android_system_core/run-as
Nick Kralevich 080427e4e2 adb: drop capability bounding set on user builds
run-as: don't require CAP_DAC_OVERRIDE.

Prevent an adb spawned application from acquiring capabilities
other than

* CAP_NET_RAW
* CAP_SETUID
* CAP_SETGID

The only privileged programs accessible on user builds are
* /system/bin/ping
* /system/bin/run-as

and the capabilities above are sufficient to cover those
two programs.

If the kernel doesn't support file capabilities, we ignore
a prctl(PR_CAPBSET_DROP) failure. In a future CL, this could
become a fatal error.

Change-Id: I45a56712bfda35b5ad9378dde9e04ab062fe691a
2013-02-15 21:22:19 -08:00
..
Android.mk Don't statically compile run-as 2012-01-23 11:10:06 -08:00
NOTICE Add 'run-as' command implementation as set-uid program. 2010-03-17 11:02:08 -07:00
package.c adb: drop capability bounding set on user builds 2013-02-15 21:22:19 -08:00
package.h Add 'run-as' command implementation as set-uid program. 2010-03-17 11:02:08 -07:00
run-as.c Don't statically compile run-as 2012-01-23 11:10:06 -08:00