Update docs

This commit is contained in:
topjohnwu 2020-01-02 13:45:08 +08:00
parent e0d02a61a9
commit bd438ca288
2 changed files with 10 additions and 10 deletions

View File

@ -1,5 +1,5 @@
# Magisk Documentation # Magisk Documentation
(Updated on 2019.12.29) (Updated on 2020.1.2)
- [Installation](install.md) - [Installation](install.md)
- [Tutorials](tutorials.md) - [Tutorials](tutorials.md)

View File

@ -119,20 +119,22 @@ Usage: magiskpolicy [--options...] [policy statements...]
Options: Options:
--help show help message for policy statements --help show help message for policy statements
--load FILE load policies from FILE --load FILE load policies from FILE
--load-split load from preloaded sepolicy or compile --load-split load from precompiled sepolicy or compile
split policies split policies
--compile-split compile split cil policies --compile-split compile split cil policies
--save FILE save policies to FILE --save FILE save policies to FILE
--live directly apply sepolicy live --live directly apply sepolicy live
--magisk inject built-in rules for a minimal --magisk inject built-in rules for a minimal
Magisk selinux environment Magisk selinux environment
--apply FILE apply rules from FILE, read and parsed
line by line as policy statements
If neither --load or --compile-split is specified, it will load If neither --load or --compile-split is specified, it will load
from current live policies (/sys/fs/selinux/policy) from current live policies (/sys/fs/selinux/policy)
One policy statement should be treated as one parameter; One policy statement should be treated as one parameter;
this means a full policy statement should be enclosed in quotes; this means a full policy statement should be enclosed in quotes.
multiple policy statements can be provided in a single command Multiple policy statements can be provided in a single command.
The statements has a format of "<rule_name> [args...]" The statements has a format of "<rule_name> [args...]"
Multiple types and permissions can be grouped into collections Multiple types and permissions can be grouped into collections
@ -173,10 +175,10 @@ Notes:
Example: allow { s1 s2 } { t1 t2 } class * Example: allow { s1 s2 } { t1 t2 } class *
Will be expanded to: Will be expanded to:
allow s1 t1 class { all permissions } allow s1 t1 class { all-permissions }
allow s1 t2 class { all permissions } allow s1 t2 class { all-permissions }
allow s2 t1 class { all permissions } allow s2 t1 class { all-permissions }
allow s2 t2 class { all permissions } allow s2 t2 class { all-permissions }
``` ```
@ -202,7 +204,6 @@ Advanced Options (Internal APIs):
--clone-attr SRC DEST clone permission, owner, and selinux context --clone-attr SRC DEST clone permission, owner, and selinux context
--clone SRC DEST clone SRC to DEST --clone SRC DEST clone SRC to DEST
--sqlite SQL exec SQL commands to Magisk database --sqlite SQL exec SQL commands to Magisk database
--use-broadcast use broadcast for su logging and notify
Supported init triggers: Supported init triggers:
post-fs-data, service, boot-complete post-fs-data, service, boot-complete
@ -269,5 +270,4 @@ Actions:
ls Print the current hide list ls Print the current hide list
exec CMDs... Execute commands in isolated mount exec CMDs... Execute commands in isolated mount
namespace and do all hide unmounts namespace and do all hide unmounts
test Run process monitor test
``` ```