Created
January 11, 2025 20:44
-
-
Save ungeskriptet/dc08461d03e0b849cfdd4bfcb0465d37 to your computer and use it in GitHub Desktop.
I refuse to elaborate
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/vendor/bin/sh | |
/system/bin/magiskpolicy --live "allow dumpstate cameraserver_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate * * *" | |
/system/bin/magiskpolicy --live "allow dumpstate charon_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate connfwexe_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate credstore_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate ddexe_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate dhkprov_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate dmesgd_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate dnsmasq_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate drmserver_exec file *" | |
/system/bin/magiskpolicy --live "allow dumpstate fsck_exec file *" | |
/system/bin/magiskpolicy --live "allow system_app privapp_data_file dir *" | |
/system/bin/magiskpolicy --live "allow system_server vendor_file file map" | |
/system/bin/magiskpolicy --live "allow system_server vendor_file file *" | |
/system/bin/magiskpolicy --live "allow system_server vendor_file * *" | |
/system/bin/magiskpolicy --live "allow system_server * * *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_file file execute_no_trans" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_file file *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_file * *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell * * *" | |
/system/bin/magiskpolicy --live "allow cameraserver vendor_qti_init_shell binder call" | |
/system/bin/magiskpolicy --live "allow cameraserver vendor_qti_init_shell binder *" | |
/system/bin/magiskpolicy --live "allow cameraserver vendor_qti_init_shell * *" | |
/system/bin/magiskpolicy --live "allow cameraserver * * *" | |
/system/bin/magiskpolicy --live "allow hal_kgta_default vndbinder_device chr_file write" | |
/system/bin/magiskpolicy --live "allow hal_kgta_default vndbinder_device chr_file *" | |
/system/bin/magiskpolicy --live "allow hal_kgta_default vndbinder_device * *" | |
/system/bin/magiskpolicy --live "allow hal_kgta_default * * *" | |
/system/bin/magiskpolicy --live "allow priv_app chipname_prop file read" | |
/system/bin/magiskpolicy --live "allow priv_app media_plat_prop file read" | |
/system/bin/magiskpolicy --live "allow priv_app chipname_prop file *" | |
/system/bin/magiskpolicy --live "allow priv_app media_plat_prop file *" | |
/system/bin/magiskpolicy --live "allow priv_app chipname_prop * *" | |
/system/bin/magiskpolicy --live "allow priv_app media_plat_prop * *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell sysfs_camera_writable file *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell sysfs_camera_writable * *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_camera_prop * *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_camera_data_file file *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_camera_data_file dir *" | |
/system/bin/magiskpolicy --live "allow dumpstate apexd_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate apexserver_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate at_distributor_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate atrace_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate audiomirroring_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate auditctl_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate auditd_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate blank_screen_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate blkid_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate bootanim_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate bootchecker_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate bootstat_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate boringssl_self_test_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate bpfloader_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate bsd_exec file getattr" | |
/system/bin/magiskpolicy --live "allow dumpstate rs_exec file getattr" | |
/system/bin/magiskpolicy --live "allow hal_kgta_default vndbinder_device chr_file read" | |
/system/bin/magiskpolicy --live "allow hal_uwb_default default_prop file { getattr map open read }" | |
/system/bin/magiskpolicy --live "allow netutils_wrapper drb_device chr_file { read write }" | |
/system/bin/magiskpolicy --live "allow pageboostd themecenter_data_file dir search" | |
/system/bin/magiskpolicy --live "allow pageboostd themecenter_data_file file { open read }" | |
/system/bin/magiskpolicy --live "allow platform_app apex_info_file file getattr" | |
/system/bin/magiskpolicy --live "allow platform_app firmware_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app firmware_file filesystem getattr" | |
/system/bin/magiskpolicy --live "allow platform_app linkerconfig_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app metadata_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app mirror_data_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app system_dlkm_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app user_profile_data_file dir getattr" | |
/system/bin/magiskpolicy --live "allow platform_app vendor_vm_qti_system_file dir getattr" | |
/system/bin/magiskpolicy --live "allow system_app system_boot_reason_prop file { getattr map open read }" | |
/system/bin/magiskpolicy --live "allow system_server priv_app unix_stream_socket getopt" | |
/system/bin/magiskpolicy --live "allow system_server vendor_file file { getattr open read }" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell crash_dump process ptrace" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell dmabuf_system_heap_device chr_file { open read }" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell hal_camera_default_exec file execute_no_trans" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell system_data_root_file dir { add_name write }" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell system_data_root_file file { create getattr open write }" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_camera_data_file dir search" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_file file execute_no_trans" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_qti_init_shell process ptrace" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vendor_qti_init_shell qipcrtr_socket create" | |
/system/bin/magiskpolicy --live "allowxperm vendor_qti_init_shell video_device chr_file ioctl *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell video_device chr_file *" | |
/system/bin/magiskpolicy --live "allowxperm vendor_qti_init_shell vndbinder_device chr_file ioctl *" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell vndbinder_device chr_file *" | |
/system/bin/magiskpolicy --live "allow vendor_sensordebug ipc_logging_device dir search" | |
/system/bin/magiskpolicy --live "allow vendor_qti_init_shell * * *" | |
/system/bin/magiskpolicy --live "allow * * * *" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment