termux-app
termux-app copied to clipboard
[Bug]: `ping 127.0.0.1` `socket: connection refused` on Generic System Image crDroid
Problem description
fresh installed.
pkg update
fail
ping 127.0.0.1
got socket: connection refused
error on Generic System Image crDroid 10.1
with root, ping is able to work. But pkg can only in non-root
setenforce 0
doesn't help; clean storage
doesn't help
Steps to reproduce the behavior.
fresh installed.
pkg update
then
ping 127.0.0.1
What is the expected behavior?
No response
System information
- Termux application version: 0.118
- Android OS version: 14
- Device model: CPH 2609
Probably you should try to uninstall Termux and all Termux plugins. Sometimes Android does not give Internet permission in the case if you install plugin and after that installing Termux itself, some bug related to sharedUserId
.
https://github.com/termux/termux-app/issues/3761#issuecomment-1869411038
First re-enable selinux with su -c 'setenforce enforcing'
since you disabled it and then follow instructions below. Follow them without uninstalling app and in your current state where internet does not work in termux.
Send text output (not screenshots!) of following. Ideally, email the files to [email protected] since they may contain sensitive info unless you can remove it.
- Run
su -c 'auditctl -r 0'
to disable selinux avc entries rate limit if you have root. - Run
readlink /proc/self/ns/net
as termux user and send output. - Run
readlink /proc/self/ns/net
from an adb shell orsu -c 'readlink /proc/$(pidof package_name)/ns/net'
wherepackage_name
is for an app that does have a working internet connection and send output. - Run
ping 8.8.8.8
orapt update
and then quickly runsu -c 'dmesg > /sdcard/dmesg.txt; logcat -d /sdcard/logcat1.txt'
and senddmesg.txt
andlogcat1.txt
files. - Force stop termux app, then restart it and quickly run
su -c 'logcat -d > /sdcard/logcat2.txt'
and sendlogcat2.txt
file.
readlink /proc/self/ns/net
:
termux net:[4026531840]
shell net:[4026531840]
browser net:[4026531840] (browser is able to access websites)
got the three files. what is the thing need to look at
reinstalling all termux and termux-api doesn't help
Well, net namespace are the same for all, and disabling selinux didn't help either, the correct net group was there too in app process of someone else, so running out of ideas what could be wrong. Maybe dmesg reveals something.
what is the thing need to look at
Any errors or entries that may be related that could explain the issue.
there are many lines like this with the same tcontext of termux "s0:c187,c257,c512,c768"
[13187.248932] type=1400 audit(1710785208.316:94065): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.290829] type=1400 audit(1710785208.360:94066): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.496960] type=1400 audit(1710785208.564:94067): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.559548] type=1400 audit(1710785208.628:94068): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_27:s0:c187,c257,c512,c768 tclass=process permissive=0
[13187.565113] type=1400 audit(1710785208.632:94069): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_27:s0:c187,c257,c512,c768 tclass=process permissive=0
[13187.575871] type=1400 audit(1710785208.640:94070): avc: denied { getattr } for comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.581843] type=1400 audit(1710785208.652:94071): avc: denied { getattr } for comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.824528] type=1400 audit(1710785208.892:94072): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.828537] type=1400 audit(1710785208.896:94073): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.839498] type=1400 audit(1710785208.908:94074): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.842959] type=1400 audit(1710785208.912:94075): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.843810] type=1400 audit(1710785208.912:94076): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.844637] type=1400 audit(1710785208.912:94077): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.845942] type=1400 audit(1710785208.912:94078): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.849439] type=1400 audit(1710785208.916:94079): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.850357] type=1400 audit(1710785208.920:94080): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.852624] type=1400 audit(1710785208.920:94081): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.853007] type=1400 audit(1710785208.920:94082): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.862347] type=1400 audit(1710785208.932:94083): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13187.868185] type=1400 audit(1710785208.936:94084): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.868791] type=1400 audit(1710785208.936:94085): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.872240] type=1400 audit(1710785208.940:94086): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.873710] type=1400 audit(1710785208.944:94087): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.875469] type=1400 audit(1710785208.944:94088): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.877079] type=1400 audit(1710785208.944:94089): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.877774] type=1400 audit(1710785208.948:94090): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.883919] type=1400 audit(1710785208.948:94091): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.884290] type=1400 audit(1710785208.952:94092): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.884550] type=1400 audit(1710785208.952:94093): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.886436] type=1400 audit(1710785208.952:94094): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.886598] type=1400 audit(1710785208.956:94095): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.887306] type=1400 audit(1710785208.956:94096): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.888564] type=1400 audit(1710785208.956:94097): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.890198] type=1400 audit(1710785208.960:94098): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.891300] type=1400 audit(1710785208.960:94099): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.891396] type=1400 audit(1710785208.960:94100): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.893025] type=1400 audit(1710785208.960:94101): avc: denied { getattr } for comm="binder:3857_11" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.893113] type=1400 audit(1710785208.960:94102): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.895547] type=1400 audit(1710785208.964:94103): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.896101] type=1400 audit(1710785208.964:94104): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.897504] type=1400 audit(1710785208.964:94105): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.899920] type=1400 audit(1710785208.968:94106): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.900903] type=1400 audit(1710785208.968:94107): avc: denied { getattr } for comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.902508] type=1400 audit(1710785208.972:94108): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.903117] type=1400 audit(1710785208.972:94109): avc: denied { getattr } for comm="binder:3857_C" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.903943] type=1400 audit(1710785208.972:94110): avc: denied { getattr } for comm="binder:4365_5" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.905110] type=1400 audit(1710785208.972:94111): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.910508] type=1400 audit(1710785208.980:94112): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912603] type=1400 audit(1710785208.980:94113): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912720] type=1400 audit(1710785208.980:94114): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.912791] type=1400 audit(1710785208.980:94115): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=process permissive=0
[13187.913184] type=1400 audit(1710785208.980:94116): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.915822] type=1400 audit(1710785208.984:94117): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.921166] type=1400 audit(1710785208.988:94118): avc: denied { getattr } for comm="binder:4365_2" scontext=u:r:surfaceflinger:s0 tcontext=u:r:system_server:s0 tclass=process permissive=0
[13187.939305] type=1400 audit(1710785209.008:94119): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[13188.043162] type=1400 audit(1710785209.112:94120): avc: denied { getattr } for comm="binder:3857_12" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
Do these happen with selinux in enforcing mode?
selinux enforcing mode is the default mode.
[ 109.135033] type=1400 audit(1710895195.120:21748): avc: granted { execute } for comm="bash" name="apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.135589] type=1400 audit(1710895195.124:21749): avc: granted { execute } for comm="bash" name="apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.135768] type=1400 audit(1710895195.124:21750): avc: granted { execute_no_trans } for comm="bash" path="/data/data/com.termux/files/usr/bin/apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.136452] type=1400 audit(1710895195.124:21751): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/bin/apt" dev="dm-88" ino=32026 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.152815] type=1400 audit(1710895195.140:21752): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.153043] type=1400 audit(1710895195.140:21753): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.153173] type=1400 audit(1710895195.140:21754): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.153417] type=1400 audit(1710895195.140:21755): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.155998] type=1400 audit(1710895195.140:21756): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159263] type=1400 audit(1710895195.140:21757): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libapt-private.so" dev="dm-88" ino=30479 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159388] type=1400 audit(1710895195.140:21758): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159475] type=1400 audit(1710895195.140:21759): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159593] type=1400 audit(1710895195.140:21760): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159689] type=1400 audit(1710895195.140:21761): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159772] type=1400 audit(1710895195.140:21762): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159852] type=1400 audit(1710895195.140:21763): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.159932] type=1400 audit(1710895195.140:21764): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.160017] type=1400 audit(1710895195.140:21765): avc: granted { execute } for comm="apt" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.161846] type=1400 audit(1710895195.148:21766): avc: granted { execute } for comm="apt" name="dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.162289] type=1400 audit(1710895195.148:21767): avc: granted { execute_no_trans } for comm="apt" path="/data/data/com.termux/files/usr/bin/dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.162606] type=1400 audit(1710895195.148:21768): avc: granted { execute } for comm="dpkg" path="/data/data/com.termux/files/usr/bin/dpkg" dev="dm-88" ino=32118 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.163470] type=1400 audit(1710895195.152:21769): avc: granted { execute } for comm="dpkg" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.167238] type=1400 audit(1710895195.156:21770): avc: granted { execute } for comm="apt" name="http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.167404] type=1400 audit(1710895195.156:21771): avc: granted { execute_no_trans } for comm="apt" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.167764] type=1400 audit(1710895195.156:21772): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.175869] type=1400 audit(1710895195.164:21773): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.176106] type=1400 audit(1710895195.164:21774): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libnettle.so.8.4" dev="dm-88" ino=30461 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.176252] type=1400 audit(1710895195.164:21775): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.176677] type=1400 audit(1710895195.164:21776): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libhogweed.so.6.4" dev="dm-88" ino=30509 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.176870] type=1400 audit(1710895195.164:21777): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177065] type=1400 audit(1710895195.164:21778): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgmp.so" dev="dm-88" ino=30482 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177204] type=1400 audit(1710895195.164:21779): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177478] type=1400 audit(1710895195.164:21780): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libunistring.so" dev="dm-88" ino=30465 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177625] type=1400 audit(1710895195.164:21781): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177771] type=1400 audit(1710895195.164:21782): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libidn2.so" dev="dm-88" ino=30128 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.177908] type=1400 audit(1710895195.164:21783): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.178291] type=1400 audit(1710895195.164:21784): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-support.so" dev="dm-88" ino=30468 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.178674] type=1400 audit(1710895195.164:21785): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.178823] type=1400 audit(1710895195.164:21786): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.178961] type=1400 audit(1710895195.164:21787): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.179094] type=1400 audit(1710895195.164:21788): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.179227] type=1400 audit(1710895195.164:21789): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgnutls.so" dev="dm-88" ino=30404 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.179820] type=1400 audit(1710895195.164:21790): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.179973] type=1400 audit(1710895195.164:21791): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.180577] type=1400 audit(1710895195.164:21792): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.183073] type=1400 audit(1710895195.172:21793): avc: granted { execute } for comm="apt" name="http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.183268] type=1400 audit(1710895195.172:21794): avc: granted { execute_no_trans } for comm="apt" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.183400] type=1400 audit(1710895195.172:21795): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/apt/methods/http" dev="dm-88" ino=33068 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.185484] type=1400 audit(1710895195.172:21796): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libiconv.so" dev="dm-88" ino=30405 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.185679] type=1400 audit(1710895195.172:21797): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libnettle.so.8.4" dev="dm-88" ino=30461 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.185807] type=1400 audit(1710895195.172:21798): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-glob.so" dev="dm-88" ino=30289 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.186147] type=1400 audit(1710895195.172:21799): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libandroid-support.so" dev="dm-88" ino=30468 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.186323] type=1400 audit(1710895195.172:21800): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libunistring.so" dev="dm-88" ino=30465 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.186507] type=1400 audit(1710895195.172:21801): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libz.so.1.2.11" dev="dm-88" ino=28288 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.186876] type=1400 audit(1710895195.172:21802): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgmp.so" dev="dm-88" ino=30482 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187129] type=1400 audit(1710895195.172:21803): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libapt-pkg.so" dev="dm-88" ino=30470 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187258] type=1400 audit(1710895195.172:21804): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libxxhash.so.0.8.1" dev="dm-88" ino=30481 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187384] type=1400 audit(1710895195.172:21805): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/liblz4.so.1.9.3" dev="dm-88" ino=28363 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187516] type=1400 audit(1710895195.172:21806): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgnutls.so" dev="dm-88" ino=30404 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187700] type=1400 audit(1710895195.172:21807): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/liblzma.so.5.2.5" dev="dm-88" ino=30466 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187811] type=1400 audit(1710895195.172:21808): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libidn2.so" dev="dm-88" ino=30128 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.187923] type=1400 audit(1710895195.172:21809): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libhogweed.so.6.4" dev="dm-88" ino=30509 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188034] type=1400 audit(1710895195.172:21810): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libbz2.so.1.0.8" dev="dm-88" ino=30508 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188149] type=1400 audit(1710895195.172:21811): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgpg-error.so" dev="dm-88" ino=32735 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188261] type=1400 audit(1710895195.172:21812): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188370] type=1400 audit(1710895195.172:21813): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libc++_shared.so" dev="dm-88" ino=30246 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188538] type=1400 audit(1710895195.172:21814): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libtermux-exec.so" dev="dm-88" ino=30411 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.188651] type=1400 audit(1710895195.172:21815): avc: granted { execute } for comm="https" path="/data/data/com.termux/files/usr/lib/libgcrypt.so" dev="dm-88" ino=30462 scontext=u:r:untrusted_app_27:s0:c188,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c188,c257,c512,c768 tclass=file app=com.termux.api
[ 109.222801] type=1400 audit(1710895195.212:21816): avc: denied { getattr } for comm="binder:3769_5" scontext=u:r:system_server:s0 tcontext=u:r:shell:s0 tclass=process permissive=0
[ 109.742591] cnss: Set PCI link status to: 2
[ 109.747236] [kworke][0x829b9a55][00:39:55.741011] kiwi_v2: [177:I:PMO] pmo_core_psoc_send_host_wakeup_ind_to_fw: Host wakeup indication sent to fw
[ 109.759785] cnss: Runtime resume status: 0
[ 110.598356] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_ui_soc_update][1983]): ui_soc=100, real_soc=100, update_delay=5000 force_down =0
[ 110.618142] [INFO]: OPLUS_CHG[MMS_GAUGE]([oplus_mms_gauge_update_temp][2110]): support_subboard_ntc = 1, temp = 274
[ 110.626072] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_smooth_to_soc][1738]): soc[0 3 99 99 100 100] avg[3 1 0 0 0] fifo[100 100 100 100]
[ 110.626626] [INFO]: OPLUS_CHG[CHG_COMM]([oplus_comm_ui_soc_update][1983]): ui_soc=100, real_soc=100, update_delay=5000 force_down =0
[ 110.627043] [INFO]: OPLUS_CHG[ADSP]([oplus_chg_8350_set_match_temp][5845]): set matchtemp to 274, rc=0
[ 110.627987] [INFO]: OPLUS_CHG[ADSP]([oplus_chg_8350_input_present][4592]): vbus_rising=1
[ 110.635188] [zy0603_protect_check] return for is not zy0603 gauge
[ 110.635234] [ERROR]: OPLUS_CHG[VIRTUAL_GAUGE]([oplus_chg_vg_protect_check][2530]): child ic[0] set protect check err, rc=-1
[ 110.635252] [ERROR]: OPLUS_CHG[MMS_GAUGE]([oplus_gauge_protect_check][617]): protect_check, rc=-1
[ 110.635713] [INFO]: OPLUS_CHG[MMS_WIRED]([oplus_wired_get_charger_cycle][399]): charger_cycle = 5
[ 110.639259] OPLUS_CHG[oplus_charge_info]: BATTERY[274 274 4390 4389 -138 99 100 100 5064 5124 1 0x0], CHARGE[4470 600 0 0], WIRED[1 450 4809 500 1 0x0 0 0 0 2 0], WIRELESS[0 0 0 0 0 0x0 0 0], VOOC[0 0 0 0 0x0], UFCS[0 0 0 0x0], COMMON[5 0 0 0x100080 1]
[ 110.647507] healthd: battery l=100 v=4390 t=27.4 h=2 st=5 c=-138 fc=5500000 cc=5 chg=u
Have you tried settings put global restricted_networking_mode 0
Have you tried
settings put global restricted_networking_mode 0
~ $ settings put global restricted_networking_mode 0
Exception occurred while executing 'put':
java.lang.SecurityException: Permission Denial: getCurrentUser() from pid=9229, uid=10444 requires android.permission.INTERACT_ACROSS_USERS
at com.android.server.am.UserController.checkGetCurrentUserPermissions(UserController.java:2716)
at com.android.server.am.UserController.getCurrentUser(UserController.java:2721)
at com.android.server.am.ActivityManagerService.getCurrentUser(ActivityManagerService.java:17267)
at com.android.providers.settings.SettingsService$MyShellCommand.onCommand(SettingsService.java:320)
at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97)
at android.os.ShellCommand.exec(ShellCommand.java:38)
at com.android.providers.settings.SettingsService.onShellCommand(SettingsService.java:57)
at android.os.Binder.shellCommand(Binder.java:1097)
at android.os.Binder.onTransact(Binder.java:914)
at android.os.Binder.execTransactInternal(Binder.java:1363)
at android.os.Binder.execTransact(Binder.java:1304)
~ $
Would need to run with adb
or su
, but don't do that now if you still don't have internet access.
Instead first run following commands and rename output.txt
file to output1.txt
. Then go to android settings -> network & internet -> data saver and see if its enabled, it should be disabled by default, do not change it, just note the value. Then under it, in "unrestricted data", check if termux app toggle is enabled or not (note the value). It should be disabled by default too, enable it and then disable it again. Then run following commands again and rename output.txt
file to output2.txt
. Send both files and initial state of both toggles (data saver and termux unrestricted data ones). Email to [email protected] if something is private in the files.
echo "### ID" &> output.txt
adb shell "dumpsys package com.termux| grep Id=" &>> output.txt
echo "### cmd netpolicy list wifi-networks" &>> output.txt
adb shell "cmd netpolicy list wifi-networks" &>> output.txt
echo "### cmd netpolicy list restrict-background-whitelist" &>> output.txt
adb shell "cmd netpolicy list restrict-background-whitelist" &>> output.txt
echo "### cmd netpolicy list restrict-background-blacklist" &>> output.txt
adb shell "cmd netpolicy list restrict-background-blacklist" &>> output.txt
echo "### dumpsys connectivity" &>> output.txt
adb shell "dumpsys connectivity" &>> output.txt
echo "### dumpsys connectivity trafficcontroller" &>> output.txt
adb shell "dumpsys connectivity trafficcontroller" &>> output.txt
echo "### dumpsys network_management" &>> output.txt
adb shell "dumpsys network_management" &>> output.txt
echo "### dumpsys netpolicy" &>> output.txt
adb shell "dumpsys netpolicy" &>> output.txt