Commit 51bc27a8 authored by topjohnwu's avatar topjohnwu

Avoid F2FS like a plague

parent 71b08379
...@@ -228,9 +228,9 @@ void MagiskInit::mount_rules_dir(const char *dev_base, const char *mnt_base) { ...@@ -228,9 +228,9 @@ void MagiskInit::mount_rules_dir(const char *dev_base, const char *mnt_base) {
if (setup_block(false) < 0) if (setup_block(false) < 0)
goto cache; goto cache;
} }
// Try to mount with either ext4 or f2fs // WARNING: DO NOT ATTEMPT TO MOUNT F2FS AS IT MAY CRASH THE KERNEL
// Failure means either FDE or metadata encryption // Failure means either f2fs, FDE, or metadata encryption
if (!do_mount("ext4") && !do_mount("f2fs")) if (!do_mount("ext4"))
goto cache; goto cache;
strcpy(p, "/data/unencrypted"); strcpy(p, "/data/unencrypted");
......
...@@ -608,7 +608,7 @@ copy_sepolicy_rules() { ...@@ -608,7 +608,7 @@ copy_sepolicy_rules() {
local active_dir=$(magisk --path)/.magisk/mirror/sepolicy.rules local active_dir=$(magisk --path)/.magisk/mirror/sepolicy.rules
if [ -e $active_dir ]; then if [ -e $active_dir ]; then
RULESDIR=$(readlink -f $active_dir) RULESDIR=$(readlink -f $active_dir)
elif [ -d /data/unencrypted ] && ! grep ' /data ' /proc/mounts | grep -q 'dm-'; then elif [ -d /data/unencrypted ] && ! grep ' /data ' /proc/mounts | grep -qE 'dm-|f2fs'; then
RULESDIR=/data/unencrypted/magisk RULESDIR=/data/unencrypted/magisk
elif grep -q ' /cache ' /proc/mounts; then elif grep -q ' /cache ' /proc/mounts; then
RULESDIR=/cache/magisk RULESDIR=/cache/magisk
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment