-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Weird behaviour of sepolicy patcher (for modules) #1724
Comments
why not use this: https://kernelsu.org/guide/module.html#sepolicy-rule |
And also, we only accept kernel 5.10+ issues now. #1705 |
@tiann Hello. Thanks for responding, yes I'm using sepolicy.rule file. And is there a way for anyone to assist me on this? |
I don't know, we developers haven't any non gki devices now. |
I see. No problem, thanks. This issue was just a matter of file permissions and ownership. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Please check before submitting an issue
Describe the bug
I made a module for Magisk that makes use of the sepolicy rules patcher to hijack camera process without needing a permissive kernel. Now I'm using KernelSU and my module completely breaks the camera server (which is why the sepolicy patches were needed). The module works if I set kernel to permissive. (using setenforce 0)
Weirdly enough ksud did not complain when applying the custom sepolicy rules.
To Reproduce
No response
Expected behavior
The module should work fine without setting the kernel selinux state to permissive.
Screenshots
No response
Logs
No response
Device info
Additional context
No response
The text was updated successfully, but these errors were encountered: