diff options
| author | beanstown106 <nbenis106@gmail.com> | 2015-11-21 17:57:23 -0500 |
|---|---|---|
| committer | Davor Bertovic <lordclockan@gmail.com> | 2016-03-13 19:27:06 +0100 |
| commit | 6d5df1b0146dd3c08c1a0eb8c6fbd8effb8195e2 (patch) | |
| tree | b3469852ef3e576094bea241ff082c2c497037ee | |
| parent | 6ba41d3213d1a7553f5bc9fc82aefc5bf08f836a (diff) | |
Patch to allow SuperSU to run in SELinux enforcing
a special thanks to @Chainfire for pointing me to the right places and
@imoseyon for helping with the selinux rules
Written By: @BeansTown106
Keep the @ in my name id like to track the use of this..
Change-Id: I10c98e73fb8e025c6dd3ddbb7ca7abf9662dd8cb
| -rw-r--r-- | init.te | 10 |
1 files changed, 9 insertions, 1 deletions
@@ -71,6 +71,10 @@ allow init self:capability sys_time; allow init self:capability { sys_rawio mknod }; +# fix some selinux denials related to supersu +allow init system_file:file execute_no_trans; +allow zygote init:unix_stream_socket { read write }; + # Mounting filesystems from block devices. allow init dev_type:blk_file r_file_perms; @@ -127,6 +131,10 @@ allow init security_file:dir { create setattr }; # which can be configured on a device-by-device basis if needed. r_dir_file(init, security_file) +# allow supolicy to read and load sepolicy +allow init kernel:security load_policy; +allow init kernel:security read_policy; + # Any operation that can modify the kernel ring buffer, e.g. clear # or a read that consumes the messages that were read. allow init kernel:system syslog_mod; @@ -287,4 +295,4 @@ neverallow init shell_data_file:lnk_file read; neverallow init app_data_file:lnk_file read; # init should never execute a program without changing to another domain. -neverallow init { file_type fs_type }:file execute_no_trans; +# neverallow init { file_type fs_type }:file execute_no_trans; |
