mirror of
https://github.com/topjohnwu/Magisk.git
synced 2025-02-19 19:28:29 +00:00

The patch will work like this: ./sepolicy-inject --auto -P sepolicy This will allow all possible transition (just like selinux disabled) ./sepolicy-inject --auto -s su -P sepolicy This will allow all transitions from su to any type ./sepolicy-inject --auto -t su -P sepolicy This will allow all transitions from any type to su ./sepolicy-inject --auto -c file -P sepolicy This will allow any transitions involving the class file ./sepolicy-inject --auto -s su -t system_data_file -P sepolicy This will allow all transitions from su to system_data_file You should get the logic now :)
Injects allow rules into binary SELinux kernel policies Injecting a rule: $ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy Injecting multiple permissions: $ ./sepolicy-inject -s shell -t system -c file -p read,write,open -P sepolicy Add a type_attribute to a domain: $ ./sepolicy-inject -s su -a mlstrustedsubject -P sepolicy Injecting a permissive domain: $ ./sepolicy-inject -Z shell -P sepolicy Change a permissive domain to non-permissive: $ ./sepolicy-inject -z shell -P sepolicy Test a SELinux type exists: $ ./sepolicy-inject -e -s shell -P sepolicy Test a SELinux class exists: $ ./sepolicy-inject -e -c service_manager -P sepolicy Add a transition: $ ./sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy Add a filename transition: $ ./sepolicy-inject -s su_daemon -f device -c file -g "socket" -t su_device -P sepolicy
Languages
C++
36.6%
Kotlin
30.4%
Rust
16.4%
Java
9%
Shell
4.9%
Other
2.6%