Add UID scanner functionality and related infrastructure
- Introduced a new module `uid_scanner` in userspace for managing UID scanning. - Created a new GitHub Actions workflow for building the `user_scanner`. - Implemented kernel communication in `throne_comm.c` and `throne_comm.h` to handle user space updates and rescan requests. - Developed the `uid_scanner` daemon in C to scan user directories and manage UID whitelists. - Added configuration management for the UID scanner with support for multiple users and auto-scanning. - Implemented logging and error handling throughout the UID scanning process. - Created necessary build files for the `user_scanner` JNI integration. - Added a `.gitignore` file to exclude build artifacts.
This commit is contained in:
@@ -661,4 +661,11 @@ Important Note:\n
|
||||
<!-- KPM option radio group strings -->
|
||||
<string name="kpm_follow_kernel_file">Follow Kernel</string>
|
||||
<string name="kpm_follow_kernel_description">Use kernel as-is without any KPM modifications</string>
|
||||
<!-- UID Scanner Settings -->
|
||||
<string name="uid_auto_scan_title">User-mode scanning application list</string>
|
||||
<string name="uid_auto_scan_summary">Enabling this option will use user-mode scanning for the application list, improving stability. (If you encounter issues such as freezing during kernel scanning of the application list, you may try enabling this option.)</string>
|
||||
<string name="uid_multi_user_scan_title">Multi-User Application Scanning</string>
|
||||
<string name="uid_multi_user_scan_summary">When enabled, scans applications for all users, including work profiles</string>
|
||||
<string name="uid_scanner_setting_failed">Setting failed, please check permissions</string>
|
||||
<string name="uid_scanner_setting_error">Setting failed: %s</string>
|
||||
</resources>
|
||||
Reference in New Issue
Block a user