Squashed import of adb root patches
Author: Luca Stefani <luca.stefani.ge1@gmail.com>
Date: Sat Nov 2 22:46:51 2019 +0100
Expose the ADBRoot interface to priv-apps
Change-Id: I493f3322b19b6474bf8899a103156794ef412ae2
Author: Luca Stefani <luca.stefani.ge1@gmail.com>
Date: Sun Nov 3 12:17:17 2019 +0100
Whitelist settings to use adb root permission
Change-Id: I93122777c82fad33be04fcce002ba1a8468cacbe
Author: Michael Bestas <mkbestas@lineageos.org>
Date: Sun Nov 17 14:31:04 2019 +0200
Fix ADB root system API extension
* Fixes checkapi:
out/soong/.intermediates/frameworks/base/system-api-stubs-docs/android_common/current-apicheck/srcjars/android/Manifest.java:3435:
error: Added field android.Manifest.permission.ADBROOT to the system API [AddedField]
error: Added package android.adb to the system API [AddedPackage]
Change-Id: Idd509c31d961a0b20fac8cccd2c83c6bf23c5a38
Author: dianlujitao <dianlujitao@lineageos.org>
Date: Sat Nov 23 21:52:19 2019 +0800
ADBRootService: Deal with binder death
Change-Id: Id5e4a455ea16a4158086816abf093d8f603d4e49
Author: dianlujitao <dianlujitao@lineageos.org>
Date: Fri Nov 22 20:12:33 2019 +0800
ADBRootService: Remove redundant permission check
* First of all, the check is performed in a helper class, one can
easily bypass it by directly issuing the binder API.
* On the other hand, enforceCallingOrSelfPermission allows root and
system UID to do everything, i.e., any process running in system UID
is allowed to pass the check, including Settings app, thus it's
simply a no-op.
Change-Id: I82f58d6165c2ef35c61047d5899de3e8ca6f7f39
Author: LuK1337 <priv.luk@gmail.com>
Date: Thu Mar 24 09:33:36 2022 +0100
ADBRootService: Add isSupported() method to check if we are debuggable
This allows us to show the preference in Settings even if
Build.IS_DEBUGGABLE is false.
Change-Id: I8302f1de25ecebd7fabff5d529136dc48819ee3a
Change-Id: I1c90ad99960a2055339dfda9a03cd4f111ea40a0
2 files changed