diff --git a/module/customize.sh b/module/customize.sh index c8c83ae..f5eaacf 100644 --- a/module/customize.sh +++ b/module/customize.sh @@ -20,7 +20,7 @@ if [ -d /data/adb/modules/MagiskHidePropsConf ]; then ui_print "! MagiskHidePropsConfig (MHPC) module may cause issues with PIF" fi -# Replace/remove conflicting custom ROM injection app folders/files to disable them +# Replace/hide conflicting custom ROM injection app folders/files to disable them LIST=$MODPATH/example.app_replace.list [ -f "$MODPATH/custom.app_replace.list" ] && LIST=$MODPATH/custom.app_replace.list for APP in $(grep -v '^#' $LIST); do diff --git a/module/example.app_replace.list b/module/example.app_replace.list index 9bb813a..912ecf5 100644 --- a/module/example.app_replace.list +++ b/module/example.app_replace.list @@ -1,7 +1,7 @@ # Rename to custom.app_replace.list once customized # # Add conflicting custom ROM injection app folder/file paths to this list -# and they will be replaced/removed systemlessly to disable them +# and they will be replaced/hidden systemlessly to disable them # Xiaomi.eu /product/app/XiaomiEUInject diff --git a/module/post-fs-data.sh b/module/post-fs-data.sh index 692fab8..8c17792 100644 --- a/module/post-fs-data.sh +++ b/module/post-fs-data.sh @@ -11,7 +11,7 @@ if [ -d /data/adb/modules/safetynet-fix ]; then touch /data/adb/modules/safetynet-fix/remove fi -# Replace/remove conflicting custom ROM injection app folders/files to disable them +# Replace/hide conflicting custom ROM injection app folders/files to disable them LIST=$MODDIR/example.app_replace.list [ -f "$MODDIR/custom.app_replace.list" ] && LIST=$MODDIR/custom.app_replace.list for APP in $(grep -v '^#' $LIST); do diff --git a/module/service.sh b/module/service.sh index 7e60d18..343d5f1 100644 --- a/module/service.sh +++ b/module/service.sh @@ -15,7 +15,7 @@ if [ -n "$(resetprop ro.build.selinux)" ]; then resetprop --delete ro.build.selinux fi # use toybox to protect *stat* access time reading -if [ "$(toybox cat /sys/fs/selinux/enforce)" == "0" ]; then +if [ "$(toybox cat /sys/fs/selinux/enforce)" = "0" ]; then chmod 640 /sys/fs/selinux/enforce chmod 440 /sys/fs/selinux/policy fi @@ -25,7 +25,7 @@ fi # SafetyNet/Play Integrity { # must be set after boot_completed for various OEMs - until [ "$(getprop sys.boot_completed)" == "1" ]; do + until [ "$(getprop sys.boot_completed)" = "1" ]; do sleep 1 done