-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fails to connect to update_engine
on Android 14 QPR2
#40
Comments
Custota isn't running under the
Seems like Android no longer loads This kind of sucks. I'll need to see if messing with the other seapp_contexts files is feasible in a Magisk module. If not, we'll need to drop support for Custota's isolated SELinux context, which would be quite unfortunate. (It currently allows Custota to do its job with minimal privileges and avoids granting other system apps access to |
So the It's trivial to override any file in All of the SELinux related changes are currently done in |
Android 14 QPR2 (2024 March security update) dropped support for loading APEX SELinux policies [1] and thus, /dev/selinux/apex_seapp_contexts. This commit updates the post-fs-data hook script to modify /system/etc/selinux/plat_seapp_contexts instead, which is the only other file that's applicable to apps stored on the system partition. The hook script takes extra care to ensure that an outdated modified version of this file won't be loaded because that can result in boot loops. [1] https://android.googlesource.com/platform/external/selinux/+/e9448817b37b2d14ab8e00dfff4b60347512aae7%5E%21/ Fixes: #40 Signed-off-by: Andrew Gunnerson <[email protected]>
Hmm, can you upload |
Sure, here it is |
Thanks. That's not the output I expected. Can you upload I think somehow, your device has version 3.1 of the Custota app, but version 3.0 of that script. |
Great, glad it's working now! |
Android 14 QPR2 (2024 March security update) dropped support for loading APEX SELinux policies [1] and thus, /dev/selinux/apex_seapp_contexts. This commit updates the post-fs-data hook script to modify /system/etc/selinux/plat_seapp_contexts instead, which is the only other file that's applicable to apps stored on the system partition. The hook script takes extra care to ensure that an outdated modified version of this file won't be loaded because that can result in boot loops. [1] https://android.googlesource.com/platform/external/selinux/+/e9448817b37b2d14ab8e00dfff4b60347512aae7%5E%21/ Fixes: chenxiaolong#40 Signed-off-by: Andrew Gunnerson <[email protected]>
Reported here: #39 (comment)
The text was updated successfully, but these errors were encountered: