-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(removal): Treat system UIDs as unsafe
#770
Comments
Further reading:
Galaxy S23, Android 14, One UI 6.1.1 You'll notice this is why apps like RethinkDNS pre-merge the UIDs of apps, e.g. if you modify one UID 1000 app, you modify all of them the same way. |
True, NetGuard does it too. The funny thing is that the built-in system settings app (on every device I tried) doesn't immediately update the perms for an app group; we have to "reload" the list to see the new perms for all apps in a group. Bad UX at its finest |
Goes for more than just new perms, this happens in many cases in Settings > Apps.
Truly. |
Found more info. I already added the official doc link to the initial comment |
Describe the feature you want
If any package belongs to any of these special kernel user IDs:
0
=root
: 0 packs associated (always?)1000
=system
: multiple packs share this ID2000
=shell
: typically onlycom.android.shell
Then UADNG should refuse to disable them, as if they were marked as
unsafe
.This seems necessary, because the actual pack-IDs that belong to these high-privilege groups can vary across devices, so we can't simply mark them all as
expert
orunsafe
.How to implement:
Acknowledgements
The text was updated successfully, but these errors were encountered: