PlayIntegrityFix/module/service.sh
DanGLES3 bb1d41951f
Remove Selinux Prop spoofing
I'd suggest either removing this line of code or have it set the property to 1, which by itself shouldn't problematic as it's present on some stock ROMs thus doesn't alarm detection systems and doesn't cause property deletion detection
2024-11-07 00:20:02 -03:00

58 lines
1.6 KiB
Bash

MODPATH="${0%/*}"
. "$MODPATH"/common_func.sh
# Conditional sensitive properties
# Magisk Recovery Mode
resetprop_if_match ro.boot.mode recovery unknown
resetprop_if_match ro.bootmode recovery unknown
resetprop_if_match vendor.boot.mode recovery unknown
# SELinux
resetprop_if_diff ro.boot.selinux enforcing
# use toybox to protect stat access time reading
if [ "$(toybox cat /sys/fs/selinux/enforce)" = "0" ]; then
chmod 640 /sys/fs/selinux/enforce
chmod 440 /sys/fs/selinux/policy
fi
# Conditional late sensitive properties
until [ "$(getprop sys.boot_completed)" = "1" ]; do
sleep 1
done
# SafetyNet/Play Integrity + OEM
# avoid bootloop on some Xiaomi devices
resetprop_if_diff ro.secureboot.lockstate locked
# avoid breaking Realme fingerprint scanners
resetprop_if_diff ro.boot.flash.locked 1
resetprop_if_diff ro.boot.realme.lockstate 1
# avoid breaking Oppo fingerprint scanners
resetprop_if_diff ro.boot.vbmeta.device_state locked
# avoid breaking OnePlus display modes/fingerprint scanners
resetprop_if_diff vendor.boot.verifiedbootstate green
# avoid breaking OnePlus/Oppo fingerprint scanners on OOS/ColorOS 12+
resetprop_if_diff ro.boot.verifiedbootstate green
resetprop_if_diff ro.boot.veritymode enforcing
resetprop_if_diff vendor.boot.vbmeta.device_state locked
# Other
resetprop_if_diff sys.oem_unlock_allowed 0
# Disable and uninstall conflict apps
APPS="
eu.xiaomi.module.inject
com.elitedevelopment.module
"
for APP in $APPS; do
if pm list packages | grep -q "$APP"; then
pm disable --user 0 "$APP"
pm disable "$APP"
pm uninstall --user 0 "$APP"
pm uninstall "$APP"
fi
done