History log of /frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
524b2e4f305c2d4d9fd332daf5041d68e8f8efa7 26-Jul-2016 Hugo Benichi <hugobenichi@google.com> resolve merge conflicts of 514da60 to nyc-mr1-dev-plus-aosp

Change-Id: Ib1c01241fece36f660d27f3450ba8059b3b2809f
514da60fb6227de9700e145f03614c2081e8e5a5 19-Jul-2016 Hugo Benichi <hugobenichi@google.com> Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission

This patch creates a new permission used by ConnectivityService to give
access to restricted networks without the NET_CAPABILITY_NOT_RESTRICTED
capability bit on.

Bug: 24497316
Change-Id: I5b6c8a9ef14395b2f1ab26cb17b24d7876ec79f1
/frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java
b48db5b76b0361a1e7b2b492c8c886dfbe63c6ad 03-Feb-2016 zhangshuxiao <zhangshuxiao@xiaomi.com> When the applicantion is removed, reset network permission of this uid.

Probably not a portal: exception java.net.SocketException: Binding socket to network 102 failed: EPERM (Operation not permitted)

If there are SYSTEM permissions, then the original is SYSTEM permissions,
do not update. If other app of this uid have network permissions, the same
as before do not update, or update permissions. If all app of this uid
do not have any network permission to remove permissions.

Change-Id: I304d22b37de38d8b182639c0d7d7200adfcf715d
Signed-off-by: zhangshuxiao <zhangshuxiao@xiaomi.com>
/frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java
12acbd7836e989150d73b04452d8ee300d54bcf6 02-Feb-2016 Joe Onorato <joeo@google.com> Turn down the logging a little bit.

Change-Id: Ib6e0e6f3577afac3b9bfe9a9b1cce70fb16d9d04
/frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java
0f8f120839120da543ee186cf25ce6e215423e99 04-Nov-2014 Sreeram Ramachandran <sreeram@google.com> Don't use framework permission strings for netd permissions.

These framework permission strings were being used as arbitrary labels
that mapped to netd permissions that have completely different meaning.
This leads to confusion, so use different strings.

Bug: 18194858
Change-Id: Ib3ec377ab26ce904d3d4678f04edec6cb1260517
/frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java
e4a05afe85f15472325db9c535ef81f409fb6070 24-Sep-2014 Sreeram Ramachandran <sreeram@google.com> Send app permissions to netd.

Based largely off Robert's http://ag/546170 (thanks!)

Bug: 15413737
Change-Id: I8a1f0a184923c4c0a4935e6b88895bcc05e39f02
/frameworks/base/services/core/java/com/android/server/connectivity/PermissionMonitor.java