Commit ca75dd07 authored by topjohnwu's avatar topjohnwu

Rename project

parent 9f35fa0f
LOCAL_PATH := $(call my-dir)
include $(CLEAR_VARS)
LOCAL_MODULE := sepolicy-inject
LOCAL_MODULE := magiskpolicy
LOCAL_STATIC_LIBRARIES := libsepol
LOCAL_SRC_FILES := main.c sepolicy.c rules.c utils.c
LOCAL_C_INCLUDES := jni/selinux/libsepol/include/
......
#ifndef SEPOLICY_INJECT_H
#define SEPOLICY_INJECT_H
#ifndef MAGISKPOLICY_H
#define MAGISKPOLICY_H
#define ALL NULL
......
#include "sepolicy-inject.h"
#include "magiskpolicy.h"
static int syntax_err = 0;
static char err_msg[ARG_MAX];
static void statements() {
fprintf(stderr, "\nSupported policy statements:\n\n");
fprintf(stderr, "\"allow #source-class #target-class permission-class #permission\"\n");
fprintf(stderr, "\"deny #source-class #target-class permission-class #permission\"\n");
fprintf(stderr, "\"auditallow #source-class #target-class permission-class #permission\"\n");
fprintf(stderr, "\"auditdeny #source-class #target-class permission-class #permission\"\n");
fprintf(stderr, "\"create #class\"\n");
fprintf(stderr, "\"permissive #class\"\n");
fprintf(stderr, "\"enforcing #class\"\n");
fprintf(stderr, "\"attradd #class #attribute\"\n");
fprintf(stderr, "\"typetrans source-class target-class permission-class default-class (optional: object-name)\"\n");
fprintf(stderr, "\nsource-class and target-class can be attributes (patches the whole group)\n");
fprintf(stderr, "All sections (except typetrans) can be replaced with \'*\' to patch every possible matches\n");
fprintf(stderr, "Sections marked with \'#\' can be replaced with collections in curly brackets\n");
fprintf(stderr, "e.g: allow { source1 source2 } { target1 target2 } permission-class { permission1 permission2 }\n");
fprintf(stderr, "Will be expanded to:\n");
fprintf(stderr,
"allow source1 target1 permission-class permission1\n\
allow source1 target1 permission-class permission2\n\
allow source1 target2 permission-class permission1\n\
allow source1 target2 permission-class permission2\n\
allow source2 target1 permission-class permission1\n\
allow source2 target1 permission-class permission2\n\
allow source2 target2 permission-class permission1\n\
allow source2 target2 permission-class permission2\n");
fprintf(stderr, "\n");
"\nSupported policy statements:\n"
"\n"
"\"allow #source-class #target-class permission-class #permission\"\n"
"\"deny #source-class #target-class permission-class #permission\"\n"
"\"auditallow #source-class #target-class permission-class #permission\"\n"
"\"auditdeny #source-class #target-class permission-class #permission\"\n"
"\"create #class\"\n"
"\"permissive #class\"\n"
"\"enforcing #class\"\n"
"\"attradd #class #attribute\"\n"
"\"typetrans source-class target-class permission-class default-class (optional: object-name)\"\n"
"\nsource-class and target-class can be attributes (patches the whole group)\n"
"All sections (except typetrans) can be replaced with \'*\' to patch every possible matches\n"
"Sections marked with \'#\' can be replaced with collections in curly brackets\n"
"e.g: allow { source1 source2 } { target1 target2 } permission-class { permission1 permission2 }\n"
"Will be expanded to:\n"
"allow source1 target1 permission-class permission1\n"
"allow source1 target1 permission-class permission2\n"
"allow source1 target2 permission-class permission1\n"
"allow source1 target2 permission-class permission2\n"
"allow source2 target1 permission-class permission1\n"
"allow source2 target1 permission-class permission2\n"
"allow source2 target2 permission-class permission1\n"
"allow source2 target2 permission-class permission2\n"
"\n"
);
}
static void usage(char *arg0) {
......
#include "sepolicy-inject.h"
#include "magiskpolicy.h"
void samsung() {
deny("init", "kernel", "security", "load_policy");
......
#include "sepolicy-inject.h"
#include "magiskpolicy.h"
static void *cmalloc(size_t s) {
void *t = malloc(s);
......
#include "sepolicy-inject.h"
#include "magiskpolicy.h"
void vec_init(vector *v) {
v->size = 0;
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment