@Chainfire : i waited for days hoping that someone else with the same case as mine would post here, but it seems noone posted yet.
My device is msm8610 based and previously it's system is JB 4.3. I got ota update to kk 4.4.2 then I install it, but first i changed the updater-script to not delete my PhilZ-CWM. My KK runs well, but i cannot get root access for my apps. With cwm and also with towelroot or other rooting tools I can put su binary and other root 'components' (daemonsu, changing install-recovery.sh, etc) but su command takes forever to finish.
(this outputs is after 'rooted' by towelroot, but i got similar output after installing update-supersu whatever version i used):
'su -v' gave output
1.99:SUPERSU
but
'su' and 'su --context u:r:system_app:s0 -c id' and 'su --self-test'
(stuck / takes forever to finish)
if i use / install update-supersu version 2.02 or higher beta version, 'su --self-test' outputs some lines before stuck:
version_code: 202
version_name: 2.02:SUPERSU
sdk: 19
daemon_sdk: 1
multiuser_sdk: 1
multiuser_userid: 0
multiuser_username: (null)
selinux_present: 1
selinux_enforcing: 1
context[base]: (stuck here)
Some output of 'ls -lZ /system/xbin'
-rwxr-xr-x root root u
bject_r:system_file:s0 daemonsu
-rwxr-xr-x root root u
bject_r:system_file:s0 su
I don't know whether this info is relevant or not: These lines exist in kernel's log:
Code:
<5>[ 187.801792] (09-11 11:36:02.538477353) type=1400 audit(1410406562.527:31): avc: denied { search } for pid=6242 comm="ainfire.supersu" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir
<5>[ 187.802063] (09-11 11:36:02.538747925) type=1400 audit(1410406562.527:32): avc: denied { read } for pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[ 187.802796] (09-11 11:36:02.539480946) type=1400 audit(1410406562.527:33): avc: denied { open } for pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[ 187.803050] (09-11 11:36:02.539734644) type=1400 audit(1410406562.527:34): avc: denied { getattr } for pid=6242 comm="ainfire.supersu" path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[ 193.536107] (09-11 11:36:08.272792195) type=1400 audit(1410406568.267:35): avc: denied { read } for pid=6372 comm="su" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir