- 29 Feb, 2016 1 commit
-
-
Nick Kralevich authored
Bluetooth uses the tun device for tethering. Allow access. STEPS TO REPRODUCE: 0. Have two devices to test on, say Device A and Device B 1. On Device A, Go to settings ->Bluetooth . 2. Turn on the Bluetooth . 3. Pair it with device B 4. Tap on the paired device OBSERVED RESULTS: -Bluetooth share crash is observed with "Bluetooth share has stopped" error message -Unable to use Bluetooth tethering due to this issue EXPECTED RESULTS: No crash and Bluetooth devices should be able to connect for tethering Addresses the following denial: com.android.bluetooth: type=1400 audit(0.0:131): avc: denied { open } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=12340 scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0 Bug: 27372573 (cherry picked from commit 9a1347ee) Change-Id: Ibd16e48c09fe80ebb4f3779214de3b4806c12497
-
- 25 Feb, 2016 1 commit
-
-
The Android Automerger authored
-
- 24 Feb, 2016 10 commits
-
-
Marco Nelissen authored
Bug: 27305063 Change-Id: Ie9ac3fb971dbb989d7b26421e076139d3f48a916
-
Marco Nelissen authored
-
Marco Nelissen authored
Bug: 27305063 Change-Id: Ie9ac3fb971dbb989d7b26421e076139d3f48a916
-
Glenn Kasten authored
-
Jeffrey Vander Stoep authored
-
Daniel Cashman authored
-
The Android Automerger authored
-
Lorenzo Colitti authored
-
dcashman authored
Address the following denial: m.chrome.canary: type=1400 audit(0.0:15): avc: granted { read open } for path="/proc/meminfo" dev="proc" ino=4026544360 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file Bug: 22032619 Chromium Bug: 586021 Change-Id: I584345c84d870c313da69ec97a0b1e54c0eb9ee1
-
Glenn Kasten authored
Bug: 27323882 Change-Id: Idf3977d74817c4f90f9e993d2e1e5302cc56f41d
-
- 23 Feb, 2016 12 commits
-
-
Jeff Vander Stoep authored
Remove all permissions not observed during testing. Remove domain_deprecated Bug: 27064332 Change-Id: Ie154af70aaf255721b46d29357e48d5337020b4b
-
Yabin Cui authored
-
Dan Sandler authored
Bug: 26804329 Change-Id: I7b789c6fe8411e3a4a718da86d442a0f48c5c310
-
Jeff Sharkey authored
-
Jeff Sharkey authored
Ringtones often live on shared media, which is now encrypted with CE keys and not available until after the user is unlocked. To improve the user experience while locked, cache the default ringtone, notification sound, and alarm sound in a DE storage area. Also fix bug where wallpaper_file wasn't getting data_file_type. Bug: 26730753 Change-Id: Ib1f08d03eb734c3dce91daab41601d3ed14f4f0d
-
Daniel Sandler authored
-
Dan Sandler authored
Bug: 26804329 Change-Id: I7b789c6fe8411e3a4a718da86d442a0f48c5c310
-
Lorenzo Colitti authored
Bug: 27239233 Change-Id: Icc9d14008d2ff6334a8ec66805f7289aedd5d97d
-
Lorenzo Colitti authored
-
The Android Automerger authored
-
Erik Kline authored
-
- 22 Feb, 2016 8 commits
-
-
Sami Tolvanen authored
Bug: 26902605 Change-Id: Ica825cf2af74f5624cf4091544bd24bb5482dbe7 (cherry picked from commit 9c168711)
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Remove from unpriv_socket_ioctls but grant each user of unpriv_socket_ioctls use of unpriv_tty_ioctls Bug: 26990688 Change-Id: I998e09091de5a7234ad0049758d5dad0b35722f7
-
Tao Bao authored
-
Tao Bao authored
RecoverySystemService is separated from PowerManagerService as a dedicated system service to handle recovery related requests (such as invoking uncrypt to uncrypt an OTA package on /data or to set up / clear the bootloader control block (i.e. /misc) and etc). The matching CL in frameworks/base is in: Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560. Bug: 26830925 Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e (cherry picked from commit 65b5fde9)
-
Calin Juravle authored
-
Polina Bondarenko authored
-
Erik Kline authored
Requires net_raw and net_bind_service. Bug: 26991160 Change-Id: I4cdd23f0d0c94c9b5126c821464aadc67cdb90c9
-
- 19 Feb, 2016 2 commits
-
-
The Android Automerger authored
-
Calin Juravle authored
Bug: 26719109 Bug: 26563023 Change-Id: Ie0ca764467c874c061752cbbc73e1bacead9b995
-
- 18 Feb, 2016 3 commits
-
-
Christopher Tate authored
Bug 25454162 Change-Id: I3cd299ce28bf6235605265c47762969851845b78
-
Lorenzo Colitti authored
This will allow us to provide a better interface between Java services (e.g., ConnectivityService) and netd than the current FrameworkListener / NativeDaemonConnector interface which uses text strings over a Unix socket. Bug: 27239233 Change-Id: If40582ae2820e54f1960556b7bf7e88d98c525af
-
The Android Automerger authored
-
- 17 Feb, 2016 3 commits
-
-
Jeffrey Vander Stoep authored
-
Chien-Yu Chen authored
Bug: 27221797 Change-Id: Ie490eac5e7581ce21ca5377c3b46b48c647a335b
-
Polina Bondarenko authored
Bug: 26945055 Change-Id: I5745d02be9889f6a0e02de12bd8d8f2808de9ce0
-