- Dec 22, 2017
-
-
Jeffrey Vander Stoep authored
This reverts commit 84f96859. Fixes: 70874565 Reason for revert: massive logspam during phone calls. Change-Id: If00e46535f71209eea999e4d5d499bf40a5f16fd (cherry picked from commit 67808214)
-
- Dec 20, 2017
-
-
android-build-team Robot authored
Change-Id: Ibdd728081321a07145664627e6fdf5c75029788e
-
android-build-team Robot authored
Change-Id: Ifff4a43c8a1d234faf4ce93c3736161810e36cf7
-
Jeffrey Vander Stoep authored
-
Tony Mak authored
CrossProfileAppsService allows apps to do limited cross profile operations, like checking the caller package is installed in the specified user. It is similar to LauncherAppsService in some sense. Merged-In: I26e383a57c32c4dc9b779752b20000b283a5bfdc Change-Id: I26e383a57c32c4dc9b779752b20000b283a5bfdc Fix: 67765768 Test: Built with ag/3063260. Can boot and verified those APIs are working. (cherry picked from commit 6536c9e0)
-
- Dec 19, 2017
-
-
Jeff Vander Stoep authored
Vendor-specific app domains depend on the rules in app.te so they must reside in public policy. Bug: 70517907 Test: build Change-Id: If45557a5732a06f78c752779a8182e053beb25a2
-
android-build-team Robot authored
Change-Id: Ia13f8422f7a5380e86dccc3dcb020fc2c83de314
-
yro authored
Bug: 63757906 Test: manual testing conducted Change-Id: Id03413ce82b5646d4bceddc59e16c7d5ee5bc193
-
Treehugger Robot authored
- Dec 18, 2017
-
-
xshu authored
we are aiming to improve logging performance by having wifi hal directly write to the flash. Wifi hal need to be able to create, write, and delete files in a directory. This will be restricted to userdebug and eng builds only. Bug: 70170285 Test: compile, run on device Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
-
TreeHugger Robot authored
-
- Dec 17, 2017
-
-
android-build-team Robot authored
Change-Id: I154593c52232c4236fa346fb6492f50a6ff2505a
-
- Dec 16, 2017
-
-
yro authored
Test: manual testing conducted see if it interfere's with AOSP Change-Id: If47a663557b2ebf825fc082edb838ae085ec66b3
-
Jiyong Park authored
Merge "/odm is another vendor partition that can be customied by ODMs" am: 5872e84f am: acc88216 am: a212c863 Change-Id: I3e18f18d49133e4fdaf1f266f905620c77eacaf8
-
Jiyong Park authored
am: acc88216 Change-Id: Ia130d8211d9e0b849d5bef6c14a9dc5ecdc0f4ac
-
Jiyong Park authored
am: 5872e84f Change-Id: Ice57a32ba00d99b74ed260706eee7dadae56e91a
-
Jeff Vander Stoep authored
Many processes including third party apps are expected to access /proc/net/xt_qtaguid/stats. Give this file a new label to avoid spamming the logs and temporarily grant read access to all processes. Read-only permission is adequate for all processes based on unix permissions. sailfish:/ # ls -laZ /proc/net/xt_qtaguid/stats -r--r--r-- 1 root net_bw_stats u:object_r:proc_net_xt_qtaguid_stats:s0 stats Bug: 9496886 Bug: 68016944 Bug: 70722355 Test: Build/flash Sailfish. Browse in Chrome and watch videos in youtube. No "denied" or "granted" selinux messages observed in the logs. Change-Id: I29f1ee806c8149988b9b93a950790d14754927ef
-
Treehugger Robot authored
- Dec 15, 2017
-
-
Jiyong Park authored
Since /odm is an extension of /vendor, libs in /odm should be treated just like the ones in /vendor. Bug: 67890517 Test: none as we don't yet have /odm partition. Change-Id: I5232baef769c7fa8c7641b462cfa1d7537d3cfdf
-
- Dec 14, 2017
-
-
android-build-team Robot authored
Change-Id: If706c8c3fbba604cdf4fae2b2fc27ca1d5eaf2e7
-
Tri Vo authored
Bug: 70275668 Test: walleye builds, boots. This change only expands the existing permissions, so shouldn't regress runtime behavior. Change-Id: I36e63f11d78998a88e3f8d1e6913e20762a359af
-