mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-24 02:25:28 +00:00
Support sepolicy.unlocked
Fix topjohnwu#4914
This commit is contained in:
parent
ff2513e276
commit
b4099fc5f9
@ -65,7 +65,7 @@ protected:
|
||||
bool avd_hack = false;
|
||||
#endif
|
||||
|
||||
void patch_sepolicy(const char *file);
|
||||
void patch_sepolicy(const char *in, const char *out);
|
||||
bool hijack_sepolicy();
|
||||
void setup_tmp(const char *path);
|
||||
void patch_rw_root();
|
||||
|
@ -242,8 +242,11 @@ void SARBase::patch_ro_root() {
|
||||
// Extract magisk
|
||||
extract_files(false);
|
||||
|
||||
if ((access(SPLIT_PLAT_CIL, F_OK) != 0 && access("/sepolicy", F_OK) == 0) || !hijack_sepolicy()) {
|
||||
patch_sepolicy(ROOTOVL "/sepolicy");
|
||||
// Oculus Go will use a special sepolicy if unlocked
|
||||
if (access("/sepolicy.unlocked", F_OK) == 0) {
|
||||
patch_sepolicy("/sepolicy.unlocked", ROOTOVL "/sepolicy.unlocked");
|
||||
} else if ((access(SPLIT_PLAT_CIL, F_OK) != 0 && access("/sepolicy", F_OK) == 0) || !hijack_sepolicy()) {
|
||||
patch_sepolicy("/sepolicy", ROOTOVL "/sepolicy");
|
||||
}
|
||||
|
||||
// Mount rootdir
|
||||
@ -297,7 +300,7 @@ void MagiskInit::patch_rw_root() {
|
||||
extract_files(true);
|
||||
|
||||
if ((!treble && access("/sepolicy", F_OK) == 0) || !hijack_sepolicy()) {
|
||||
patch_sepolicy("/sepolicy");
|
||||
patch_sepolicy("/sepolicy", "/sepolicy");
|
||||
}
|
||||
|
||||
chdir("/");
|
||||
|
@ -8,9 +8,9 @@
|
||||
|
||||
using namespace std;
|
||||
|
||||
void MagiskInit::patch_sepolicy(const char *file) {
|
||||
void MagiskInit::patch_sepolicy(const char *in, const char *out) {
|
||||
LOGD("Patching monolithic policy\n");
|
||||
auto sepol = unique_ptr<sepolicy>(sepolicy::from_file("/sepolicy"));
|
||||
auto sepol = unique_ptr<sepolicy>(sepolicy::from_file(in));
|
||||
|
||||
sepol->magisk_rules();
|
||||
|
||||
@ -27,8 +27,8 @@ void MagiskInit::patch_sepolicy(const char *file) {
|
||||
}
|
||||
}
|
||||
|
||||
LOGD("Dumping sepolicy to: [%s]\n", file);
|
||||
sepol->to_file(file);
|
||||
LOGD("Dumping sepolicy to: [%s]\n", out);
|
||||
sepol->to_file(out);
|
||||
|
||||
// Remove OnePlus stupid debug sepolicy and use our own
|
||||
if (access("/sepolicy_debug", F_OK) == 0) {
|
||||
|
Loading…
Reference in New Issue
Block a user