- 18 Feb, 2019 13 commits
-
-
linar10 authored
-
dark-basic authored
I hope it does not have to be adjusted again. Since the text does not appear completely. (Only appears when the rotation of the screen is horizontal)
-
corsicanu authored
- cc @abrahamgcc
-
lindwurm authored
Signed-off-by:
lindwurm <lindwurm.q@gmail.com>
-
lindwurm authored
* strings "インストール", "タップしてSafetyNetチェックを開始" are too long to show in button Signed-off-by:
lindwurm <lindwurm.q@gmail.com>
-
HemanthJabalpuri authored
-
topjohnwu authored
Based on #1090, thanks to @shakalaca. Close #1090, close #1086
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
Reinstalling system apps as data creates tons of issues. Calling pm path <pkg> is extremely expensive and doesn't work in post-fs-data. Parse through packages.xml to get APK path and UID at the same time. As a bonus, we don't need to traverse /data/app for packages anymore.
-
topjohnwu authored
-
- 16 Feb, 2019 5 commits
-
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
Since we are parsing through /data/app/ to find target APKs for monitoring, system apps will not be covered in this case. Automatically reinstall system apps as if they received an update and refresh the monitor target after it's done. As a bonus, use RAII idioms for locking pthread_mutex_t.
-
topjohnwu authored
-
- 15 Feb, 2019 2 commits
- 14 Feb, 2019 7 commits
-
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
- Fail fast on unsupported systems - Show proper fail message on unsupported systems - inotify_fd shall be swapped out before closing to prevent the proc_monitor thread to read from incomplete inotify fd
-
topjohnwu authored
-
topjohnwu authored
- Use a general procfs traversal function with callbacks - Much better functions for killing processes
-
- 13 Feb, 2019 3 commits
-
-
topjohnwu authored
- Directly get UID instead of traversing /data/data everytime - Use /data/user_de/0 instead of /data/data on Android 7.0+ - Update hide_uid set incrementally when adding/initializing targets - Guard hide_uid set with the same lock as hide_list vector - Do not add GMS package into database; only add to in-memory list
-
Park Ju Hyung authored
With the new detection method, it is impossible to check for components. Remove additional checks for components and simply hardcode string to proc_monitor.cpp and query cmdline to see if it's GMS unstable. This addresses wasted resources on applying custom namespace on all GMS processes. Signed-off-by:
Park Ju Hyung <qkrwngud825@gmail.com>
-
Park Ju Hyung authored
Previous MagiskHide detects new app launches via listening through logcat and filtering launch info messages. This is extremely inefficient and prone to cause multiple issues both theoratically and practically. Rework this by using inotify to detect open() syscalls to target APKs. This also solves issues related to Zygote-forked caching mechanisms such as OnePlus OxygenOS' embryo. Signed-off-by:
Park Ju Hyung <qkrwngud825@gmail.com>
-
- 12 Feb, 2019 10 commits
-
-
topjohnwu authored
-
Igor Sorocean authored
-
Fatih Fırıncı authored
-
Remita Amine authored
-
marciozomb13 authored
PT-rBR update
-
topjohnwu authored
Android 4.1 init miss several significant features Magisk reply on, so the final decision is to forget about it in the future. Pull minSdkVersion of Magisk Manager back to 17 and remove some unnecessary adjustments done for SDK 16
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-