| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
ps2: move changes to cm_strings
ps3: trigger fixed cid
ps4/5: remove quotes
Change-Id: I3b4a0fa8dbc8eac84aee9d5f59a8fbd5caa3fd82
|
|\ \ \
| | | |
| | | |
| | | | |
configurable." into cm-10.1
|
| | | |
| | | |
| | | |
| | | | |
Change-Id: I1be0be2753b479e6d2e4fc8e17d971d03ce01bb7
|
|\ \ \ \
| |/ / / |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
- Collapse after dismissing the last notification
- Avoid duplicate code paths for collapsing
- Improve variable naming according to AOSP review suggestions
Change-Id: Ic6f26a61f263c5beebbcc9725fe8914d3858576f
|
|\ \ \ \ |
|
| | |/ /
| |/| |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Changed AOSP strings for SELinux
PS2: ported strings to custom file cm_strings.xml
(see http://review.cyanogenmod.org/#/c/45727)
PS3: Cid trigger
PS4: Cid trigger
Change-Id: Iedafc7f598a80682dcabce4c71fb9c921bf3da25
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
AOSP translations are present, but not activated
Change-Id: I8cf7d0c128a5f12da5440882e6f2e8e91ccf57c5
|
|\ \ \ \ |
|
| |/ / /
| | | |
| | | |
| | | |
| | | |
| | | | |
- added SELinux / MMAC policy
Change-Id: I110a5871089989fa301830bfec5d67918852feda
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Patch set 1 : add new translation
Patch set 2 : correction
Change-Id: If4b5cc9695d129d3be3acc714c26ade87f35dcc8
|
|\ \ \ \ |
|
| |/ / /
| | | |
| | | |
| | | |
| | | |
| | | | |
- SELinux support
Change-Id: I35de2435032bba44b077ddba9d5611443138c579
|
|\ \ \ \ |
|
| |/ / /
| | | |
| | | |
| | | | |
Change-Id: I1612f9133f2037bc556db0630742ba2c87482bef
|
|\ \ \ \ |
|
| |/ / /
| | | |
| | | |
| | | |
| | | |
| | | | |
Signed-off-by: Michael Bestas <mikeioannina@gmail.com>
Change-Id: I9666255a607cbce8ea8c4898ce929684e7b770bd
|
| |_|/
|/| |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Solves a memory leak in BatteryStatsService when Bluetooth
is turn on/off. Solution adds missing close of proxy then
Bluetooth is turned off.
Change-Id: I65f9db298459c7c15f6a10c752992f1d38469445
CRs-Fixed: 476145
|
| | |
| | |
| | |
| | | |
Change-Id: Ib75a5b709a65a48bcc371ef23cc15490587b77d0
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
blkid_get_tag_value.
There are two problems in here.
1. For the function blkid_get_tag_value third parameter is should be the device, not the mount pointer, in the MediaPrivader.attachVolume, it will pass the mount path to call this function.
2. The UUID for device is hex, so call atoi is not right. I think call strtol is better than atoi.
Change-Id: I76598a0993f08add3e9c7541cbc082d8d85e9af4
|
| | |
| | |
| | |
| | | |
Change-Id: I6eef9350fa62857cb5fd133a385cb09150cb6d1b
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
The AGPS implementation in the GPS chipset used in some Samsung devices
(i9100, i9300) can make use of the Psc field. Adapt the relevant
functions hiding the changes incompatible with other devices under the
AGPS_USE_PSC #define.
Credit to Qaweck from xda-developers forum for finding the meaning
of the field.
Change-Id: Ie4691c79ca379a1f5c0a87500c1b06b56ae7ac0d
|
|/ /
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Current tile rendering implementation in hwui sets the current
clip rect as tile rect during restore. This will limit the rendering
to the restored clip rect. Later in case if the app tries to render
outside the tile rect by setting a new clip rect, then all the pixels,
which are falling outside the tile rect are clipped off, this may result
into UI artifacats. This change adds the support for preserving the tile
clip as part of the snapshot and the same tile clip is used while
setting the tile rect. This way it is taken care that the correct tile
dimensions are preserved during save and retrieved during restore.
CRs-Fixed: 499767
Change-Id: Ia66b6dc8e7be5857949751a81e9f702c2d1c5a57
|
|\ \ |
|
| | |
| | |
| | |
| | | |
Change-Id: I512d24bd517bc29be39ec93d31e722ed1a4a56ea
|
|\ \ \ |
|
| |/ /
| | |
| | |
| | | |
Change-Id: Ie70f69474b9e83b6f9e2df4d34d6109008343356
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
so it doesn't fall under the range of poor signal and automatically
assumes a gsm signal, actually checks if all values are true and not
valid then pass it on to lte or gsm. This fixes cases when gsm signal
is not valid and lte is active. When lte is active and shows a really
weak and gsm signal is not avalible due some broken vendor ril or
just running cdma lte and a few others senario creates this issue.
Change-Id: If9c5dc1a969605cd1eeb9218de02a9f8dbbd3ae1
|
|/ /
| |
| |
| |
| |
| |
| |
| |
| |
| | |
When mEvdoEcio receives 0 getEvdoEcio returns -1.
Ecio valid values are positive integers, to fix this
consider EVDO ecio zero value as valid.
Change-Id: Ice8415150e7502c7f39e1a4135d35ea2bec1eb1f
CRs-Fixed: 402159
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Prior code only allowed a false to true transition for a device
admin policy. This was to ensure that a default true was always
upheld. Reverse this and allow a device admin policy to take over
the setting of all booleans; even those set by the init.rc.
Change-Id: I64ae4d397a8118614c83fa611f0191e2f934dade
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
|
| |
| |
| |
| |
| |
| |
| |
| | |
This fixes five errors when building the Java docs. It also
removes two obsolete lines.
Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
Change-Id: I814411cbc8d16eaed99a1389f5487529e36e647b
|
| |
| |
| |
| |
| |
| | |
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Change-Id: I814411cbc8d16eaed99a1389f5487529e36e637b
|
| |
| |
| |
| |
| | |
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Change-Id: I814411cbc8d16eaed99a1389f5487529e36e627b
|
| |
| |
| |
| |
| | |
Change-Id: Ibbe544a9f025d71ad416bc01cee2145b62d7b2d4
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
|
| |
| |
| |
| |
| |
| |
| |
| | |
Ensure that policy contains a clean seinfo
string. Where clean means no whitespace characters.
Change-Id: I814411cbc8d16eaed99a1389f5487529e36e617b
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
|
| |
| |
| |
| |
| |
| |
| |
| | |
No distinctions can be made among third party apps.
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Change-Id: Ic894086485bfea884c0e21af13f98a2d54346b15
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Patch adds the seinfo label per package to the file.
This is of particular interest to the run-as program
which uses the seinfo tag to correctly label the
app security context before running the shell.
Change-Id: I9d7ea47c920b1bc09a19008345ed7fd0aa426e87
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Recent submissions to AOSP rework some of the
internal logic of SELinuxMMAC and the PMS.
Bring our maintained version inline with
those changes while still allowing policy
to dictate all seinfo values regardless
of location.
Change-Id: I11ff4c4089217e6a9d95ca2841c5bc29bfd763ad
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
|
| |
| |
| |
| |
| |
| |
| | |
Per request by Google, move the install-time checks entirely
inside PMS.
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8479e
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
We need to respect if setenforce (selinux enforce), setsebool (booleans),
or setprop (mmac enforce) are set in the any of the init.rc files.
This set of changes will allow the init.rc values to win over any
potential device admin wishes.
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8473e
Signed-off-by: Robert Craig <rpcraig@tycho.ncsc.mil>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The location of policy files has changed from
/data/system to /data/security.
Also, a name change to mmac enforcing property
name to place it under persist.mmac. namesepace.
Adds api's for getting and setting the MMAC
enforcing mode.
Change-Id: I0e9468fe651cd6ec018d5c85d35d693e55479e89
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This patch covers 2 cases. When an app is installed
and the resulting data directory is created for all
existing users. And when a new user is created and
all existing app data directories are created for
the new user.
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8478e
|
| |
| |
| |
| |
| |
| |
| |
| | |
Conflicts:
api/current.txt
core/java/android/app/admin/DevicePolicyManager.java
Change-Id: I1df507ced67fbcab8fdcde9cce78705b5e54e346
|
| |
| |
| |
| | |
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8477e
|
| |
| |
| |
| |
| |
| | |
Also re-arrange and cleanup
Change-Id: I1261e715d8d04b72f8a29b8a24268d75946d24dc
|
| |
| |
| |
| | |
Change-Id: If2e076312b0e411145c1cd900f3ae20d998a0f24
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
These calls, added to the Device Admin API, will allow Device Admin apps
to change various SELinux settings, including:
* Toggling SELinux enforcing and permissive modes
* Toggle SELinux booleans
* Load a new SELinux policy file (sepolicy)
* Load new SELinux context files ({property,file,seapp}_contexts)
In order to use these APIs, a Device Admin must first request
USES_POLICY_ENFORCE_SELINUX, then become a SELinux Admin by calling
setSELinuxAdmin(). All other set* calls relevant to SELinux are guarded
by a check against whether the admin is a SELinux Admin.
Otherwise, the style of the set* calls are very similar to the other
calls setting device policy in the Device Admin API. That is, these
calls change the Admin's internal state and then call a sync method to
update the device's state to the Admin's state.
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8476e
|
| |
| |
| |
| |
| |
| | |
Patch adds the seinfo label per package to the file.
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8475e
|
| |
| |
| |
| |
| |
| |
| | |
Conflicts:
core/java/android/provider/Settings.java
Change-Id: I01f2a9084dfe7886087b1497070b0d7f2ad8474e
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch set allows the PMS to parse the
mac_permissions.xml file which contains the
seinfo values. Each package that is installed
on the device will be assigned an seinfo value
based on policy. This seinfo value will help label
the app process and data directory. Modifications
also include, adjustments to ApplicationInfo.java
to store the seinfo tag per package, adjustments
to installd to communicate the seinfo tag to
libselinux, and finally a set of unit tests.
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
Change-Id: I61ad1ea12fb6a9a6d0b108ec163bc4bf4c954b58
|