This project is mirrored from https://github.com/LineageOS/android_frameworks_base.git. Updated .
  1. 13 Aug, 2019 1 commit
  2. 08 Aug, 2019 3 commits
  3. 06 Aug, 2019 1 commit
  4. 09 Jul, 2019 2 commits
  5. 21 Jun, 2019 1 commit
  6. 15 Jun, 2019 1 commit
  7. 06 Jun, 2019 1 commit
    • WyattRiley's avatar
      Adding SUPL NI Emergency Extension Time · 79f54038
      WyattRiley authored
      Configurable by carrier config.xml resource
      
      Bug: 118839234
      Bug: 115361555
      Bug: 112159033
      Test: On device, see b/115361555#comment14
      Change-Id: I52e61656cca8b6fa6468d32d2e69bf60f4c83c61
      (cherry picked from commit a725dd66)
      79f54038
  8. 05 Jun, 2019 4 commits
    • Julia Reynolds's avatar
      Add cross user permission check - areNotificationsEnabledForPackage · 241d57ae
      Julia Reynolds authored
      Test: atest
      Fixes: 128599467
      Change-Id: I13a0ca7590f8c4b44379730e0ee2088aba400c2a
      Merged-In: I13a0ca7590f8c4b44379730e0ee2088aba400c2a
      (cherry picked from commit 657d164136199126ae241848887de0230699cea0)
      (cherry picked from commit 63846a70)
      241d57ae
    • Pavel Grafov's avatar
      Limit IsSeparateProfileChallengeAllowed to system callers · 7da57cb8
      Pavel Grafov authored
      Fixes: 128599668
      Test: build, set up separate challenge
      Change-Id: I2fef9ab13614627c0f1bcca04759d0974fc6181a
      (cherry picked from commit 1b6301cf)
      7da57cb8
    • Eran Messeri's avatar
      Permission Check For DPM.getPermittedAccessibilityServices · 3db82b0a
      Eran Messeri authored
      Bug: 128599660
      Test: com.android.server.devicepolicy.DevicePolicyManagerTest
      Test: com.google.android.gts.devicepolicy.DeviceOwnerTest
      Change-Id: I8be915bd6a4ff99884d23005a4c6f0100806dbe8
      Merged-In: I8ee3f876fcaffa63636645f0f59709cd147254ef
      (cherry picked from commit 4fd13eef)
      3db82b0a
    • Varun Shah's avatar
      Added missing permission check to isPackageDeviceAdminOnAnyUser. · a08b5b61
      Varun Shah authored
      Added a check for the MANAGE_USERS permission to
      PackageManagerService#isPackageDeviceAdminOnAnyUser.
      
      To test that the method is still usable:
      1) Enable virtual storage via: adb shell sm set-virtual-disk true
      2) Follow instructions by clicking on notification to set up virtual storage
      3) Go to Settings -> Apps & notifications -> See all X apps
      4) Click on any non-system app (example Instagram)
      5) Tap Storage and you should see a "Change" button (if not, choose another app)
      6) Tap Change and you should see Internal and Virtual storage options listed
      7) The above step confirms the method is still usable by Settings
      
      Bug: 128599183
      Test: SafetyNet logging (steps listed above)
      Change-Id: I989f1daf52a71f6c778ebd81baa6f1bf83e9a718
      Merged-In: I36521fa43daab399e08869647326a7ac32d1e512
      (cherry picked from commit 18e7dedf)
      a08b5b61
  9. 28 May, 2019 1 commit
  10. 19 May, 2019 1 commit
  11. 18 May, 2019 1 commit
    • WyattRiley's avatar
      DO NOT MERGE - SUPL ES Extension - Safer Init and Not After Boot · 8c6c7a97
      WyattRiley authored
      Safe order of pointer setting and background thread start
      Verifying mCallEndElapsedRealtimeMillis is not the initial value
      
      Bug: 112159033
      Bug: 115361555
      Bug: 125124724
      Test: Verified not-after-boot with test code b/115361555#comment14
      Test: Reproed NPE on Nexus 5x with test thread sleep and verify fix
      Change-Id: I596f913bc79873274c2743132c93ef2381d9f3c7
      (cherry picked from commit b5e7bbe5)
      8c6c7a97
  12. 07 May, 2019 1 commit
  13. 15 Mar, 2019 2 commits
  14. 13 Mar, 2019 2 commits
  15. 12 Mar, 2019 1 commit
  16. 11 Mar, 2019 1 commit
  17. 05 Mar, 2019 2 commits
    • Guliz Tuncay's avatar
      Select only preinstalled Spell Checker Services · becc0144
      Guliz Tuncay authored
      When we are setting a new spell checker as the default one in
      Secure.Settings, TSMS#findAvailSpellCheckerLocked can pick up
      any available spell checker service. This violates the principle
      that user should be warned whenever we are setting an untrusted
      spell checker service as the default service, since the warning
      dialog is never shown.
      
      Fixes: 64764051
      Bug: 118694079
      Test: Manually as follows:
      1. Open 'packages/inputmethods/LatinIME/java/AndroidManifest.xml'
           and remove 'AndroidSpellCheckerService'
      2. lunch aosp_buillhead-userdebug && make -j
      3. Flash the image
      4. adb shell dumpsys textservices
          -> no spell checker is recognized
      5. adb shell settings get secure selected_spell_checker
          -> null
      6. tapas SampleSpellCheckerService
      7. make -j
      8. adb install -r $OUT/system/app/SampleSpellCheckerService/SampleSpellCheckerService.apk
      9. adb shell dumpsys textservices
          -> SampleSpellCheckerService is recognized
      10. adb shell settings get secure selected_spell_checker
          -> null
      
      Change-Id: I16f12293d15258c9148677c7ee09fe6dcf81e81d
      Merged-In: Idab3ecc246fe9344a09e6907a0ba39f8ea6506f9
      (cherry picked from commit ed5973b8)
      becc0144
    • Tony Mak's avatar
      RESTRICT AUTOMERGE Do not linkify text with RLO/LRO characters. · 7c411a06
      Tony Mak authored
      Also don't show smart actions for selections in text with unsupported
      characters.
      
      Bug: 116321860
      Test: runtest -x cts/tests/tests/text/src/android/text/util/cts/LinkifyTest.java
      
      Change-Id: Id271cab8aef6b9b13ef17f1a8654c7616f75cf13
      (cherry picked from commit 73f398d3)
      7c411a06
  18. 19 Feb, 2019 1 commit
  19. 15 Feb, 2019 1 commit
  20. 24 Jan, 2019 1 commit
  21. 21 Jan, 2019 1 commit
  22. 13 Jan, 2019 1 commit
  23. 07 Jan, 2019 1 commit
  24. 27 Dec, 2018 1 commit
  25. 17 Dec, 2018 1 commit
  26. 16 Dec, 2018 2 commits
    • Jeff Sharkey's avatar
      RESTRICT AUTOMERGE: Recover shady content:// paths. · b98c5a95
      Jeff Sharkey authored
      The path-permission element offers prefix or regex style matching of
      paths, but most providers internally use UriMatcher to decide what
      to do with an incoming Uri.
      
      This causes trouble because UriMatcher uses Uri.getPathSegments(),
      which quietly ignores "empty" paths.  Consider this example:
      
          <path-permission android:pathPrefix="/private" ... />
      
          uriMatcher.addURI("com.example", "/private", CODE_PRIVATE);
      
          content://com.example//private
      
      The Uri above will pass the security check, since it's not
      technically a prefix match.  But the UriMatcher will then match it
      as CODE_PRIVATE, since it ignores the "//" zero-length path.
      
      Since we can't safely change the behavior of either path-permission
      or UriMatcher, we're left with recovering these shady paths by
      trimming away zero-length paths.
      
      Bug: 112555574
      Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AppSecurityTests
      Change-Id: Ibadbfa4fc904ec54780c8102958735b03293fb9a
      (cherry picked from commit a1ec7b11)
      b98c5a95
    • Robin Lee's avatar
      Pass userId through to singleton ContentProviders · 019a7eab
      Robin Lee authored
      System content providers like SettingsProvider run as singleUser but
      on receipt of a call make decisions based on the calling user ID.
      
      This is right up until the caller is a system service or a cross-user-
      -aware app like Settings, where putStringForUser etc. provide a
      workaround for most settings but not for the few files SettingsProvider
      exposes.
      
      Change-Id: I90060c9c13e274edd71f8a16ab3a026a58b98e3e
      019a7eab
  27. 04 Dec, 2018 1 commit
    • Wayne Lin's avatar
      Changing SUPL_ES=1 for SUPL end point control · b3f380d3
      Wayne Lin authored
      SUPL_ES=1 ensures the GnssLocationProvider and related framework code
      accepts incoming SMS SUPL_INIT messages with ES-bit=1
      (which allow redirection of the ESLP
      end-point e.g. to the current local emergency services provider when
      you are travelling) only during an emergency call
      
      Bug: 115331218
      Bug: 112159033
      Test: Build pass
      Change-Id: I5075f7887a184ce18bb1815b35a2ce7acd8bca10
      (cherry picked from commit 02f38c72)
      b3f380d3
  28. 30 Nov, 2018 1 commit
  29. 24 Nov, 2018 1 commit
  30. 19 Nov, 2018 1 commit