Squashed import of adb root patches
Author: Luca Stefani <luca.stefani.ge1@gmail.com>
Date: Sat Nov 2 22:46:51 2019 +0100
Expose the ADBRoot interface to priv-apps
Change-Id: I493f3322b19b6474bf8899a103156794ef412ae2
Author: Luca Stefani <luca.stefani.ge1@gmail.com>
Date: Sun Nov 3 12:17:17 2019 +0100
Whitelist settings to use adb root permission
Change-Id: I93122777c82fad33be04fcce002ba1a8468cacbe
Author: Michael Bestas <mkbestas@lineageos.org>
Date: Sun Nov 17 14:31:04 2019 +0200
Fix ADB root system API extension
* Fixes checkapi:
out/soong/.intermediates/frameworks/base/system-api-stubs-docs/android_common/current-apicheck/srcjars/android/Manifest.java:3435:
error: Added field android.Manifest.permission.ADBROOT to the system API [AddedField]
error: Added package android.adb to the system API [AddedPackage]
Change-Id: Idd509c31d961a0b20fac8cccd2c83c6bf23c5a38
Author: dianlujitao <dianlujitao@lineageos.org>
Date: Sat Nov 23 21:52:19 2019 +0800
ADBRootService: Deal with binder death
Change-Id: Id5e4a455ea16a4158086816abf093d8f603d4e49
Author: dianlujitao <dianlujitao@lineageos.org>
Date: Fri Nov 22 20:12:33 2019 +0800
ADBRootService: Remove redundant permission check
* First of all, the check is performed in a helper class, one can
easily bypass it by directly issuing the binder API.
* On the other hand, enforceCallingOrSelfPermission allows root and
system UID to do everything, i.e., any process running in system UID
is allowed to pass the check, including Settings app, thus it's
simply a no-op.
Change-Id: I82f58d6165c2ef35c61047d5899de3e8ca6f7f39
[LuK1337]: Rework for Android 11.
Change-Id: I320bc39573ddd81759893e442e02c7c580323d39
Loading
Please register or sign in to comment