Skip to content
Snippets Groups Projects
Select Git revision
  • test default
1 result
You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.021Apr201920191817181716151615141514131211121110876545432131Mar1Apr31Mar1Apr31Mar1Apr31Mar3031302930293029Relax neverallow for video_device accessMerge "Make sure all public types are defined regardless of build variants" into oc-devRemove vr_wm service selinux policyAllow vr_hwc and virtual_touchpad to query for permissionsMerge "Do not allow untrusted apps any access to kernel configuration" into oc-dev am: 393c8e9438Merge "Do not allow untrusted apps any access to kernel configuration" into oc-devMerge "Do not allow untrusted apps any access to kernel configuration" into oc-devMake sure all public types are defined regardless of build variantsAllow dumping hal_graphics_composer_server and fix watchdogMerge "Grant dumpstate hwservermanager list permission" into oc-dev am: 8d567da26dMerge "Restrict access to hwservicemanager" into oc-dev am: 7dace9ae1dMerge "Fix build time warning" into oc-dev am: 5b8e9f55b6Merge "Grant dumpstate hwservermanager list permission" into oc-devMerge "Restrict access to hwservicemanager" into oc-devMerge "Grant dumpstate hwservermanager list permission" into oc-devMerge "Restrict access to hwservicemanager" into oc-devMerge "Fix build time warning" into oc-devMerge "Fix build time warning" into oc-devMerge "Let shell and bugreport read logging related properties." into oc-dev am: 97903c0567Do not allow untrusted apps any access to kernel configurationMerge "Let shell and bugreport read logging related properties." into oc-devMerge "Let shell and bugreport read logging related properties." into oc-devGrant dumpstate hwservermanager list permissionresolve merge conflicts of d3311c00 to masterRestrict access to hwservicemanagerFix build time warningMerge "dumpstate is a client of graphics allocator" into oc-devMerge "dumpstate is a client of graphics allocator" into oc-devLet shell and bugreport read logging related properties.Allow installd to read vendor_overlay_fileMerge "Only the bluetooth app may run in the bluetooth domain" am: 35fd321234 am: fad5038197 am: 20fa3aefe1Merge "Only the bluetooth app may run in the bluetooth domain" am: 35fd321234 am: fad5038197Merge "Only the bluetooth app may run in the bluetooth domain" am: 35fd321234Merge "Only the bluetooth app may run in the bluetooth domain"Merge "Only the bluetooth app may run in the bluetooth domain"Merge "Restrict access to hwservicemanager"Restrict access to hwservicemanagerMerge "Changing ueventd access from vendor_file to vendor_file_type."Remove rules blocking vrcore_app to connect to VR HWC and VirtualTouchpadChanging ueventd access from vendor_file to vendor_file_type.
Loading