Skip to content

Releases: vc-teahouse/Baseband-guard

v1.1

24 Dec 12:17
d4f7302

Choose a tag to compare

Highlights:

  • Refactor to bbg_cred_security_struct, and hook cred_prepare/cred_transfer/set_cred to auto trace process as untrusted
  • You can include bbg's tracing.h in any kernel module to control bbg's flag, directly use bbg_cred(current_cred()) to get current security context's bbg's flags
  • You even can use this feature in your root impl's kernel side to add a superkey support or better process flags, but PROCESS WITH YOUR OWN RISK
  • drop old selinux whitelist domain, now, any selinux domain denied will not appear, old "ota not work/can not run factory reset" has been fixed
  • hook inode_rename/inode_symlink to avoid modify /dev/block/by-name's symlink content to bypass bbg

What's Changed

New Contributors

Full Changelog: v1.0...v1.1

v1.0

27 Sep 22:40
1c35b9e

Choose a tag to compare

The first release

Note: Selinux permissive is NOT allowed in default.If you meet the problem by this when you using some apps,please contact your developer to set CONFIG_BBG_ANTI_SPOOF_DOMAIN to 3(disable) or 2(probably will lead to the system NOT stable) in defconfig and rebuild the kernel

What's Changed

New Contributors

Full Changelog: https://github.com/vc-teahouse/Baseband-guard/commits/v1.0