Advertisement
Guest User

supolicy

a guest
Dec 18th, 2014
173
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.79 KB | None | 0 0
  1. icy v%d.%s%d (%s:%s) - Copyright (C) 2014 - Chainfire
  2.  
  3. ndkarmeabi--live/sys/fs/selinux/policyFile [%s] does not exist!
  4. Patching policy .../sys/fs/selinux/load- Failure! %d
  5. - Success--filePatching policy [%s] --> [%s] ...
  6. - Failure!--permissive/proc/self/attr/current--save--load--dumpav--kernelsupolicy --live [policystatement...] Patches current policy and reloads itsupolicy --permissive [context...] Returns permissive state for context or currentsupolicy --dumpav Dump access vectorsenforcingpermissiveokfailallowdenyattraddattrdelpermissive enforcing *-%s:%s=%s
  7. %s: no contexts listed
  8. allow deny %s %s %s %s%s: could not parse statement
  9. -%s:%s:%s:%s:%s=%s
  10. attradd attrdel %s %s-%s:%s:%s=%s
  11. Can't parse [%s]
  12. TYPE|ATTRIBTYPEPERMISSIVEENFORCINGAUDITALLOWTRANSITIONNEVERALLOWMEMBERCHANGEALLOWAUDITDENY[%s] %d: %s (%s) [%s]
  13. %08x[AV] %d: %s %s-->%s (%s) [%s]
  14. initinit_shellrecoveryprocesstransitiontoolboxtoolbox_execallow { shell zygote recovery } toolbox fd useallow { init init_shell } { init init_shell } capability { sys_ptrace }allow { init init_shell } shell process { signull }allow { init init_shell recovery } { fuse rootfs system_file system_app_data_file app_data_file shell_data_file lnk_file zygote_exec toolbox_exec } file { create unlink open read write getattr setattr execute execute_no_trans relabelfrom relabelto }allow { init init_shell recovery } { fuse rootfs system_file system_app_data_file app_data_file shell_data_file lnk_file } dir { search add_name remove_name open read write getattr setattr relabelfrom relabelto }allow { init init_shell recovery } { zygote system_server system_app platform_app untrusted_app } process getattrallow shell shell capability { setuid setgid }allow { shell recovery } { init untrusted_app } unix_stream_socket { connectto read write }allow { shell recovery } init fifo_file { read write ioctl getattr }allow { shell recovery } { devpts untrusted_app_devpts } chr_file { open read write ioctl getattr }attradd { init } { mlstrustedobject mlstrustedsubject }allow { system_server system_app platform_app untrusted_app } init unix_stream_socket { connectto read write }allow zygote { init init_shell recovery system_server system_app platform_app untrusted_app } unix_stream_socket { connectto read write }allow zygote { init init_shell recovery } fifo_file { read write ioctl getattr }allow { system_server system_app platform_app } untrusted_app unix_stream_socket { connectto read write }allow { zygote system_server system_app platform_app untrusted_app } { devpts untrusted_app_devpts } chr_file { open read write ioctl getattr }allow { zygote system_server } { init init_shell recovery } unix_stream_socket { accept listen getattr getopt setattr setopt }allow system_server system_server capability { setuid setgid }allow system_app system_app capability { setuid setgid }allow platform_app platform_app capability { setuid setgid }allow untrusted_app untrusted_app capability { setuid setgid }attradd { init init_shell recovery } { domain unconfineddomain appdomain netdomain bluetoothdomain binderservicedomain }allow init { fuse zygote_exec } file mountonallow recovery block_device blk_file read open ioctlallow recovery { labeldfs rootfs } filesystem remountallow recovery kernel process setschedallow recovery recovery capability { fsetid dac_override }allow recovery system_file dir createallow init recovery process signullallow { init recovery } system_file lnk_file { create unlink }supolicy%s--- SELinux policy patch start ------ SELinux policy patch end ---allow recovery rootfs file entrypointallow recovery recovery capability { sys_ptrace setuid setgid }allow init recovery process { noatsecure siginh rlimitinh }/sys/fs/selinux/sys/fs/selinux/enforceu:-%s:permissive
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement