mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-24 02:25:28 +00:00
37 lines
1.2 KiB
Plaintext
37 lines
1.2 KiB
Plaintext
Injects allow rules into binary SELinux kernel policies
|
|
|
|
Injecting a rule:
|
|
$ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy -o sepolicy2
|
|
libsepol.policydb_index_others: security: 1 users, 2 roles, 518 types, 14 bools
|
|
libsepol.policydb_index_others: security: 1 sens, 1024 cats
|
|
libsepol.policydb_index_others: security: 84 classes, 4539 rules, 162 cond rules
|
|
|
|
$ sesearch -A -s shell -t system -c file sepolicy
|
|
Found 1 semantic av rules:
|
|
allow appdomain domain : file { ioctl read getattr lock open } ;
|
|
|
|
$ sesearch -A -s shell -t system -c file sepolicy2
|
|
Found 2 semantic av rules:
|
|
allow shell system : file read ;
|
|
allow appdomain domain : file { ioctl read getattr lock open } ;
|
|
|
|
Injecting a permissive domain:
|
|
$ ./sepolicy-inject -Z shell -P sepolicy -o sepolicy2
|
|
|
|
$ seinfo sepolicy | grep Permissive
|
|
Permissives: 0 Polcap: 2
|
|
|
|
$ seinfo sepolicy2 | grep Permissive
|
|
Permissives: 1 Polcap: 2
|
|
|
|
Change a permissive domain to non-permissive:
|
|
$ ./sepolicy-inject -z shell -P sepolicy -o sepolicy2
|
|
|
|
|
|
TODO:
|
|
|
|
Insert multiple rules at the same time
|
|
Remove rules
|
|
Use attributes
|
|
|