Aug 18, 2025. It is now read-only.
Security warnings for system folders (startup logged messages) #110
Copy link
Copy link
Open
Description
Steps to Reproduce
As reported in the original package: W/isarworker( 8160): avc: denied { getattr } for path="/metadata" on app startup
Code sample
final Directory dir = await getApplicationDocumentsDirectory();
_isar = await Isar.open(
isarSchemas,
directory: dir.path,
inspector: isIsarInspectorEnabled,
);W/isarworker(27662): type=1400 audit(0.0:360): avc: denied { getattr } for path="/metadata" dev="vdd1" ino=2 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:361): avc: denied { getattr } for path="/system_dlkm" dev="dm-4" ino=38 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:system_dlkm_file:s0 tclass=dir permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:362): avc: denied { getattr } for path="/apex/apex-info-list.xml" dev="tmpfs" ino=88 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:apex_info_file:s0 tclass=file permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:363): avc: denied { getattr } for path="/linkerconfig" dev="tmpfs" ino=3 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:linkerconfig_file:s0 tclass=dir permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:364): avc: denied { getattr } for path="/linkerconfig" dev="tmpfs" ino=3 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:linkerconfig_file:s0 tclass=dir permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:365): avc: denied { getattr } for path="/metadata" dev="vdd1" ino=2 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 app=com.sm.app
W/isarworker(27662): type=1400 audit(0.0:366): avc: denied { getattr } for path="/system_dlkm" dev="dm-4" ino=38 scontext=u:r:untrusted_app:s0:c190,c256,c512,c768 tcontext=u:object_r:system_dlkm_file:s0 tclass=dir permissive=0 app=com.sm.app
Details
Whilst not blocking, it is a bit concerning to get folder security warnings. Is there a way to configure the open() to avoid the protected systems folders?
- I searched for similar issues already
- I filled the details section with the exact device model and version
- I am able to provide a reproducible example
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels