Git Product home page Git Product logo

Comments (9)

lbdroid avatar lbdroid commented on August 31, 2024

I'm a bit unclear about what is going on in this. The permissions you have added do not appear to be relevant to the purpose of writing data to the /system partition. In particular, any installed application (like titanium backup) should be running in the untrusted_app context, and then by use of su, under the su context. Not system_app.

And what is going on with the kernel:process permission? That doesn't appear to be at all relevant.

This change has the feeling of being to enable some kind of hackaround for a hackaround for a bad implementation of su.

Have you communicated with the author of titanium backup to determine why it is trying to use these permissions, and maybe to come up with a better solution? As far as I can tell, su from the untrusted_app and su contexts should be capable of doing anything that this program would require. I bet you that he is performing an "su --context u:r:system_app:s0 -c do something" when just "su -c do something" would suffice (and work).

from aosp-su-patch.

craigacgomez avatar craigacgomez commented on August 31, 2024

That was my initial understanding as well. I am just not well versed enough with SELinux. I will talk to the author of TB to confirm.

from aosp-su-patch.

lbdroid avatar lbdroid commented on August 31, 2024

Ok, see if you can bring them into this issue tracker. Also note that the kernel:process permission was explicitly disincluded from the su policy (by google) with "allow su { domain -kernel }:process *;" which makes me nervous about adding it back in without first understanding the full implication. Obviously it adds in something that google thinks is bad to give over even to root.

The other ones are also a bit concerning, as they authorize system_app to transition to shell and toolbox contexts directly. shell context in particular, is concerning, since shell context is authorized to transition to su context. So essentially, this could allow any system_app to transition to su, possibly without even notifying the user, as long as su access is enabled for adb shell.

from aosp-su-patch.

lbdroid avatar lbdroid commented on August 31, 2024

Any updates on this issue?

from aosp-su-patch.

craigacgomez avatar craigacgomez commented on August 31, 2024

No... Been a bit busy with work (Black Friday/Cyber Monday stuff). I will get back to this soon

from aosp-su-patch.

phhusson avatar phhusson commented on August 31, 2024

Just ignoring the --context option does indeed work. I'm changing su to have a blacklist of apps with quirks.

from aosp-su-patch.

lbdroid avatar lbdroid commented on August 31, 2024

Perfect. Maybe we can turn this into a new feature, automatic context manipulation based on user lists, rather than a global blacklist.

calling userid, command, context override.
With wildcards in the command.

from aosp-su-patch.

phhusson avatar phhusson commented on August 31, 2024

Workaround added in seSuperuser/Superuser@f6174c3

from aosp-su-patch.

lbdroid avatar lbdroid commented on August 31, 2024

Lets call this fixed.

from aosp-su-patch.

Related Issues (1)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.