[DNM] sanders: Introduce 'SafailNet'

Bypass safetynet even if we have permissive selinux

Change-Id: Ib44cdbd15b53af3a1768cb0912f2dbcc56a8d97e

-Fall back to older fp for safetynet

Co-authored-by: ronaxdevil <pratabidya.007@gmail.com>
Signed-off-by: ronaxdevil <pratabidya.007@gmail.com>
This commit is contained in:
jhenrique09
2019-10-26 13:11:22 +05:30
committed by ronaxdevil
parent b9ceb30fa0
commit 4ee1e138ec
5 changed files with 20 additions and 2 deletions

View File

@@ -352,6 +352,7 @@ PRODUCT_PACKAGES += \
init.mmi.usb.rc \
init.qcom.rc \
init.qcom.sensors.sh \
init.safailnet.rc \
init.sanders.rc \
init.spectrum.rc \
init.spectrum.sh \

View File

@@ -48,6 +48,6 @@ PRODUCT_BUILD_PROP_OVERRIDES += \
PRIVATE_BUILD_DESC="sanders-user 8.1.0 OPS28.65-36 9fea release-keys"
# FINGERPRINT
BUILD_FINGERPRINT := google/crosshatch/crosshatch:9/PQ1A.190105.004/5148680:user/release-keys
VENDOR_BUILD_FINGERPRINT := google/crosshatch/crosshatch:9/PQ1A.190105.004/5148680:user/release-keys
BUILD_FINGERPRINT := google/walleye/walleye:8.1.0/OPM1.171019.011/4448085:user/release-keys
VENDOR_BUILD_FINGERPRINT := google/walleye/walleye:8.1.0/OPM1.171019.011/4448085:user/release-keys

View File

@@ -123,3 +123,11 @@ LOCAL_MODULE_CLASS := ETC
LOCAL_SRC_FILES := etc/init.dtv.sh
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_EXECUTABLES)
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.safailnet.rc
LOCAL_MODULE_TAGS := optional
LOCAL_MODULE_CLASS := ETC
LOCAL_SRC_FILES := etc/init.safailnet.rc
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/init/hw
include $(BUILD_PREBUILT)

View File

@@ -29,6 +29,7 @@ import /vendor/etc/init/hw/init.mmi.rc
import /vendor/etc/init/hw/init.sanders.rc
import /vendor/etc/init/hw/init.spectrum.rc
import /vendor/etc/init/hw/init.dtv.rc
import /vendor/etc/init/hw/init.safailnet.rc
on early-init
mount debugfs debugfs /sys/kernel/debug

View File

@@ -0,0 +1,8 @@
# Safetynet bypass
# Inspired in magisk source code, by topjohnwu
# Ported to ramdisk by jhenrique09
on boot
# selinux nodes, hide permissive state
chmod 0640 /sys/fs/selinux/enforce
chmod 0440 /sys/fs/selinux/policy