From a609e0aad49e4165de17c82282342bc896362bcb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E6=AE=8B=E9=A1=B5?= <31466456+canyie@users.noreply.github.com> Date: Sun, 10 Apr 2022 15:31:53 +0800 Subject: [PATCH] Update tools.md magiskpolicy is no longer an applet of magiskinit --- docs/tools.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/docs/tools.md b/docs/tools.md index 19623130f..e5ae5ace1 100644 --- a/docs/tools.md +++ b/docs/tools.md @@ -5,10 +5,9 @@ Magisk comes with a huge collections of tools for installation, daemons, and uti ``` magiskboot /* binary */ magiskinit /* binary */ -magiskpolicy -> magiskinit -supolicy -> magiskinit +magiskpolicy /* binary */ +supolicy -> magiskpolicy magisk /* binary */ -magiskhide -> magisk resetprop -> magisk su -> magisk ``` @@ -120,7 +119,7 @@ This binary will replace `init` in the ramdisk of a Magisk patched boot image. I (This tool is aliased to `supolicy` for compatibility with SuperSU's sepolicy tool) -An applet of `magiskinit`. This tool could be used for advanced developers to modify SELinux policies. In common scenarios like Linux server admins, they would directly modify the SELinux policy sources (`*.te`) and recompile the `sepolicy` binary, but here on Android we directly patch the binary file (or runtime policies). +This tool could be used for advanced developers to modify SELinux policies. In common scenarios like Linux server admins, they would directly modify the SELinux policy sources (`*.te`) and recompile the `sepolicy` binary, but here on Android we directly patch the binary file (or runtime policies). All processes spawned from the Magisk daemon, including root shells and all its forks, are running in the context `u:r:magisk:s0`. The rule used on all Magisk installed systems can be viewed as stock `sepolicy` with these patches: `magiskpolicy --magisk 'allow magisk * * *'`.