Squashed import of adb root patches
Author: Luca Stefani <luca.stefani.ge1@gmail.com> Date: Sat Nov 2 22:46:51 2019 +0100 Expose the ADBRoot interface to priv-apps Change-Id: I493f3322b19b6474bf8899a103156794ef412ae2 Author: Luca Stefani <luca.stefani.ge1@gmail.com> Date: Sun Nov 3 12:17:17 2019 +0100 Whitelist settings to use adb root permission Change-Id: I93122777c82fad33be04fcce002ba1a8468cacbe Author: Michael Bestas <mkbestas@lineageos.org> Date: Sun Nov 17 14:31:04 2019 +0200 Fix ADB root system API extension * Fixes checkapi: out/soong/.intermediates/frameworks/base/system-api-stubs-docs/android_common/current-apicheck/srcjars/android/Manifest.java:3435: error: Added field android.Manifest.permission.ADBROOT to the system API [AddedField] error: Added package android.adb to the system API [AddedPackage] Change-Id: Idd509c31d961a0b20fac8cccd2c83c6bf23c5a38 Author: dianlujitao <dianlujitao@lineageos.org> Date: Sat Nov 23 21:52:19 2019 +0800 ADBRootService: Deal with binder death Change-Id: Id5e4a455ea16a4158086816abf093d8f603d4e49 Author: dianlujitao <dianlujitao@lineageos.org> Date: Fri Nov 22 20:12:33 2019 +0800 ADBRootService: Remove redundant permission check * First of all, the check is performed in a helper class, one can easily bypass it by directly issuing the binder API. * On the other hand, enforceCallingOrSelfPermission allows root and system UID to do everything, i.e., any process running in system UID is allowed to pass the check, including Settings app, thus it's simply a no-op. Change-Id: I82f58d6165c2ef35c61047d5899de3e8ca6f7f39 Author: LuK1337 <priv.luk@gmail.com> Date: Thu Mar 24 09:33:36 2022 +0100 ADBRootService: Add isSupported() method to check if we are debuggable This allows us to show the preference in Settings even if Build.IS_DEBUGGABLE is false. Change-Id: I8302f1de25ecebd7fabff5d529136dc48819ee3a Change-Id: I1c90ad99960a2055339dfda9a03cd4f111ea40a0
Loading
Please register or sign in to comment