-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add missing lockscreen drawables #23
base: kk4.4-caf
Are you sure you want to change the base?
Commits on Dec 9, 2014
-
Add missing lockscreen drawables
System settings FCs when trying to add lockscreen targets. Add missing resources for LockscreenTargets.java. Graphics copied from Cyanogenmod CM-11.0 branch. Change-Id: I1a8b70c425d2069e5d432c4f46b2265c7530985d
Configuration menu - View commit details
-
Copy full SHA for 6304b93 - Browse repository at this point
Copy the full SHA 6304b93View commit details
Commits on Dec 15, 2014
-
Revert "SystemUI: fix logic in smart pulldown all mode"
Looks like I did not understand this feature lol It was correct This reverts commit 927e314. Change-Id: Ie0e088191aa8197ac860d1a9acbd129cc811cda1
Configuration menu - View commit details
-
Copy full SHA for faf7b93 - Browse repository at this point
Copy the full SHA faf7b93View commit details
Commits on Dec 22, 2014
-
Change-Id: I5aa654ef7e0e7d690f4e3bccd6497d4221d8e2e0
Configuration menu - View commit details
-
Copy full SHA for da7f128 - Browse repository at this point
Copy the full SHA da7f128View commit details
Commits on Jan 30, 2015
-
Keyguard: Fix lockscreen selection view in landscape mode
Added a dimen-value for selector in landscape-layout to fit screen. Change-Id: I9501c91fed2660e947f1eae617f9a31d95766ed8
Configuration menu - View commit details
-
Copy full SHA for 36f5b1f - Browse repository at this point
Copy the full SHA 36f5b1fView commit details
Commits on Jun 3, 2015
-
Keyguard Landscape: Fix Glowpad and SIM Pin Layout for sw360dp devices
Fix Layout for sw360dp devices (for example 1280x720 xhdpi like i9300) Change-Id: Ia7e2476d397cf892c210cc20b182c485f9f3cfcd
Configuration menu - View commit details
-
Copy full SHA for ad458cb - Browse repository at this point
Copy the full SHA ad458cbView commit details -
ExternalStorageProvider: Use the UUID as title when the label is empty
When the label is empty the UI will show a blank space. Most operating systems will show it as the uuid, that's what this patch does as well. Change-Id: I8dc41ea70c96229cb0fccc1e19b525fbc4be1808
Configuration menu - View commit details
-
Copy full SHA for 657e640 - Browse repository at this point
Copy the full SHA 657e640View commit details -
Add previous console on pstore to DropBox
Change-Id: I23c0213fe3d52280d7338ca62cb7e79b80a16cc6
Configuration menu - View commit details
-
Copy full SHA for 728e70a - Browse repository at this point
Copy the full SHA 728e70aView commit details -
Properly clean up when setting new InputFilter.
The single InputFilter that is set in InputManagerService was replaced with a chain of filters that are all listening for InputEvents. The original field mInputFilter was replaced in this patch but not removed. When a new InputFilter is added, we check that this unused field mInputFilter != null before doing necessary teardown of the previous filter. Since this is always null, this causes the previous filter to not be disconnected when a new one is set with setInputFilter(). If the user toggles "Magnification Gestures" on and off twice in Accessibility Settings, this will send the old and new InputFilters into a loop sending and receiving touch events, locking up the device completely until reboot. Remove all references to the unused mInputFilter field. Change-Id: Id28335d150a195af8747b4862deb897ae850d2cb
Configuration menu - View commit details
-
Copy full SHA for c0f150d - Browse repository at this point
Copy the full SHA c0f150dView commit details -
Fix data cycle calculation when CYCLE_WEEKLY
The cycleDay is referred as a "day of month" (1-31) even when we change to CYCLE_WEEKLY. The calculations are expecting a day of week (1-7). Without this fix, we can fall into the (inconvenient) result of using a completely wrong value for the cycle limit (and corresponding data calculation) or the worse infinite loop that totally breaks data usage. Change-Id: I41e0012805236b14f5e0d52ec39683fe6a96f3aa
Configuration menu - View commit details
-
Copy full SHA for 427e9b5 - Browse repository at this point
Copy the full SHA 427e9b5View commit details -
Externally Reported Moderate Security Issue: SQL Injection in WAPPush…
…Manager Bug 17969135 Use query (instead of rawQuery) and pass in arguments instead of building the query with a giant string. Add a unit test that fails with the old code but passes with the new code. Change-Id: Id04a1db6fb95fcd923e1f36f5ab3b94402590918
Configuration menu - View commit details
-
Copy full SHA for 4dd5264 - Browse repository at this point
Copy the full SHA 4dd5264View commit details -
AudioEffect JNI: use new max preprocessing constant
Bug: 18226810. Change-Id: Ica5677da247268306b34dfce38f25394586817fd (cherry picked from commit b27a8a5)
Configuration menu - View commit details
-
Copy full SHA for 2f7ee78 - Browse repository at this point
Copy the full SHA 2f7ee78View commit details
Commits on Jul 28, 2015
-
frameworks: allow LockPatternView to be rotated
When displaying this view and rotating the screen, mLockPatternUtils has the potential to be null, but the save and restore instance state methods depend on it to be initialized. Work around this by checking if it's null. Change-Id: I351bd63fefbcb92fffe20dca6a0381a20ac796ea Signed-off-by: Roman Birg <roman@cyngn.com>
Configuration menu - View commit details
-
Copy full SHA for 95f4b0c - Browse repository at this point
Copy the full SHA 95f4b0cView commit details -
Fix set pattern screen after rotating the device 1/2
Allows the usage of a temporary pattern size while setting a new one. Change-Id: I3e62c2da4f290986f6295da8dee6900454b49141
Configuration menu - View commit details
-
Copy full SHA for 5ac63d6 - Browse repository at this point
Copy the full SHA 5ac63d6View commit details
Commits on Aug 20, 2015
-
Prevent system uid component from running in an app process
Bug: 21669445 Change-Id: I792c6e676d4b6d54a51228d264130b8125075d98
Configuration menu - View commit details
-
Copy full SHA for 1a8d780 - Browse repository at this point
Copy the full SHA 1a8d780View commit details
Commits on Sep 12, 2015
-
Convert all selinux_android_restorecon and _setfilecon calls to new API.
libselinux selinux_android_restorecon API is changing to the more general interface with flags and dropping the older variants. Also get rid of the old, no longer used selinux_android_setfilecon API and rename selinux_android_setfilecon2 to it as it is the only API in use. Change-Id: I1e71ec398ccdc24cac4ec76f1b858d0f680f4925 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Configuration menu - View commit details
-
Copy full SHA for c9a69c3 - Browse repository at this point
Copy the full SHA c9a69c3View commit details
Commits on Oct 2, 2015
-
DO NOT MERGE Change to add STK_PERMISSION for stk related commands.
Bug: 21697171 Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
Configuration menu - View commit details
-
Copy full SHA for b5aec53 - Browse repository at this point
Copy the full SHA b5aec53View commit details -
National roaming info for new Tuenti MNC in Spain
Change-Id: Ic639bd7f2aa120caad28f5b8b430a86d1d39f2e6
Configuration menu - View commit details
-
Copy full SHA for 7233c04 - Browse repository at this point
Copy the full SHA 7233c04View commit details
Commits on Nov 28, 2015
-
Check that the parcel contained the expected amount of region data. D…
…O NOT MERGE bug:20883006 Change-Id: Ib47a8ec8696dbc37e958b8dbceb43fcbabf6605b
Configuration menu - View commit details
-
Copy full SHA for a3e498b - Browse repository at this point
Copy the full SHA a3e498bView commit details -
DO NOT MERGE: Ensure that unparcelling Region only reads the expected…
… number of bytes bug: 20883006 Change-Id: I4f109667fb210a80fbddddf5f1bfb7ef3a02b6ce
Configuration menu - View commit details
-
Copy full SHA for a3080c9 - Browse repository at this point
Copy the full SHA a3080c9View commit details -
Allow debugging only for apps forked from zygote DO NOT MERGE
When starting the runtime from app_process, we only pass JDWP options if starting zygote. It prevents from opening a JDWP connection in non-zygote programs while Android apps (forked from zygote) remain debuggable. Bug: 23050463 (cherry picked from commit 7a09b83) Change-Id: I2400ecc8aea7579c43300efccf288b69f70eef53
Configuration menu - View commit details
-
Copy full SHA for 8e445a7 - Browse repository at this point
Copy the full SHA 8e445a7View commit details -
DO NOT MERGE - Backport of ag/748165 to klp-dev Security patch level …
…in Settings b/23946860 Change-Id: I610d4dedf18fe1825d7df5febf29e6f0c006490d (cherry picked from commit bdf7f35)
Configuration menu - View commit details
-
Copy full SHA for 326c591 - Browse repository at this point
Copy the full SHA 326c591View commit details -
Make Bitmap_createFromParcel check the color count. DO NOT MERGE
When reading from the parcel, if the number of colors is invalid, early exit. Add two more checks: setInfo must return true, and Parcel::readInplace must return non-NULL. The former ensures that the previously read values (width, height, etc) were valid, and the latter checks that the Parcel had enough data even if the number of colors was reasonable. Also use an auto-deleter to handle deletion of the SkBitmap. Cherry pick from change-Id: Icbd562d6d1f131a723724883fd31822d337cf5a6 BUG=19666945 Change-Id: Iab0d218c41ae0c39606e333e44cda078eef32291
Configuration menu - View commit details
-
Copy full SHA for 241b87f - Browse repository at this point
Copy the full SHA 241b87fView commit details
Commits on Dec 21, 2015
-
Get rid of not specifying a user errors in bluetooth.
* LordNerevar: Ported from LP. Includes fix for additional KK files. * W/ContextImpl( 1772): Calling a method in the system process without a qualified user: android.app.ContextImpl.bindService:1559 android.content.ContextWrapper.bindService:513 android.bluetooth.BluetoothInputDevice.doBind:262 android.bluetooth.BluetoothInputDevice.<init>:255 android.bluetooth.BluetoothAdapter.getProfileProxy:1365 W/ContextImpl( 1772): Calling a method in the system process without a qualified user: android.app.ContextImpl.bindService:1559 android.content.ContextWrapper.bindService:513 android.bluetooth.BluetoothPan.doBind:148 android.bluetooth.BluetoothPan.<init>:140 android.bluetooth.BluetoothAdapter.getProfileProxy:1368 W/ContextImpl( 1772): Calling a method in the system process without a qualified user: android.app.ContextImpl.bindService:1559 android.content.ContextWrapper.bindService:513 android.bluetooth.BluetoothMap.doBind:108 android.bluetooth.BluetoothMap.<init>:101 android.bluetooth.BluetoothAdapter.getProfileProxy:1374 W/ContextImpl( 1772): Calling a method in the system process without a qualified user: android.app.ContextImpl.bindService:1559 android.content.ContextWrapper.bindService:513 android.bluetooth.BluetoothPbap.doBind:163 android.bluetooth.BluetoothPbap.<init>:156 com.android.settings.bluetooth.PbapServerProfile.<init>:68 Change-Id: I0a1e24ee71aef7d796fcee5692b9d19462a93637
Configuration menu - View commit details
-
Copy full SHA for c85cddf - Browse repository at this point
Copy the full SHA c85cddfView commit details
Commits on Jan 7, 2016
-
Merge remote-tracking branch 'slim/kk4.4-caf' into HEAD
Change-Id: I25021a89bb36de8f400ab6ea04dc86cf440bd697
Configuration menu - View commit details
-
Copy full SHA for ad2b9fe - Browse repository at this point
Copy the full SHA ad2b9feView commit details -
Fix graphics corruption caused by HWUI caches
Some caches(PatchCache, TextureCache, PathCache) for HWUI uses deferred removal for their cache entries even though actual resource objects are immediately freed by ResourceCache. For this reason, the uniqueness of a resource address in the caches is not guaranteed in specific cases. (Because malloc() can return the same address when malloc() and free() called very frequently.) So it can be possible the cache have two cache entries for two different resources but the same memory address. (Of course one of the resources is already freed.) It also can be possible mGarbage vector in PatchCache has duplicated addresses and this can lead to duplicated free blocks in the free block list and graphics corruption. (Deferred removal was implmeneted based on an assumption of unique resource addresses.) So this patch makes sure resource objects are freed after the resources are removed from the caches to guarantee the uniqueness of a resource address and prevent graphics corruption. Change-Id: I040f033a4fc783d2c4bc04b113589657c36fb15b Signed-off-by: Sangkyu Lee <sk82.lee@lge.com>
Configuration menu - View commit details
-
Copy full SHA for f56bdd4 - Browse repository at this point
Copy the full SHA f56bdd4View commit details
Commits on Jan 8, 2016
-
Fix previous patch to compile with out compiler settings
Change-Id: I4bcfd2efc379d347df72425f30484d16e6dbae65
Configuration menu - View commit details
-
Copy full SHA for 69655e6 - Browse repository at this point
Copy the full SHA 69655e6View commit details
Commits on Jan 10, 2016
-
Sync extras bundle comparison can throw NPE
Bug: 23591205 Change-Id: I960dfcc1584c0a17685790d5d722eaf11b930e25 (cherry picked from commit 2f137b7)
Configuration menu - View commit details
-
Copy full SHA for 93b6827 - Browse repository at this point
Copy the full SHA 93b6827View commit details
Commits on Feb 4, 2016
-
There's no direct permission tied to it and fix the op-to-switch entry. Change-Id: I661ef6707ba50adb371e3223a91880c4838df669 Signed-off-by: Roman Birg <roman@cyngn.com> (cherry picked from commit 72a1fbe)
Configuration menu - View commit details
-
Copy full SHA for 274768f - Browse repository at this point
Copy the full SHA 274768fView commit details
Commits on Feb 15, 2016
-
Augment SELinuxMMAC functionality.
* No longer support a package name stanza outside of a signature tag. Package names, by themselves, have no security associated with them in Android and thus we should not be allowing or encouraging this type of policy. * Allow for nested package name stanzas inside signature stanzas. There are cases where a finer distinction needs to be made among apps signed with the same cert. New code allows a different seinfo tag to be assigned to the listed package names signed by the parent cert. When a determination needs to be made concerning seinfo assignments, the inner seinfo tag takes precedence over the outer seinfo labels which are assigned to just the signature. * Temp structures are now used to parse new policy files until the entire xml file is parsed and deemed correct, at which time the temp structures are copied over to the permanent class structures. This ensures that any structural errors with the policy will not result in partial loads. * Valid stanzas look like the following with the inner package piece being optional. <signer signature=""> <seinfo value=""/> <package name=""> <seinfo value=""/> </package> <signer> <default> <seinfo value=""/> </default> Change-Id: Ia204d71211776dcf9b2dcc86ad6d77c4ad39dc25
Configuration menu - View commit details
-
Copy full SHA for b0de459 - Browse repository at this point
Copy the full SHA b0de459View commit details -
Allow PMS to restorecon directories under /data.
This change applies a relabel to both /data/data and /data/user directories on boot. Not every boot will apply this relabeling however. The appropriate seapp_contexts is hashed and compared to /data/system/seapp_hash to decide if the relabel should occur. Change-Id: I05e8b438950ddb908e46c9168ea6ee601e6d674f Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
Configuration menu - View commit details
-
Copy full SHA for 8fdbb43 - Browse repository at this point
Copy the full SHA 8fdbb43View commit details -
Proper security labeling of multi-user data directories.
This patch covers 2 cases. When an app is installed and the resulting data directory is created for all existing users. And when a new user is created and all existing app data directories are created for the new user. Change-Id: Iaba7c40645bc7b6cc823d613da0c3782acf6ddd5 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
Configuration menu - View commit details
-
Copy full SHA for 131777d - Browse repository at this point
Copy the full SHA 131777dView commit details
Commits on Feb 18, 2016
-
Telephony: Update TD-SCDMA Network Type String
- Updating the string used to identify TD-SCDMA network type to be consistent with the ServiceState string. Change-Id: I5aee8728ee80dc199f37414aba9019523082862c CRs-Fixed: 564062
Configuration menu - View commit details
-
Copy full SHA for 9ebc1c3 - Browse repository at this point
Copy the full SHA 9ebc1c3View commit details -
Telephony: Add functionality to handle ICC IO error
At present in Android all ICC Card states other than ICC PRESENT are treated as ICC ABSENT.Adding functionality to handle ICC IO error card state. Change-Id: I229bd80cb5e487f4345bef9fb7fee60850f085d9 CRs-Fixed: 184479 (cherry picked from commit 5f414649d354f5b5f3208524e9827d488d183c76) (cherry picked from commit fa5fb0852573189c107847da711ed61489cf92b5) (cherry picked from commit 49e48d07a9cb7660d65ee3de30cf6e9f05bbc0ec)
Configuration menu - View commit details
-
Copy full SHA for de92d2f - Browse repository at this point
Copy the full SHA de92d2fView commit details -
Telephony: Add data rat constant
This event constant is used in DcTracker Change-Id: I1f9b34a8689c43c2586e9e3a92f0453649775d73 (cherry picked from commit f7ca98035479b670ff51bc9298fd7928a5e0f80d) (cherry picked from commit f4d8f7b8fa390302b9cc51a5640e017ff393dfcc) (cherry picked from commit 77d810390fbca8cb1d10bce148035fada414e0eb)
Configuration menu - View commit details
-
Copy full SHA for 4993c58 - Browse repository at this point
Copy the full SHA 4993c58View commit details -
Property constants to support OMH
Add static constant variables required for OMH support Change-Id: Idfeb2f3f1a3aa0403a7ff0ab7c69fc945d9e7083 (cherry picked from commit cf61f807ee07b4497da78c6bb753a835fa46b5b5) (cherry picked from commit 8e68d056ca7c14fdefecbcf9b2b69048f092754a) (cherry picked from commit 4a3b31e38c92bb1943c9290d8a4dd535b42bbd07)
Configuration menu - View commit details
-
Copy full SHA for bc113de - Browse repository at this point
Copy the full SHA bc113deView commit details -
Telephony: Handle DATA_CALL_LIST in DCC.
- Added async handling of NetStatPoll. Change-Id: Ic77bb949ffb72fb3c54bacc6ad2a6ee87e877023
Configuration menu - View commit details
-
Copy full SHA for a6d1aef - Browse repository at this point
Copy the full SHA a6d1aefView commit details -
MTU should be 1358 as per 3GPP standards, especially for LTE radio i…
…nterfaces. Change-Id: I5d3601b05a41d4c59cff3b39ddfb66d00cb23c45 Signed-off-by: Stacy Devino <swylie@oceusnetworks.com>
Configuration menu - View commit details
-
Copy full SHA for 1e25cea - Browse repository at this point
Copy the full SHA 1e25ceaView commit details -
Telephony: Implementation for IWLAN.
- Introduce new RAT as IWLAN. - Allow MDST to enable non-default APN availability when radio is off. CRs-Fixed: 600118 Change-Id: Ifc9a0928cbda1d89a95d27a276a20a2d8e1cc8ca
Configuration menu - View commit details
-
Copy full SHA for 09d7d8a - Browse repository at this point
Copy the full SHA 09d7d8aView commit details -
frameworks/base: forward port DC-HSPAP support from cm-10
PS10: add new drawables, I need to add new QS drawables and also RTL support PS11: fix blank space and prevents checkapi to fail PS13: fixed tile icon and rebase Change-Id: I1503c464b2db841fc193e57311e62415f5ff40f2
Configuration menu - View commit details
-
Copy full SHA for a307587 - Browse repository at this point
Copy the full SHA a307587View commit details -
Revert "Add support for BeiDou and Glonass"
This reverts commit 9c3c49b since it picked up the wrong patch for merge CRs-fixed: 582614 Change-Id: I6e1d45856fa26d470209396980f46ea13e5041db
Configuration menu - View commit details
-
Copy full SHA for f60eaa5 - Browse repository at this point
Copy the full SHA f60eaa5View commit details -
Add support for BeiDou and Glonass
Add masks for BeiDou amd Glonass to delete aiding data CRs-fixed: 582614 Change-Id: I651adcf4f5486c827bea8487e3437f15cd6d8013
Configuration menu - View commit details
-
Copy full SHA for 4948fd3 - Browse repository at this point
Copy the full SHA 4948fd3View commit details -
Change-Id: I7f8d30bdd3ade31a91ea29c6fd1d175c0a1ff32c
Configuration menu - View commit details
-
Copy full SHA for aa6805d - Browse repository at this point
Copy the full SHA aa6805dView commit details
Commits on Apr 13, 2016
-
NPE fix for SyncStorageEngine read authority
Add a null check after an authority is read from disk. Bug: 26513719 Change-Id: I18f01828141110e776cc96f3b3be3d80125e70c1 (cherry picked from commit a962d9e)
Configuration menu - View commit details
-
Copy full SHA for 1fd4444 - Browse repository at this point
Copy the full SHA 1fd4444View commit details -
DO NOT MERGE Redact Account info from getCurrentSyncs
BUG:26094635 If the caller to ContentResolver#getCurrentSyncs does not hold the GET_ACCOUNTS permission, return a SyncInfo object that does not contain any Account information. Change-Id: I5628ebe1f56c8e3f784aaf1b3281e6b829d19314 (cherry picked from commit b63057e) (cherry picked from commit a5cafd2)
Configuration menu - View commit details
-
Copy full SHA for e056b53 - Browse repository at this point
Copy the full SHA e056b53View commit details
Commits on Aug 10, 2016
-
Don't pass URL path and username/password to PAC scripts
The URL path could contain credentials that apps don't want exposed to a potentially malicious PAC script. Bug: 27593919 Change-Id: I4bb0362fc91f70ad47c4c7453d77d6f9a1e8eeed
Configuration menu - View commit details
-
Copy full SHA for d87e4d6 - Browse repository at this point
Copy the full SHA d87e4d6View commit details -
DO NOT MERGE: Don't trust callers to supply app info to bindBackupAge…
…nt() Get the canonical identity and metadata about the package from the Package Manager at time of usage rather than rely on the caller to have gotten things right, even when the caller has the system uid. Bug 28795098 Change-Id: I62710b15bb601fdfedd68e32349168c10725eb45 (cherry picked from commit d85a4ed)
Configuration menu - View commit details
-
Copy full SHA for bf01fcd - Browse repository at this point
Copy the full SHA bf01fcdView commit details
Commits on Sep 27, 2016
-
Update ExifInterface.getDateTime to support subseconds
Also document that it returns local time. Bug: 20638367 Change-Id: I6a1c35925e0555bcdcb079be0ca5b19a279a05a6
Configuration menu - View commit details
-
Copy full SHA for 82de2c3 - Browse repository at this point
Copy the full SHA 82de2c3View commit details -
ExifInterface: Add a few tag fields.
Since these are being CTS tested, they should be public. Bug: 21568414 Change-Id: I3f9f6e5da240b2ac0b2b88b5d25ec3c8c4704b8d
Configuration menu - View commit details
-
Copy full SHA for c7ebe6f - Browse repository at this point
Copy the full SHA c7ebe6fView commit details -
DO NOT MERGE: Remove the use of JHEAD in ExifInterface
Bug: 29270469 Change-Id: I6a6c8aeab2a842ff1646316363d614851625e78f
Configuration menu - View commit details
-
Copy full SHA for 70b1708 - Browse repository at this point
Copy the full SHA 70b1708View commit details -
* Not sure who to blame, but it's probably themes... :) Change-Id: I0c534354a699f756d809aff10843ebea21f3f369
Configuration menu - View commit details
-
Copy full SHA for b538c5a - Browse repository at this point
Copy the full SHA b538c5aView commit details
Commits on Oct 3, 2016
-
WifiEnterpriseConfiguration: Do not print credentials in toString
BUG:25624963 Change-Id: I939a12a27d6b915d8a9cc8b142f645fba0ee42ec
Configuration menu - View commit details
-
Copy full SHA for 44e1044 - Browse repository at this point
Copy the full SHA 44e1044View commit details
Commits on Nov 13, 2016
-
Updates for java-1.5 compatibility
Change-Id: I4333d6aa6fbbc9ca7131990b959f4d0cc4da8ad3
Configuration menu - View commit details
-
Copy full SHA for 2f6b68d - Browse repository at this point
Copy the full SHA 2f6b68dView commit details
Commits on Dec 7, 2016
-
Fix string equality comparison
Don't use "==" to compare strings. Bug: 25624963 Change-Id: Id25696e4fdcbcf4d48ec74e8ed65c1a33716b30c
Configuration menu - View commit details
-
Copy full SHA for 04134c4 - Browse repository at this point
Copy the full SHA 04134c4View commit details -
DO NOT MERGE: Fix CTS regression
Bug: 30297223, Bug: 30437363 Change-Id: I7b18af40e4eac2713577204428fbfb96cc346582
Configuration menu - View commit details
-
Copy full SHA for 53208ec - Browse repository at this point
Copy the full SHA 53208ecView commit details -
Configuration menu - View commit details
-
Copy full SHA for 2d05e40 - Browse repository at this point
Copy the full SHA 2d05e40View commit details -
DO NOT MERGE: Clean up when recycling a pid with a pending launch
Fix for accidental launch of a broadcast receiver in an incorrect app instance. Bug: 30202481 Change-Id: I84b74edc29ca3fb88048b44af682ecbeb176b774 (cherry picked from commit a3af5c6)
Configuration menu - View commit details
-
Copy full SHA for cee6d0d - Browse repository at this point
Copy the full SHA cee6d0dView commit details -
Fix vulnerability where large GPS XTRA data can be injected. -Can pot…
…entially crash system with OOM. Bug: 29555864 Change-Id: I7157f48dddf148a9bcab029cf12e26a58d8054f4 (cherry picked from commit dde12c6)
Configuration menu - View commit details
-
Copy full SHA for 2a040bb - Browse repository at this point
Copy the full SHA 2a040bbView commit details -
DO NOT MERGE Check caller for sending media key to telephony service
Prevent sending media key events from the non-system app to the telephony service through the AudioManager.dispatchMediaKeyEvent() or sending media key broadcast directly. Bug: 29833954 Tested: Installed malicious apps and confirmed that they don't work. Tested: Run CtsTelecomTestCases and CtsMediaTestCases Change-Id: I2a9e78196ba7455324e485f098f095d03b47ee15 (cherry picked from commit d1641e8)
Configuration menu - View commit details
-
Copy full SHA for b1dac3b - Browse repository at this point
Copy the full SHA b1dac3bView commit details -
DO NOT MERGE) ExifInterface: Make saveAttributes throw an exception b…
…efore change ExifInterface object can be created with a unsupported file format. If saveAttribute is called with an unsupported file format, ExifInterface makes the file corrupted. This CL prevents those cases by throwing an exception before making any change on the file. Bug: 30936376 Change-Id: I915f56b00ec9422b53591ac5534e070a1d6798e6 (cherry picked from commit 1bdd10a)
Configuration menu - View commit details
-
Copy full SHA for 5d671c2 - Browse repository at this point
Copy the full SHA 5d671c2View commit details -
Avoid crashing when downloading MitM'd PAC that is too big
There's two pieces to this fix: 1. Move PAC loading off IoThread which isn't meant for blocking network fetches. If the fetch takes more than 60s Android reboots when the IoThread is used. 2. Limit PAC fetching to 20MB. Any PAC bigger than that is likely evil. MitM of PACs should only be possbile when a non-SSL PAC URL is used. Change-Id: Ie1658a1c705615dc85a7fc68053f0dad8d048294 Fixes: 30100884 (cherry picked from commit 7d2198b)
Configuration menu - View commit details
-
Copy full SHA for e985cc9 - Browse repository at this point
Copy the full SHA e985cc9View commit details -
Prevent FDs from being leaked when accepted sockets are closed
Bug: 28672558 Change-Id: I4bc14bd7f098e34012c2ae1eeba2d439145901f0 (cherry picked from commit 786e269)
Configuration menu - View commit details
-
Copy full SHA for 78a5a4e - Browse repository at this point
Copy the full SHA 78a5a4eView commit details -
Fix setPairingConfirmation permissions issue (2/2)
setPairingConfirmation was set to only require BLUETOOTH_ADMIN permission which shouldn't be able to set the confirmation itself. This is restricted to BLUETOOTH_PRIVILEGED permission. Bug: 29043989 Change-Id: Iddc935f0b02f5ff56e930914b4b664377e786184 (cherry picked from commit edae39d)
Configuration menu - View commit details
-
Copy full SHA for f46303a - Browse repository at this point
Copy the full SHA f46303aView commit details -
DO NOT MERGE: Catch all exceptions when parsing IME meta data
Bug: 30568284 Change-Id: I0b613f8ce0f014320c5ac1bf445699ea2702a0a2 (manually cherry picked from 9b2997d22e6ce2a15065d8e7608dd77b316c2065) (cherry picked from commit f71d2cd)
Configuration menu - View commit details
-
Copy full SHA for ea83ffc - Browse repository at this point
Copy the full SHA ea83ffcView commit details -
DO NOT MERGE: Fix deadlock in AcitivityManagerService.
Don't hold mPidsSelfLocked lock when calling cleanUpApplicationRecordLocked. Bug: 31463143 Change-Id: I1fddd06f5e35b67fea041741f5746c57a39208ba (cherry picked from commit dce4be6)
Configuration menu - View commit details
-
Copy full SHA for 915c2fd - Browse repository at this point
Copy the full SHA 915c2fdView commit details
Commits on Feb 26, 2017
-
DO NOT MERGE Isolated processes don't get precached system service bi…
…nders More specifically, they get a PackageManager binder -- necessary for Android process startup and configuration -- but none of the other usual preloaded service binders. (backported from commit 2c61c57) Bug: 30202228 Change-Id: I3810649f504cd631665ece338a83d2e54d41ad05 (cherry picked from commit 2aa7e5e)
Configuration menu - View commit details
-
Copy full SHA for 391e238 - Browse repository at this point
Copy the full SHA 391e238View commit details -
DO NOT MERGE) ExifInterface: Close the file when an exception happens
Bug: 32068647, Bug: 30936376 Change-Id: I22fa2384348c890ca726d2b1632cd54e59d25a8f (cherry picked from commit 418e086)
Configuration menu - View commit details
-
Copy full SHA for 4d317aa - Browse repository at this point
Copy the full SHA 4d317aaView commit details
Commits on Jun 20, 2017
-
Fix exploit where can hide the fact that a location was mocked am: a2…
Configuration menu - View commit details
-
Copy full SHA for 4c8d87b - Browse repository at this point
Copy the full SHA 4c8d87bView commit details
Commits on Jul 8, 2017
-
[DO NOT MERGE] Check bounds in offsetToPtr
Check whether specified offset belongs to mData. Also added a default argument bufferSize to check the end offset. Size of the ashmem descriptor can be modified between ashmem_get_size_region call and mmap. createFromParcel method was updated to check ashmem size again immediately after memory is mapped. Test: manual - using the test app from the bug Bug: 34128677 Change-Id: I3ecd1616a870ce20941ce9b20a1843d2b4295750 (cherry picked from commit 45e2e95) (cherry picked from commit acede24)
Configuration menu - View commit details
-
Copy full SHA for 7329cc9 - Browse repository at this point
Copy the full SHA 7329cc9View commit details
Commits on Nov 9, 2017
-
Back-port fixes for b/62196835
Bug: 62196835 Test: Created an accessibility service that displays a system and a toast overlay, confirmed that it disappeared when we reached the accessibility permission screen that uses this flag. Change-Id: Ic51ead670fc480e549512ba1d02f49d9c13bc3f0 (cherry picked from commit 41ff538)
Configuration menu - View commit details
-
Copy full SHA for dcd2354 - Browse repository at this point
Copy the full SHA dcd2354View commit details
Commits on Dec 25, 2017
-
DO NOT MERGE. KEY_INTENT shouldn't grant permissions.
KEY_INTENT has no business granting any Uri permissions, so remove any grant flags that malicious apps may have tried sneaking in. Also fix ordering bug in general-purpose security check that was allowing FLAG_GRANT_PERSISTABLE to bypass it. Test: builds, boots Bug: 32990341, 32879915 Change-Id: I657455a770c81f045ccce6abbd2291407a1cfb42 (cherry picked from commit d722e78)
Configuration menu - View commit details
-
Copy full SHA for 69b72c6 - Browse repository at this point
Copy the full SHA 69b72c6View commit details
Commits on Feb 13, 2018
-
Adjust Uri host parsing to use last instead of first @.
Malformed authority segments can currently cause the parser to produce a hostname that doesn't match the hostname produced by the WHATWG URL parsing algorithm* used by browsers, which means that a URL could be seen as having a "safe" host when checked by an Android app but actually visit a different host when passed to a browser. The WHATWG URL parsing algorithm always produces a hostname based on the last @ in the authority segment, so we do the same. * https://url.spec.whatwg.org/#authority-state resets the "buffer", which is being used to build up the host name, each time an @ is found, so it has the effect of using the content between the final @ and the end of the authority section as the hostname. Bug: 68341964 Test: vogar android.net.UriTest (on NYC branch) Test: cts -m CtsNetTestCases (on NYC branch) (cherry picked from commit cd6228d) Change-Id: Ib791e5d4ad15dba87d65620513f92a71d780762f
Configuration menu - View commit details
-
Copy full SHA for b70b1f5 - Browse repository at this point
Copy the full SHA b70b1f5View commit details -
DO NOT MERGE Backporting potential usb tapjacking precaution.
Bug: 62187985 Test: manual, backport Change-Id: I89ef535e345d402866a083e0bd8e3fd909fc9662 MERGED-IN: I3bdcd1876cd6dbe8a728bbce74edb52ab79f3e4c MERGED-IN: Ic58ddd6d54e96f522445e67b90760dcfed13c27d
Configuration menu - View commit details
-
Copy full SHA for d4fad7d - Browse repository at this point
Copy the full SHA d4fad7dView commit details -
Prevent getting data from Clipboard if device is locked
Clipboard should not return data if the device is locked. This CL checks for device locked state before returning values from get/has functions. Test: bit -t CtsContentTestCases:android.content.cts.ClipboardManagerTest Bug: 64934810 Change-Id: Icefac226615fe22a7735dff4ba4c3b528fb2ac12
Configuration menu - View commit details
-
Copy full SHA for 027f8af - Browse repository at this point
Copy the full SHA 027f8afView commit details -
Fix ClipboardService device lock check for cross profile
ClipboardService.isDeviceLocked should clear callingIdentity before accessing KeyguardManager. Test: bit CtsDevicePolicyManagerTestCases:com.android.cts.devicepolicy.ManagedProfileTest Bug: 64934810 Change-Id: I00d491e5fb6d1c5451c7f8c453931b26e6134452
Configuration menu - View commit details
-
Copy full SHA for 30864b0 - Browse repository at this point
Copy the full SHA 30864b0View commit details
Commits on Mar 20, 2018
-
Change-Id: Ibe2f40d6e9f66b5159f3a99caa841b593bda670e
Configuration menu - View commit details
-
Copy full SHA for 9ba3ed4 - Browse repository at this point
Copy the full SHA 9ba3ed4View commit details
Commits on May 8, 2018
-
Adjust URI host parsing to stop on \ character.
The WHATWG URL parsing algorithm [1] used by browsers says that for "special" URL schemes (which is basically all commonly-used hierarchical schemes, including http, https, ftp, and file), the host portion ends if a \ character is seen, whereas this class previously continued to consider characters part of the hostname. This meant that a malicious URL could be seen as having a "safe" host when viewed by an app but navigate to a different host when passed to a browser. [1] https://url.spec.whatwg.org/#host-state Bug: 71360761 Test: vogar frameworks/base/core/tests/coretests/src/android/net/UriTest.java (on NYC branch) Test: cts -m CtsNetTestCases (on NYC branch) Change-Id: Id53f7054d1be8d59bbcc7e219159e59a2425106e (cherry picked from commit fa3afbd)
Configuration menu - View commit details
-
Copy full SHA for 7cbfca2 - Browse repository at this point
Copy the full SHA 7cbfca2View commit details -
Check for null-terminator in ResStringPool::string8At
All other stringAt methods check for null termination. Be consistent so that upper levels don't end up with huge corrupt strings. Bug: 62537081 Test: none Change-Id: I17bdfb0c1e34507b66c6cad651bbdb12c5d4c417 (cherry picked from commit 3d35a0e) (cherry picked from commit 97f8cb01149b35b1832c7f9efe85ff19edf1083e) (cherry picked from commit 5ec65ae)
Configuration menu - View commit details
-
Copy full SHA for aab3132 - Browse repository at this point
Copy the full SHA aab3132View commit details
Commits on Jul 10, 2018
-
ResStringPool: Fix security vulnerability
Adds detection of attacker-modified size and data fields passed to ResStringPool::setTo(). These attacks are modified apks that AAPT would not normally generate. In the rare case this occurs, the installation cannot be allowed to continue. Bug: 71361168 Bug: 71360999 Test: run cts -m CtsAppSecurityHostTestCases \ -t android.appsecurity.cts.CorruptApkTests Change-Id: If7eb93a9e723b16c8a0556fc4e20006aa0391d57 Merged-In: If7eb93a9e723b16c8a0556fc4e20006aa0391d57 (cherry picked from commit 7e54c3f)
Configuration menu - View commit details
-
Copy full SHA for 96b9c31 - Browse repository at this point
Copy the full SHA 96b9c31View commit details
Commits on Jul 31, 2018
-
DO NOT MERGE Truncate newline and tab characters in BluetoothDevice name
Test: manual Bug: 73173182 Change-Id: I7f2201cab36adf7f01d1a794d783cb78a536811f (cherry picked from commit 24da173)
Configuration menu - View commit details
-
Copy full SHA for bd41581 - Browse repository at this point
Copy the full SHA bd41581View commit details -
Fix the HIDE_NON_SYSTEM_OVERLAY_WINDOWS permission definition
Change Ic51ead670fc480e549512ba1d02f49d9c13bc3f0 incorrectly tries making this permission hidden. While marking it with @hide and only adding it to api/system-current.txt was the proper way on Android 6.0, on 4.4, we need to add system APIs to api/current.txt, without hiding them. This change adapts this permission definition for 4.4. Change-Id: Ib2de017d396aa9dcefa91f7eb1ea210be668234d
Configuration menu - View commit details
-
Copy full SHA for 21b625d - Browse repository at this point
Copy the full SHA 21b625dView commit details
Commits on Aug 28, 2018
-
ResStringPool: Prevenet boot loop from se fix
Changes the logs adding in a previous security fix to warnings so devices with malformed APKs currently on them will not undergo DOS when they are upgraded to P. Bug: 79724567 Test: run cts -m CtsAppSecurityHostTestCases \ -t android.appsecurity.cts.CorruptApkTests Change-Id: Ied54e4bb14abdaf79da562022c7ea6075187c1f8 (cherry picked from commit f05f47b) (cherry picked from commit c31cf80)
Configuration menu - View commit details
-
Copy full SHA for 574b17e - Browse repository at this point
Copy the full SHA 574b17eView commit details
Commits on Nov 19, 2018
-
DO NOT MERGE. Persistable Uri grants still require permissions.
When FLAG_GRANT_PERSISTABLE_URI_PERMISSION is requested, we still need to check permissions between the source and target packages, instead of shortcutting past them. The spirit of the original change is remains intact: if the caller requested FLAG_GRANT_PERSISTABLE_URI_PERMISSION, then we avoid returning "-1", which would prevent the grant data structure from being allocated. Bug: 111934948 Test: atest android.appsecurity.cts.AppSecurityTests Change-Id: Ief0fc922aa09fc3d9bb6a126c2ff5855347cd030 Merged-In: Ief0fc922aa09fc3d9bb6a126c2ff5855347cd030 (cherry picked from commit d6a6e71)
Configuration menu - View commit details
-
Copy full SHA for ad34efe - Browse repository at this point
Copy the full SHA ad34efeView commit details -
DO NOT MERGE. Execute "strict" queries with extra parentheses.
SQLiteQueryBuilder has a setStrict() mode which can be used to detect SQL attacks from untrusted sources, which it does by running each query twice: once with an extra set of parentheses, and if that succeeds, it runs the original query verbatim. This sadly doesn't catch inputs of the type "1=1) OR (1=1", which creates valid statements for both tests above, but the final executed query ends up leaking data due to SQLite operator precedence. Instead, we need to continue compiling both variants, but we need to execute the query with the additional parentheses to ensure data won't be leaked. Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java Bug: 111085900 Change-Id: I6e8746fa48f9de13adae37d2990de11c9c585381 Merged-In: I6e8746fa48f9de13adae37d2990de11c9c585381 (cherry picked from commit 57b04a8)
Configuration menu - View commit details
-
Copy full SHA for cb1a4bb - Browse repository at this point
Copy the full SHA cb1a4bbView commit details
Commits on Dec 18, 2018
-
If a device features a dock with a removable lid, lidOpenRotation overrides the rotation even if it was undocked (technically the lid is still open). This setting tells the framework whether to apply lidOpenRotation to undocked devices. Change-Id: I1051278a45875b2139b75db28467f9b8de2936d6 Conflicts: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Configuration menu - View commit details
-
Copy full SHA for 57776bc - Browse repository at this point
Copy the full SHA 57776bcView commit details
Commits on Jan 23, 2019
-
Verify number of Map entries written to Parcel
Make sure the number of entries written by Parcel#writeMapInternal matches the size written. If a mismatch were allowed, an exploitable scenario could occur where the data read from the Parcel would not match the data written. Fixes: 112859604 Test: cts-tradefed run cts -m CtsOsTestCases -t android.os.cts.ParcelTest Change-Id: I325d08a8b66b6e80fe76501359c41b6656848607 Merged-In: I325d08a8b66b6e80fe76501359c41b6656848607 (cherry picked from commit 057a01d)
Configuration menu - View commit details
-
Copy full SHA for 6c3de9e - Browse repository at this point
Copy the full SHA 6c3de9eView commit details
Commits on Mar 19, 2019
-
Bluetooth: Check descriptors size in BluetoothHidDeviceAppSdpSettings
Bug: 119819889 Test: compilation Change-Id: If51d0e2af74d99758f79a603d40cc2f5c84e4dde (cherry picked from commit 6351921)
Configuration menu - View commit details
-
Copy full SHA for c7d593b - Browse repository at this point
Copy the full SHA c7d593bView commit details
Commits on May 20, 2019
-
RESTRICT AUTOMERGE Do not linkify text with RLO/LRO characters.
Also don't show smart actions for selections in text with unsupported characters. Bug: 116321860 Test: runtest -x cts/tests/tests/text/src/android/text/util/cts/LinkifyTest.java Change-Id: Id271cab8aef6b9b13ef17f1a8654c7616f75cf13 (cherry picked from commit 73f398d)
Configuration menu - View commit details
-
Copy full SHA for d61a0ad - Browse repository at this point
Copy the full SHA d61a0adView commit details