termux-app icon indicating copy to clipboard operation
termux-app copied to clipboard

[Bug]: `ping 127.0.0.1` `socket: connection refused` on Generic System Image crDroid

Open NewUserHa opened this issue 11 months ago • 13 comments

Problem description

fresh installed.

pkg update fail

ping 127.0.0.1 got socket: connection refused error on Generic System Image crDroid 10.1

with root, ping is able to work. But pkg can only in non-root

setenforce 0 doesn't help; clean storage doesn't help

Steps to reproduce the behavior.

fresh installed. pkg update then ping 127.0.0.1

What is the expected behavior?

No response

System information

  • Termux application version: 0.118
  • Android OS version: 14
  • Device model: CPH 2609

NewUserHa avatar Mar 18 '24 00:03 NewUserHa

Probably you should try to uninstall Termux and all Termux plugins. Sometimes Android does not give Internet permission in the case if you install plugin and after that installing Termux itself, some bug related to sharedUserId.

twaik avatar Mar 18 '24 05:03 twaik

https://github.com/termux/termux-app/issues/3761#issuecomment-1869411038

twaik avatar Mar 18 '24 05:03 twaik

First re-enable selinux with su -c 'setenforce enforcing' since you disabled it and then follow instructions below. Follow them without uninstalling app and in your current state where internet does not work in termux.

Send text output (not screenshots!) of following. Ideally, email the files to [email protected] since they may contain sensitive info unless you can remove it.

  1. Run su -c 'auditctl -r 0' to disable selinux avc entries rate limit if you have root.
  2. Run readlink /proc/self/ns/net as termux user and send output.
  3. Run readlink /proc/self/ns/net from an adb shell or su -c 'readlink /proc/$(pidof package_name)/ns/net' where package_name is for an app that does have a working internet connection and send output.
  4. Run ping 8.8.8.8 or apt update and then quickly run su -c 'dmesg > /sdcard/dmesg.txt; logcat -d /sdcard/logcat1.txt' and send dmesg.txt and logcat1.txt files.
  5. Force stop termux app, then restart it and quickly run su -c 'logcat -d > /sdcard/logcat2.txt' and send logcat2.txt file.

agnostic-apollo avatar Mar 18 '24 06:03 agnostic-apollo

readlink /proc/self/ns/net: termux net:[4026531840] shell net:[4026531840] browser net:[4026531840] (browser is able to access websites)

got the three files. what is the thing need to look at

NewUserHa avatar Mar 18 '24 18:03 NewUserHa

reinstalling all termux and termux-api doesn't help

NewUserHa avatar Mar 18 '24 18:03 NewUserHa

Well, net namespace are the same for all, and disabling selinux didn't help either, the correct net group was there too in app process of someone else, so running out of ideas what could be wrong. Maybe dmesg reveals something.

what is the thing need to look at

Any errors or entries that may be related that could explain the issue.

agnostic-apollo avatar Mar 18 '24 20:03 agnostic-apollo

there are many lines like this with the same tcontext of termux "s0:c187,c257,c512,c768"

[13187.248932] type=1400 audit(1710785208.316:94065): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.290829] type=1400 audit(1710785208.360:94066): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.496960] type=1400 audit(1710785208.564:94067): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.559548] type=1400 audit(1710785208.628:94068): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_27:s0:c187,c257,c512,c768 tclass=process permissive=0
[13187.565113] type=1400 audit(1710785208.632:94069): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_27:s0:c187,c257,c512,c768 tclass=process permissive=0
[13187.575871] type=1400 audit(1710785208.640:94070): avc:  denied  { getattr } for  comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.581843] type=1400 audit(1710785208.652:94071): avc:  denied  { getattr } for  comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.824528] type=1400 audit(1710785208.892:94072): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.828537] type=1400 audit(1710785208.896:94073): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.839498] type=1400 audit(1710785208.908:94074): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.842959] type=1400 audit(1710785208.912:94075): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.843810] type=1400 audit(1710785208.912:94076): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.844637] type=1400 audit(1710785208.912:94077): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.845942] type=1400 audit(1710785208.912:94078): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.849439] type=1400 audit(1710785208.916:94079): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.850357] type=1400 audit(1710785208.920:94080): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.852624] type=1400 audit(1710785208.920:94081): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.853007] type=1400 audit(1710785208.920:94082): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.862347] type=1400 audit(1710785208.932:94083): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.868185] type=1400 audit(1710785208.936:94084): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.868791] type=1400 audit(1710785208.936:94085): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.872240] type=1400 audit(1710785208.940:94086): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.873710] type=1400 audit(1710785208.944:94087): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.875469] type=1400 audit(1710785208.944:94088): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.877079] type=1400 audit(1710785208.944:94089): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.877774] type=1400 audit(1710785208.948:94090): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.883919] type=1400 audit(1710785208.948:94091): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.884290] type=1400 audit(1710785208.952:94092): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.884550] type=1400 audit(1710785208.952:94093): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.886436] type=1400 audit(1710785208.952:94094): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.886598] type=1400 audit(1710785208.956:94095): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.887306] type=1400 audit(1710785208.956:94096): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.888564] type=1400 audit(1710785208.956:94097): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.890198] type=1400 audit(1710785208.960:94098): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.891300] type=1400 audit(1710785208.960:94099): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.891396] type=1400 audit(1710785208.960:94100): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.893025] type=1400 audit(1710785208.960:94101): avc:  denied  { getattr } for  comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.893113] type=1400 audit(1710785208.960:94102): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.895547] type=1400 audit(1710785208.964:94103): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.896101] type=1400 audit(1710785208.964:94104): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.897504] type=1400 audit(1710785208.964:94105): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.899920] type=1400 audit(1710785208.968:94106): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.900903] type=1400 audit(1710785208.968:94107): avc:  denied  { getattr } for  comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.902508] type=1400 audit(1710785208.972:94108): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.903117] type=1400 audit(1710785208.972:94109): avc:  denied  { getattr } for  comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.903943] type=1400 audit(1710785208.972:94110): avc:  denied  { getattr } for  comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.905110] type=1400 audit(1710785208.972:94111): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.910508] type=1400 audit(1710785208.980:94112): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912603] type=1400 audit(1710785208.980:94113): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912720] type=1400 audit(1710785208.980:94114): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912791] type=1400 audit(1710785208.980:94115): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.913184] type=1400 audit(1710785208.980:94116): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.915822] type=1400 audit(1710785208.984:94117): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.921166] type=1400 audit(1710785208.988:94118): avc:  denied  { getattr } for  comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.939305] type=1400 audit(1710785209.008:94119): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13188.043162] type=1400 audit(1710785209.112:94120): avc:  denied  { getattr } for  comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0

NewUserHa avatar Mar 19 '24 15:03 NewUserHa

Do these happen with selinux in enforcing mode?

agnostic-apollo avatar Mar 19 '24 19:03 agnostic-apollo

selinux enforcing mode is the default mode.

[  109.135033] type=1400 audit(1710895195.120:21748): avc:  granted  { execute } for  comm="bash" name="apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.135589] type=1400 audit(1710895195.124:21749): avc:  granted  { execute } for  comm="bash" name="apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.135768] type=1400 audit(1710895195.124:21750): avc:  granted  { execute_no_trans } for  comm="bash" path="/data/data/com.termux/files/usr/bin/apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.136452] type=1400 audit(1710895195.124:21751): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/bin/apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.152815] type=1400 audit(1710895195.140:21752): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.153043] type=1400 audit(1710895195.140:21753): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.153173] type=1400 audit(1710895195.140:21754): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.153417] type=1400 audit(1710895195.140:21755): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.155998] type=1400 audit(1710895195.140:21756): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159263] type=1400 audit(1710895195.140:21757): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libapt-private.so" dev="dm-88" ino=30479 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159388] type=1400 audit(1710895195.140:21758): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159475] type=1400 audit(1710895195.140:21759): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159593] type=1400 audit(1710895195.140:21760): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159689] type=1400 audit(1710895195.140:21761): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159772] type=1400 audit(1710895195.140:21762): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159852] type=1400 audit(1710895195.140:21763): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.159932] type=1400 audit(1710895195.140:21764): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.160017] type=1400 audit(1710895195.140:21765): avc:  granted  { execute } for  comm="apt" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.161846] type=1400 audit(1710895195.148:21766): avc:  granted  { execute } for  comm="apt" name="dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.162289] type=1400 audit(1710895195.148:21767): avc:  granted  { execute_no_trans } for  comm="apt" path="/data/data/com.termux/files/usr/bin/dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.162606] type=1400 audit(1710895195.148:21768): avc:  granted  { execute } for  comm="dpkg" path="/data/data/com.termux/files/usr/bin/dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.163470] type=1400 audit(1710895195.152:21769): avc:  granted  { execute } for  comm="dpkg" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.167238] type=1400 audit(1710895195.156:21770): avc:  granted  { execute } for  comm="apt" name="http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.167404] type=1400 audit(1710895195.156:21771): avc:  granted  { execute_no_trans } for  comm="apt" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.167764] type=1400 audit(1710895195.156:21772): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.175869] type=1400 audit(1710895195.164:21773): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.176106] type=1400 audit(1710895195.164:21774): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libnettle.so.8.4" dev="dm-88" ino=30461 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.176252] type=1400 audit(1710895195.164:21775): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.176677] type=1400 audit(1710895195.164:21776): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libhogweed.so.6.4" dev="dm-88" ino=30509 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.176870] type=1400 audit(1710895195.164:21777): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177065] type=1400 audit(1710895195.164:21778): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgmp.so" dev="dm-88" ino=30482 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177204] type=1400 audit(1710895195.164:21779): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177478] type=1400 audit(1710895195.164:21780): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libunistring.so" dev="dm-88" ino=30465 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177625] type=1400 audit(1710895195.164:21781): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177771] type=1400 audit(1710895195.164:21782): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libidn2.so" dev="dm-88" ino=30128 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.177908] type=1400 audit(1710895195.164:21783): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.178291] type=1400 audit(1710895195.164:21784): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-support.so" dev="dm-88" ino=30468 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.178674] type=1400 audit(1710895195.164:21785): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.178823] type=1400 audit(1710895195.164:21786): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.178961] type=1400 audit(1710895195.164:21787): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.179094] type=1400 audit(1710895195.164:21788): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.179227] type=1400 audit(1710895195.164:21789): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgnutls.so" dev="dm-88" ino=30404 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.179820] type=1400 audit(1710895195.164:21790): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.179973] type=1400 audit(1710895195.164:21791): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.180577] type=1400 audit(1710895195.164:21792): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.183073] type=1400 audit(1710895195.172:21793): avc:  granted  { execute } for  comm="apt" name="http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.183268] type=1400 audit(1710895195.172:21794): avc:  granted  { execute_no_trans } for  comm="apt" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.183400] type=1400 audit(1710895195.172:21795): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.185484] type=1400 audit(1710895195.172:21796): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.185679] type=1400 audit(1710895195.172:21797): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libnettle.so.8.4" dev="dm-88" ino=30461 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.185807] type=1400 audit(1710895195.172:21798): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.186147] type=1400 audit(1710895195.172:21799): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-support.so" dev="dm-88" ino=30468 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.186323] type=1400 audit(1710895195.172:21800): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libunistring.so" dev="dm-88" ino=30465 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.186507] type=1400 audit(1710895195.172:21801): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.186876] type=1400 audit(1710895195.172:21802): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgmp.so" dev="dm-88" ino=30482 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187129] type=1400 audit(1710895195.172:21803): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187258] type=1400 audit(1710895195.172:21804): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187384] type=1400 audit(1710895195.172:21805): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187516] type=1400 audit(1710895195.172:21806): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgnutls.so" dev="dm-88" ino=30404 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187700] type=1400 audit(1710895195.172:21807): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187811] type=1400 audit(1710895195.172:21808): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libidn2.so" dev="dm-88" ino=30128 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.187923] type=1400 audit(1710895195.172:21809): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libhogweed.so.6.4" dev="dm-88" ino=30509 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188034] type=1400 audit(1710895195.172:21810): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188149] type=1400 audit(1710895195.172:21811): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188261] type=1400 audit(1710895195.172:21812): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188370] type=1400 audit(1710895195.172:21813): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188538] type=1400 audit(1710895195.172:21814): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.188651] type=1400 audit(1710895195.172:21815): avc:  granted  { execute } for  comm="https" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[  109.222801] type=1400 audit(1710895195.212:21816): avc:  denied  { getattr } for  comm="binder:3769_5" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[  109.742591] cnss: Set PCI link status to: 2
[  109.747236] [kworke][0x829b9a55][00:39:55.741011] kiwi_v2: [177:I:PMO] pmo_core_psoc_send_host_wakeup_ind_to_fw: Host wakeup indication sent to fw
[  109.759785] cnss: Runtime resume status: 0
[  110.598356] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_ui_soc_update][1983]): ui_soc=100, real_soc=100, update_delay=5000 force_down =0
[  110.618142] [INFO]: OPLUS_CHG[MMS_GAUGE]([oplus_mms_gauge_update_temp][2110]): support_subboard_ntc = 1, temp = 274
[  110.626072] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_smooth_to_soc][1738]): soc[0 3 99 99 100 100] avg[3 1 0 0 0] fifo[100 100 100 100]
[  110.626626] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_ui_soc_update][1983]): ui_soc=100, real_soc=100, update_delay=5000 force_down =0
[  110.627043] [INFO]: OPLUS_CHG[ADSP]([oplus_chg_8350_set_match_temp][5845]): set matchtemp to 274, rc=0
[  110.627987] [INFO]: OPLUS_CHG[ADSP]([oplus_chg_8350_input_present][4592]): vbus_rising=1
[  110.635188] [zy0603_protect_check] return for is not zy0603 gauge
[  110.635234] [ERROR]: OPLUS_CHG[VIRTUAL_GAUGE]([oplus_chg_vg_protect_check][2530]): child ic[0] set protect check err, rc=-1
[  110.635252] [ERROR]: OPLUS_CHG[MMS_GAUGE]([oplus_gauge_protect_check][617]): protect_check, rc=-1
[  110.635713] [INFO]: OPLUS_CHG[MMS_WIRED]([oplus_wired_get_charger_cycle][399]): charger_cycle = 5
[  110.639259] OPLUS_CHG[oplus_charge_info]: BATTERY[274 274 4390 4389 -138 99 100 100 5064 5124 1 0x0], CHARGE[4470 600 0 0], WIRED[1 450 4809 500 1 0x0 0 0 0 2 0], WIRELESS[0 0 0 0 0 0x0 0 0], VOOC[0 0 0 0 0x0], UFCS[0 0 0 0x0], COMMON[5 0 0 0x100080 1]
[  110.647507] healthd: battery l=100 v=4390 t=27.4 h=2 st=5 c=-138 fc=5500000 cc=5 chg=u

NewUserHa avatar Mar 20 '24 01:03 NewUserHa

Have you tried settings put global restricted_networking_mode 0

Reyhank45 avatar Jun 29 '24 14:06 Reyhank45

Have you tried settings put global restricted_networking_mode 0

~ $ settings put global restricted_networking_mode 0

Exception occurred while executing 'put':
java.lang.SecurityException: Permission Denial: getCurrentUser() from pid=9229, uid=10444 requires android.permission.INTERACT_ACROSS_USERS
        at com.android.server.am.UserController.checkGetCurrentUserPermissions(UserController.java:2716)
        at com.android.server.am.UserController.getCurrentUser(UserController.java:2721)
        at com.android.server.am.ActivityManagerService.getCurrentUser(ActivityManagerService.java:17267)
        at com.android.providers.settings.SettingsService$MyShellCommand.onCommand(SettingsService.java:320)
        at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97)
        at android.os.ShellCommand.exec(ShellCommand.java:38)
        at com.android.providers.settings.SettingsService.onShellCommand(SettingsService.java:57)
        at android.os.Binder.shellCommand(Binder.java:1097)
        at android.os.Binder.onTransact(Binder.java:914)
        at android.os.Binder.execTransactInternal(Binder.java:1363)
        at android.os.Binder.execTransact(Binder.java:1304)
~ $

NewUserHa avatar Jun 29 '24 21:06 NewUserHa

Would need to run with adb or su, but don't do that now if you still don't have internet access.

Instead first run following commands and rename output.txt file to output1.txt. Then go to android settings -> network & internet -> data saver and see if its enabled, it should be disabled by default, do not change it, just note the value. Then under it, in "unrestricted data", check if termux app toggle is enabled or not (note the value). It should be disabled by default too, enable it and then disable it again. Then run following commands again and rename output.txt file to output2.txt. Send both files and initial state of both toggles (data saver and termux unrestricted data ones). Email to [email protected] if something is private in the files.

echo "### ID" &> output.txt
adb shell "dumpsys package com.termux| grep Id=" &>> output.txt

echo "### cmd netpolicy list wifi-networks" &>> output.txt
adb shell "cmd netpolicy list wifi-networks" &>> output.txt

echo "### cmd netpolicy list restrict-background-whitelist" &>> output.txt
adb shell "cmd netpolicy list restrict-background-whitelist" &>> output.txt

echo "### cmd netpolicy list restrict-background-blacklist" &>> output.txt
adb shell "cmd netpolicy list restrict-background-blacklist" &>> output.txt

echo "### dumpsys connectivity" &>> output.txt
adb shell "dumpsys connectivity" &>> output.txt

echo "### dumpsys connectivity trafficcontroller" &>> output.txt
adb shell "dumpsys connectivity trafficcontroller" &>> output.txt

echo "### dumpsys network_management" &>> output.txt
adb shell "dumpsys network_management" &>> output.txt

echo "### dumpsys netpolicy" &>> output.txt
adb shell "dumpsys netpolicy" &>> output.txt

agnostic-apollo avatar Jun 29 '24 22:06 agnostic-apollo