711 Commits

Author SHA1 Message Date
Tony Mak
54479c5e23 Revert "Whitelist ManagedProvisioning from bg check"
This reverts commit bbb551cfb5df58512f6d0df889766887d440eb08.

Reason for revert: <INSERT REASONING HERE>

Change-Id: I1d36b8760aac68fc4d3fca106d20cddfddaa9230
2017-03-30 16:27:49 +00:00
Tony Mak
bbb551cfb5 Whitelist ManagedProvisioning from bg check
Notice that app put in this list is also exempted from doze.
Also, this only exempts us from the service restriction, but not the broadcast one.

Test: adb shell am make-uid-idle  --user 0 com.android.managedprovisioning
      && adb shell am broadcast -a android.intent.action.PRE_BOOT_COMPLETED -n com.android.managedprovisioning/com.android.managedprovisioning.ota.PreBootListener
      Observe there is no crash

Change-Id: Ic0a943a9b66c909a6727f9411af519a8c6cf0157
Fix: 36705375
2017-03-29 20:41:17 +00:00
Chris Tate
b1669bf22b Merge "Give shell the CHANGE_DEVICE_IDLE_TEMP_WHITELIST permission" 2017-03-22 18:07:49 +00:00
Christopher Tate
ec3a9f3346 Give shell the CHANGE_DEVICE_IDLE_TEMP_WHITELIST permission
Shell needs to have this permission in order for the deviceidle
tempwhitelist shell command to exist.

Bug 34715096
Test: cts-tradefed run cts -m CtsAppTestCases \
  -t android.app.cts.ActivityManagerTest#testBackgroundCheckService

Change-Id: Ic1fdd87b6020649705ba0c9349dd00dd096037f3
2017-03-21 17:52:42 -07:00
Conrad Chen
6dad6d41b8 Declare privileged permissions of Live TV app
Test: build
Bug: 35782070
Change-Id: Ia1e39dcf8fdd3345837ebec1729ad4d02699763b
2017-03-21 16:59:50 -07:00
Roozbeh Pournader
1d0e57c2f8 Add 25 Noto fonts for historic scripts to fonts.xml
Fonts for Avestan, Brahmi, Carian, Cuneiform, Cypriot, Deseret,
Egyptian Hieroglyphs, Gothic, Imperial Aramaic, Inscriptional
Pahlavi, Inscriptional Parthian, Kaithi, Kharoshthi, Linear B,
Lycian, Lydian, Ogham, Old Italic, Old Persian, Old South Arabian,
Old Turkic, Osmanya, Phoenician, Shavian, and Ugaritic have been
added to fonts.xml.

Test: Manual
Bug: 32046261
Change-Id: I3e8a0cc5b066d88f0655daf99320a992037d9082
2017-03-13 15:03:38 -07:00
Daniel Cardenas
8ac32ec658 Create new Audio include for TVs that doesn't have ringtones.
Copied AllAudio.mk, pseudo sorted the list and removed ringtones.

Bug: 36066803
Test: Build on Fugu
Change-Id: I5a68dc930fae9e694a62a023f7445c752487c492
2017-03-09 13:40:16 -08:00
Jeff Sharkey
5517b73726 Revert "Start locking down /data/media access."
Caused b/35926593 because ExternalStorageProvider needs raw
access to underlying devices that aren't mounted visibly, like
USB mass storage devices.

This reverts commit 53d64fc839ad79be28d783f0f14082310a647dd9.
2017-03-07 14:21:30 -07:00
Jeff Davidson
272fe5c338 Merge "Declare new com.android.phone permission in whitelist." 2017-03-06 18:57:48 +00:00
Jeff Davidson
7344159c71 Declare new com.android.phone permission in whitelist.
Bug: 35948554
Test: Will verify T/H build
Change-Id: I41773160aa6515983a15365905a2cbb6b13e10c6
2017-03-03 17:42:35 -08:00
Alex Klyubin
1991f57230 Restrict access from apps to bluetooth_address setting
BluetoothManagerService for some reason leaks the Android's Bluetooth
MAC address via Settings.Secure which is normally readable by all
apps. This lets apps bypass the restriction on access to Bluetooth MAC
address from apps.

This commit fixes the issue by restricting access to bluetooth_address
secure setting (Settings.Secure). Only packages which hold the
android.permission.LOCAL_MAC_ADDRESS permission retain access.

This commit accordingly grants LOCAL_MAC_ADDRESS permission to the
system Shell app because a number of scripts (including Android CTS)
use "adb shell settings get secure bluetooth_address" as a convenient
way to query the device's Bluetooth MAC address over ADB. This is
acceptable because the user of the device can see the Bluetooth MAC
address and thus it's fine for shell to be able to see the address as
well.

Test: See CTS test added in the cts project in this topic.
Test: "adb shell settings get secure bluetooth_address" returns the
      Bluetooth MAC address of the Android.
Test: "adb shell settings list secure | grep bluetooth_address"
      returns the Bluetooth MAC address of the Android.
Test: Bluetooth works (toggling off/on, pairing, file transfer)
Bug: 33701414

Change-Id: I17b110b96eb3794b25c1661e93d29a7a003e3c9a
2017-03-03 14:25:14 -08:00
TreeHugger Robot
47d663fcb8 Merge "Document future removal or move of fonts.xml" 2017-02-28 04:52:26 +00:00
Roozbeh Pournader
19b05500b7 Document future removal or move of fonts.xml
Users are referred to alternative ways to find the data.

Test: not needed
Change-Id: I399b3aed8d04b0eecf163f61faba8fd5babc74de
2017-02-27 08:32:41 -08:00
Adam Lesinski
aea3cf40d6 Whitelist new CHANGE_OVERLAY_PACKAGES permission
The Shell application needs access to change which overlays are
enabled in OverlayManagerService.

Test: Manual: invoke adb exec-out cmd overlay enable some.package.name
when shell is not root (adb unroot on eng builds).
Change-Id: I1849f68e244cfc9b1e13eb0e673dde7be03cba6d
2017-02-23 18:52:30 -08:00
Jeff Sharkey
53d64fc839 Start locking down /data/media access.
The new sdcardfs filesystem requires that we have stricter access
controls around /data/media style locations.  Start by taking away
the "media_rw" GID from apps requesting the WRITE_MEDIA_STORAGE
permission.

Common use-cases like music playback appear to continue working fine,
as clients should only be attempting to use /data/media paths after
calling maybeTranslateEmulatedPathToInternal().

Test: builds, boots, music playback works
Bug: 35447080
Change-Id: Iba9f3ef41d3277c75497f675a1fe6d3406cf4542
2017-02-22 15:48:46 -07:00
Jerry Zhang
f970636072 Allow the shell to set USB functions.
Bug: 25596495
Test: svc usb setFunction mtp true
Change-Id: I4472464a1c7ed100cb257dbad83d1d8cfef88fc7
2017-02-17 11:50:30 -08:00
Christopher Tate
3283079e5e Put shell on the idle/background whitelist
Bug 35229549

Change-Id: I9f7dd66c37af9c28c9f0714be4358b94930c2d32
2017-02-10 11:42:23 -08:00
Dianne Hackborn
3f13c54f14 Fix issue #34592078: Mobile broadcast crash observed randomly...
...when using device on mobile data

Whitelist CellBroadcastReceiver, this is a core OS component anyway
so this probably makes sense.

Test: manual

Change-Id: I1560093640e81064ad123ff0bbcb307583fc47c6
2017-02-09 11:07:18 -08:00
Christopher Tate
4244c91e27 Whitelist LocalTransport here in the framework sysconfig
This shouldn't properly be emplaced as a side-effect of partner-
specific configurations; so now we don't do that any more.

Bug 35151478
Test: verify whitelist contents with 'bmgr whitelist'

Change-Id: I854ddfdbcec1def882b24f5ea7955b28d4789806
2017-02-08 16:37:57 -08:00
TreeHugger Robot
c15add0040 Merge "Extend permissions of cameraserver" 2017-02-07 10:13:09 +00:00
Emilian Peev
bd8851022e Extend permissions of cameraserver
Camera service will need to a way to query
the process state and oom score.

BUG: 34701266
Test: Manual testing + cts-tradefd run cts -m Camera --abi armeabi-v7a --disable-reboot
Change-Id: I4df704817d2fc728d421daeffbbbcee2e61d8c3b
2017-02-06 17:14:20 +00:00
Brad Ebinger
cab1dad44f Add BIND_IMS_SERVICE to permissions whitelist
Adds android.permission.BIND_IMS_SERVICE to the permissions
whitelist xml file.

Bug: 34813244
Test: Manual
Change-Id: I7a7ad1a361c9d2dcc51769bc74a436878ad4adc5
2017-02-03 10:51:05 -08:00
Nimrod Gileadi
2dac5c7212 Add Wear keycodes to emulator key layout file. am: 119a06ce55 am: 9576ce6696
am: 00620e70d5

Change-Id: Ie9e186901a6d846ee1417b1b1db9ed091e854b89
2017-02-01 18:08:49 +00:00
Nimrod Gileadi
9576ce6696 Add Wear keycodes to emulator key layout file.
am: 119a06ce55

Change-Id: I33d2b0f9b8281c22422677f03d6046a1be0bd94f
2017-02-01 17:57:16 +00:00
Nimrod Gileadi
119a06ce55 Add Wear keycodes to emulator key layout file.
The SLEEP keycode is used by Android Wear to indicate a
"palming" gesture (covering the screen with one's hand).

The STEM_* buttons are used for side buttons on Wear.

The keycode values were added to the emulator in
http://r.android.com/330771

Bug: 19996432
Change-Id: Ib90c3b27209b0059ebc1c2cce46cc732a677d557
2017-02-01 12:13:12 +00:00
TreeHugger Robot
fffa2eb046 Merge "Deliver MEDIA_SCANNER_SCAN_FILE to background receivers" 2017-01-24 22:40:17 +00:00
Christopher Tate
03a1ba2da4 Deliver MEDIA_SCANNER_SCAN_FILE to background receivers
Bug 34630982
Test: download mp3 file in Chrome, see it taken up in Play Music

Change-Id: Ia2d35d266d0066f0c2bd278bc8b6024ba94261bb
2017-01-24 12:45:09 -08:00
Fyodor Kupolov
02616eaac8 Whitelist CHANGE_DEVICE_IDLE_TEMP_WHITELIST for systemui
Test: device starts without warning
Change-Id: Ia13f7cee3da7eb2ac185415b44b6905f0f28c487
2017-01-24 11:39:23 -08:00
Christopher Tate
42a386b771 Enable background restrictions
Apps that target O+ are always subject to background restrictions.
Legacy apps' background restriction is subject to the OP_RUN_IN_BACKGROUND
app op.

Apps with these properties are exempted from background restrictions:
  - persistent process
  - currently on the idle battery whitelist
  - global whitelist for things like bluetooth services

Bug 30953212

Change-Id: Icc19b2fbc05f40dcf8c3fc4abf718c373dc8d4f6
2017-01-19 16:23:02 -08:00
Chris Tate
9e83cbbc10 Revert "Enable background restrictions"
This reverts commit 21f778060badb1e78bffde05e8de7662d275003d.

Change-Id: I65586f9739da84fb32b51b0ea166b8288c41d1b3
2017-01-19 01:12:19 +00:00
Fyodor Kupolov
5c26dc1b54 Merge "Updated platform privileged permissions" 2017-01-18 22:42:45 +00:00
Christopher Tate
21f778060b Enable background restrictions
Apps that target O+ are always subject to background restrictions.
Legacy apps' background restriction is subject to the OP_RUN_IN_BACKGROUND
app op.

Apps with these properties are exempted from background restrictions:
  - persistent process
  - currently on the idle battery whitelist
  - global whitelist for things like bluetooth services

Bug 30953212

Change-Id: Ib444829a2d222125f64ff19e8218823fa78373f9
2017-01-18 11:30:41 -08:00
Fyodor Kupolov
f9a8bd2828 Updated platform privileged permissions
Change-Id: I84e27ec023b20205bacb026e0a7cc32c12f67a7b
Test: manual
Bug: 33499917
Bug: 34128772
2017-01-12 17:36:53 -08:00
Joe LaPenna
cd54da4595 Add networkrecommendation permissions to privapp perms list.
Bug: 34235587
Test: Flashed and checked logcat for crash.
Change-Id: Ib35070ea87e23a3be8804eb3796e02c76a5628d0
2017-01-11 20:54:03 -08:00
Roozbeh Pournader
a27acfdebc Add font descriptions for six more scripts to fonts.xml
Font data for Phags-pa, Runic, Samaritan, and Tagalog are added, as
well as two new styles for Syriac (Estrangela was already included,
Eastern and Western are added).

Bug: 29535549
Bug: 32046261
Test: manual (new characters are now displayed) and 'make fontchain_lint'
Change-Id: Iad08286392850caf92e374818bd29d06b6a87e52
2016-12-19 15:19:35 -08:00
Roozbeh Pournader
aba60b542e Remove Droid Sans Fallback from all builds
Droid Sans Fallback is now completely replaced by Noto Sans CJK. The
font files are kept in the tree, since the SDK still needs them.

Also, Android.mk is updated to reflect the fact that Noto Color Emoji
is now included in SMALLER_FONT_FOOTPRINT, so fontchain_lint checks
for emoji consistency in that footprint too.

Bug: 31854008
Test: make fontchain_lint
Change-Id: I4f57114a48ecfaee87b49f01f7ef4fa5cd0b19fb
2016-12-13 22:53:52 +00:00
Fyodor Kupolov
964d2ebb94 Control privileged permissions for priv-apps
Added support for privapp-permissions config element. It allows to explicitly
control what privileged permissions applications should be granted.

Feature is controlled by ro.control_privapp_permissions property.
Possible values:
- 0/false, the feature is completely disabled - signature|privileged
  permissions are granted automatically without logging. *Default behavior*
- 1/true, enforce that only whitelisted permissions are granted. Only
  devices with ro.control_privapp_permission=1 will pass CTS tests.

Test: Manual
Bug:31008485
Change-Id: I93a8c2782cc72b3953f32c237086d08d82ac0d5b
2016-11-14 18:06:15 -08:00
Ajay Panicker
ad0c46100b Merge "Remove net_bt_stack group and replace it with bluetooth" am: 2309b98b25 am: 4a1fd7eb3d am: bd25fec0d9
am: 92b85c47ac

Change-Id: Ib39c516edf51fc9e13799b0bea266c403434ac9e
2016-09-23 00:04:19 +00:00
Ajay Panicker
92b85c47ac Merge "Remove net_bt_stack group and replace it with bluetooth" am: 2309b98b25 am: 4a1fd7eb3d
am: bd25fec0d9

Change-Id: I3825be4ebe408de183ad2787ca3da0c17d706e0d
2016-09-22 21:58:14 +00:00
Ajay Panicker
35cb698a88 Remove net_bt_stack group and replace it with bluetooth
Bug: 31549206
Change-Id: I4da37bef5cff0e6054e952e6755905a5cc1e2e68
2016-09-20 23:05:50 +00:00
yirui
f9936b9b7c Fix incorrect emoji presentation for 'Zsym' script
If the language tag "und-Zsym" is applied to a TextView, the default
presentation should be text-style. However, it didn't work before this
patch, due to a lack of "und-Zsym" language tag in fonts.xml.

Bug: 31297127
Change-Id: Ieed8fe1532806dd1e75c58aa0d7a724bfeed7796
2016-09-14 10:30:59 +09:00
Jean-Michel Trivi
8c3e199ba6 Fix alarm Bounce: remove DC offset at beginning am: bcbb5c4e07 am: a833e1ca30
am: 57067c871d

Change-Id: I22065fdc052656dcd3e635ccab71886b10e05448
2016-08-24 23:53:13 +00:00
Jean-Michel Trivi
bcbb5c4e07 Fix alarm Bounce: remove DC offset at beginning
Bug 31047718

Change-Id: I8abc8c6d90be172fe2797b1e89d34fafa690e21c
2016-08-24 23:02:49 +00:00
Felipe Leme
84c784b49a Merge "Move DownloadsManager to permanent whitelist." into nyc-dev am: 31e3b14d6a
am: d116e0fc14

* commit 'd116e0fc1447470a1d7ca1d6f25f56b4e598f996':
  Move DownloadsManager to permanent whitelist.

Change-Id: Icbe617b4a5f894930b15923fe2a104d1957bb17a
2016-06-01 23:02:47 +00:00
Felipe Leme
9a1dfc9dab Merge "Move DownloadsManager to permanent whitelist." into nyc-dev
am: 31e3b14d6a

* commit '31e3b14d6a613934a8c44223fd77aff2ecc5c5a5':
  Move DownloadsManager to permanent whitelist.

Change-Id: I2d36bc51ff244a0890824e376602f22baa0c4b7b
2016-06-01 22:45:33 +00:00
Felipe Leme
05515ae925 Move DownloadsManager to permanent whitelist.
DownloadProvider is now based completely on JobScheduler, and deep
inside the platform we allow foreground
downloads (FLAG_WILL_BE_FOREGROUND) to run even while the device is in
doze, so it doesn't need to be temporarily whitelisted anymore.

BUG: 29056149
Change-Id: I3658bb42aeeee5d5528f91ec990d6e1bc54257b6
2016-05-31 17:50:39 -07:00
Jean-Michel Trivi
5a847c6e48 Merge "Additional alarm sounds for N" into nyc-dev
am: b97fdfa39a

* commit 'b97fdfa39afe0dd90ebfb821a839a509475fd47c':
  Additional alarm sounds for N

Change-Id: If309b5d5e1569bc5ac1dc78a4e4ff9e289af4b71
2016-04-28 22:24:11 +00:00
Jean-Michel Trivi
b97fdfa39a Merge "Additional alarm sounds for N" into nyc-dev 2016-04-28 22:14:02 +00:00
Felipe Leme
3923615a50 Merge "Whitelist Downloads Manager for Data Saver." into nyc-dev
am: 76d985f1df

* commit '76d985f1df75a67a16fda68dc08333a6acb0c636':
  Whitelist Downloads Manager for Data Saver.

Change-Id: I3cdadaf795434b876d70bb5f91c9d02222dbec3c
2016-04-28 20:27:36 +00:00
Felipe Leme
1d0fbedf45 Whitelist Downloads Manager for Data Saver.
BUG: 28431507

Change-Id: I0478ff48865951a7ebac94434f48ad0e272e0901
2016-04-27 17:11:37 -07:00