- Jan 22, 2017
-
-
William Roberts authored
am: b5269e8b Change-Id: Ibe6933b6473267089fc4836f637fb92037cab1cb
-
William Roberts authored
am: e9f62e21 Change-Id: Id5ce4d5f369f5303ea8e2e64d769a5223608eee4
-
William Roberts authored
am: ccf9fd7e Change-Id: I2ac7e1e500da92a690d31e9f9885d8a96b2786e3
-
Treehugger Robot authored
-
- Jan 21, 2017
-
-
Steven Moreland authored
am: 5bfa7b2a Change-Id: I4f350408d54b20dcfc77aeb3962b383cb93cc6dc
-
Steven Moreland authored
am: f81b5cdb Change-Id: I232e0daa8d0287cf8f616db62abb7a9565ae9dbb
-
Steven Moreland authored
am: 6c3a83d2 Change-Id: Id9a83308c1c2204b22f2cf0281da58215c667a0e
-
Treehugger Robot authored
-
Paul Lawrence authored
am: 68dc3de8 Change-Id: Ib4940dc503a3f55948941c17a3d00362e743d874
-
Paul Lawrence authored
am: c08b9c78 Change-Id: I75eccfc310d4d27ddac9c93aab6f594b04fdabe8
-
Paul Lawrence authored
am: e5912986 Change-Id: Id23483bcb0d4e4f75e77cb906f9bff258d53290a
-
Treehugger Robot authored
-
Jin Qian authored
Delete rule for permission_service since we use packages.list instead. Test: adb shell storaged -u Bug: 34198239 Change-Id: Ic69d0fe185e627a932bbf8e85fc13163077bbe6b
-
Steven Moreland authored
am: ba4dae35 Change-Id: I562ee6b39a86fe5be5e26301d1f988a0e582a2aa
-
Steven Moreland authored
am: 20868a1b Change-Id: I83e355565f11aa6a44973f6c3b4c9a421ff66267
-
Steven Moreland authored
am: 94668169 Change-Id: Iedaf0cb27d1bf4b0cf21a8a827b26fa12dcd326e
-
Steven Moreland authored
Test: pass Change-Id: Ie1a6513f8fa9cb4b007fccefe63ccb78fcd45578
-
- Jan 20, 2017
-
-
Steven Moreland authored
In order to dump hardware services using dumpsys, dumpsys needs to be able to talk to the hwservicemanager. Bug: 33382892 Test: dumpsys --hw works from unrooted shell Change-Id: I31f0982193991428da465507f93d50646cb38726
-
Alex Klyubin authored
am: 7e3e9ffb Change-Id: I7657ef58ee953f1696327257564993653c98fc34
-
Alex Klyubin authored
am: 6ea577a5 Change-Id: Ifd182b1ab935d1acc4197936161f477920a61f1c
-
Alex Klyubin authored
am: 7d98edfb Change-Id: I77e9a25e3f12da33babd5f4bfe8e5a2f12eae0a0
-
Eino-Ville Talvala authored
am: deb533c7 Change-Id: I08ad2d2b16243993a4b6fb245bb579229a31b27d
-
Treehugger Robot authored
-
Paul Lawrence authored
Test: Device boots Can take photos Run "adb shell atrace -c -b 16000 -t 5 gfx" without root and check produces output Run "python systrace.py view gfx freq sched am wm dalvik binder_driver" from external/chromium-trace after adb root and check populated Bug: 31856701 Change-Id: Ic319f8a0a3e395efa7ee8ba33a868ac55cb44fe4
-
Eino-Ville Talvala authored
am: f2827964 Change-Id: I0bc94f0af23d692d3d632dc46e5bad15c76823f3
-
Eino-Ville Talvala authored
- Allow cameraservice to talk to hwbinder, hwservicemanager - Allow hal_camera to talk to the same interfaces as cameraservice Test: Compiles, confirmed that cameraservice can call hwservicemanager Bug: 32991422 (cherry picked from commit 9c43a3ff) Change-Id: Ied0a3f5f7149e29c468a13887510c78d555dcb2a
-
Alex Klyubin authored
am: 5224fefe Change-Id: I4fbd474be69e675f982b70673aa49480227734e1
-
Alex Klyubin authored
am: a98b9804 Change-Id: I9ee6a1b562eff63a2e09c41fa9ea126f92709ca9
-
Alex Klyubin authored
Change-Id: I49ec3c6970ef51a220dbb6d9ec3c6b2b0c94612b
-
Alex Klyubin authored
-
Alex Klyubin authored
In my commit f41d89eb I forgot to switch rild and gatekeeperd rules from explicitly associating these domains with the hal_telephony and hal_gatekeeper to using the hal_impl_domain macro. As a result, the recent commit a2519226 inadvertently revoked HwBinder access from rild and gatekeeperd. This commit fixes the issue by switching rild and gatekeeperd to the hal_impl_domain macro. Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute haldomain" now lists rild and gatekeeperd Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_telephony" still lists rild Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_gatekeeper" still lists gatekeeperd Bug: 34180936 Bug: 34470443 Change-Id: I7949556f58c36811205d5ea3ee78ea5708e95b45
-
Josh Gao authored
Fix the following denial: tombstoned: type=1400 audit(0.0:563): avc: denied { append } for path="/data/anr/traces.txt" dev="sda35" ino=679941 scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0 Bug: http://b/34472671 Test: mma Change-Id: Iab5fbaf50888aa0f195841cb7e718ff393e526dd
-
Alex Klyubin authored
Test: No change to SELinux policy Change-Id: I45d6d6ab0538b9d4768b922cfdc2c972272d0b18
-
Alex Klyubin authored
am: a2aab1c0 Change-Id: I1d4803a4c71472f752f0be2dc80d108a14c808d9
-