e091f22e226f7177e45e23850670c1ad9b63fd75 |
|
12-Sep-2012 |
Kenny Root <kroot@google.com> |
Use shared app gid for forward-locked processes Use a shared app gid for each app across different users which allows forward-locked applications to share the same APK file. Change-Id: Ifecf51ee7865547117746f83e9733083d3dd5111
/frameworks/base/core/java/android/os/Process.java
|
e217ee4d7a8223289a1af7363627c69956c46d41 |
|
29-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Access to all users' external storage. System services holding this permission have external storage bound one level higher, giving them access to all users' files. Bug: 7003520 Change-Id: Ib2bcb8455740c713ebd01f71c9a2b89b4e642832
/frameworks/base/core/java/android/os/Process.java
|
2bca868361b41ff6a8228824cbecadc4c5deb44e |
|
22-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Iteration on multi-user external storage. Remove single-user bind mounts, since they need to remain as raw mounts to correctly propagate when remounted. This means we're back to using sdcard_r GID to enforce READ_EXTERNAL_STORAGE. Bug: 6925012 Change-Id: I41b5d7ddc985a5df2e288632a0a80d4724089e00
/frameworks/base/core/java/android/os/Process.java
|
79af1dd54c16cde063152922b42c96d72ae9eca8 |
|
17-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Switch public APIs to use new UserHandle class for identifying users. Gets rid of "yet another integer" confusion. Change-Id: Id07ea7307aea7c62f0087c6663a1f1c08e2e5dee
/frameworks/base/core/java/android/os/Process.java
|
c584b65b2093396c9a0c9303dab6ff6cb81ac315 |
|
16-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Multi-user external storage support." into jb-mr1-dev
|
f02b60aa4f367516f40cf3d60fffae0c6fe3e1b8 |
|
16-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Rename UserId to UserHandle. This is the start of turning this into a formal public API. Change-Id: I5786d2c320f1de41a06ed5d0f65adb68967287a0
/frameworks/base/core/java/android/os/Process.java
|
5b1ada2562c17921adf6a62ea62bcb445160983c |
|
15-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Multi-user external storage support. Emulated external storage always has multi-user support using paths like "/data/media/<user_id>". Creates and destroys these paths along with user data. Uses new ensure_dir() to create directories while always ensuring permissions. Add external storage mount mode to zygote, supporting both single- and multi-user devices. For example, devices with physical SD cards are treated as single-user. Begin migrating to mount mode instead of relying on sdcard_r GID to enforce READ_EXTERNAL_STORAGE. Bug: 6925012 Change-Id: I9b872ded992cd078e2c013567d59f9f0032ec02b
/frameworks/base/core/java/android/os/Process.java
|
7d19e0242faac8017033dabb872cdf1542fa184c |
|
08-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
More mult-user API work. - You can now use android:singleUser with receivers and providers. - New API to send ordered broadcasts as a user. - New Process.myUserHandle() API. For now I am trying out "user handle" as the name for the numbers representing users. Change-Id: I754c713ab172494bb4251bc7a37a17324a2e235e
/frameworks/base/core/java/android/os/Process.java
|
1abb1cb3a8fe17f7866150604c2fd73751da787e |
|
26-Jan-2012 |
Jaikumar Ganesh <jaikumar@google.com> |
Changes to Bluetooth Service structure. Changes to make Bluetooth Service part of the system_service. These changes may be temporary. Changes to update to the new disable API. Change-Id: If89dba17e6e6c6daa53c37684221763a2da076e9 Conflicts: services/java/com/android/server/pm/PackageManagerService.java
/frameworks/base/core/java/android/os/Process.java
|
ae017c55824ca345186b0c9fc204401153bd8a23 |
|
21-Jun-2012 |
Kenny Root <kroot@android.com> |
am a9543a3d: Merge "Pass additional inputs when spawning apps via the Zygote and add SELinux permission checks." * commit 'a9543a3dad0da58f30580bdf99b76bc2ab97a2df': Pass additional inputs when spawning apps via the Zygote and add SELinux permission checks.
|
f72467ad9843bf5d4b75fb308386e77ebb5c3447 |
|
09-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
Include important native processes in watchdog stacks. Helps us track down deadlocks involving native service processes. Bug: 6615693 Change-Id: I580047550772e29586195a8cf440141574e3f40c
/frameworks/base/core/java/android/os/Process.java
|
59325eb31f25704bb88c348160bb69e7c1aa3b48 |
|
10-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new API to find total RAM. Change-Id: Iad2dff3c44f471515f093e7f0d0d959528881ab9
/frameworks/base/core/java/android/os/Process.java
|
bb9d6e6d8f3062302f229b8e2d133eae312a148b |
|
25-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Relax global restrict for system services."
|
5294a2fc2f401cd248a4bc3f0f9ee1e2854f4e9a |
|
25-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Relax global restrict for system services. Since we control system services, we can ensure they are using little data when data usage is globally restricted. Continue restricting AID_MEDIA and AID_DRM, since they respond to app requests. Bug: 6377903, 5772564 Change-Id: I196bf334f903397ea6a67e6802240ee792e47b54
/frameworks/base/core/java/android/os/Process.java
|
07b0465095bd9ab3412caefa4fcacbdc3825c64b |
|
24-Apr-2012 |
Glenn Kasten <gkasten@google.com> |
Scheduling policy service Change-Id: I6178b96896ffbb3323210f93784a65d724a3e694
/frameworks/base/core/java/android/os/Process.java
|
f1b56449f58963e4f0473d5e26961f68c31759f4 |
|
16-Mar-2012 |
Glenn Kasten <gkasten@google.com> |
Scheduling group cleanup The C++ API for scheduling groups is going away, so use the C API. Renumber THREAD_GROUP_* constants to have the same values as SP_*. They are @hide so this should be OK. The old THREAD_GROUP_FG_BOOST constant is removed, and replaced by a (private) THREAD_GROUP_FOREGROUND constant that is just a placeholder to correspond to SP_FOREGROUND. It is not usable at this level. Improved performance of android_os_Process_setProcessGroup: avoid unnecessary syscall to getpriority for each tid. Fixed error handling in android_os_Process_setThreadGroup. It raises an exception if set_sched_policy() returns an error. Add comments and fix typos in existing comments. Change-Id: Ib922e92c945985c695ef0addbd2b83b8e82865f8
/frameworks/base/core/java/android/os/Process.java
|
83d9eda9c2c411e3480c52f01e192bf3c86be8e9 |
|
13-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Pass additional inputs when spawning apps via the Zygote and add SELinux permission checks. When spawning an app process, the ActivityManagerService has additional information about the app package that may be useful in setting a SELinux security context on the process. Extend the Process.start() interface to allow passing such information to the Zygote spawner. We originally considered using the existing zygoteArgs argument, but found that those arguments are appended after the class name and left uninterpreted by ZygoteConnection, merely passed along to the class or wrapper. Thus we introduce a new seInfo argument for this purpose. Modify the ZygoteConnection to interpret the new option and convey it to forkAndSpecialize, as well as passing the nice name as a further input. Also modify the ZygoteConnection to apply SELinux permission checks on privileged operations. Change-Id: I66045ffd33ca9898b1d026882bcc1c5baf3adc17
/frameworks/base/core/java/android/os/Process.java
|
26993b37d525fd64efebd51daec1b4abfebd8a74 |
|
19-Mar-2012 |
Kenny Root <kroot@google.com> |
Add VPN UID to list in Process The VPN user ID is defined in android_filesystem_config.h as 1016. Add it to android.os.Process so it can be referred to in Java code. Change-Id: If3da3765747afda4e5e0761e289c45eebc7cddd5
/frameworks/base/core/java/android/os/Process.java
|
21fbd1f7da53dc044737803dccddf8099f1fc1e9 |
|
10-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
Some cruft removal. Change-Id: If4a94bfd4a033748eb13e8f3ff25e24382746778
/frameworks/base/core/java/android/os/Process.java
|
a0c283eac33dd2da72235751bbfa4f2d9898d5ea |
|
09-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new feature for running services in "isolated" sandbox processes. This reserves a range of uids (for each user) in which these processes run. These uids are not associated with an application, so they effectively run with no permissions. When a Service requests to run in such a process through android:isolatedProcess="true", each time it is brought up a new isolated process is started with its own unique uid. What we have so far gives us the basic infrastructure; more work remains to further lock down what these uids have access to. Change-Id: Ibfd27c75619cba61f528f46ede9113f98dc5f45b
/frameworks/base/core/java/android/os/Process.java
|
a7f656206550dea94e51dd8c9bb2dd8734bcdf92 |
|
17-Jan-2012 |
Glenn Kasten <gkasten@google.com> |
Merge "Add android.os.Process.setThreadScheduler"
|
a5cb9f42174a52afbeb7e33dab64282f52f8cedb |
|
21-Nov-2011 |
Nick Pelly <npelly@google.com> |
Replace vendor specific NfcGoogle.apk with generic Nfc.apk The access control changes allow us to just use Nfc.apk with the regular platform certificate, instead of the custom signed NfcGoogle.apk. So we can compeltely get rid of vendor/google/apps/NfcGoogle and just build it out of packages/apps/Nfc now. The package name is also reverted from com.android.nfc3 to com.android.nfc The NFC uid needs to get bumped (25 to 27) to allow the cert change. Bug: 5608249 Change-Id: I09a81a896ff3cceb5a8de331d3399921b870932a
/frameworks/base/core/java/android/os/Process.java
|
6793ac943afeb16642f477c43ddfd27e498db37b |
|
13-Jul-2011 |
Glenn Kasten <gkasten@google.com> |
Add android.os.Process.setThreadScheduler And add the associated SCHED_* constants and remove redundant parameter to signalExceptionForPriorityError and signalExceptionForGroupError. Change-Id: I5a4e9652155aef2e5d544185e0d73a0120f89d97
/frameworks/base/core/java/android/os/Process.java
|
007e62172fea3a3e5848c65cc781a2496d137889 |
|
14-Jul-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Add MEDIA_UID"
|
8b7d1b4d4a33e9429c5cedaa6317efcaad95da68 |
|
14-Jul-2011 |
Glenn Kasten <gkasten@google.com> |
Add MEDIA_UID Change-Id: Iaf03913dce95420e21c79226031b7caaaedf2ce8
/frameworks/base/core/java/android/os/Process.java
|
3f9dd287b99340efaaa257759e71a8f81b2ed113 |
|
09-Jul-2011 |
Jeff Brown <jeffbrown@google.com> |
Increase activity timeouts when using a wrapper process. This patch enables the Zygote to tell the ActivityManager when it has started a process with a wrapper attached so that the ActivityManager can allow it extra time to start up or process events. This is useful when wrapping an app with Valgrind or other tools which add significant runtime overhead. Bug: 4584468 Change-Id: I5db6f2f15cd30b0ec40f547d2fadfa216de2926d
/frameworks/base/core/java/android/os/Process.java
|
10e89712863f5b91a2982dc1783fbdfe39c1485d |
|
09-Jul-2011 |
Jeff Brown <jeffbrown@google.com> |
Eliminate single-process mode. Bug: 5010576 Change-Id: Id450dc83efed4897d1e4ff451530fed14457aace
/frameworks/base/core/java/android/os/Process.java
|
e1dfcb7ab01fb991079ec1f70f75281a0ca9073e |
|
08-Jul-2011 |
Elliott Hughes <enh@google.com> |
Pass the targetSdkVersion through to the zygote-forked dalvik. This will let dalvik implement backwards-compatibile behaviors based on an app's targetSdkVersion. Bug: 4772166 Change-Id: I935c5ea9144e8b4e6e21089547287486e2234b7f
/frameworks/base/core/java/android/os/Process.java
|
ae07ecf3766c38af1c12822458b98036b28bd4c0 |
|
07-Jul-2011 |
Elliott Hughes <enh@google.com> |
Add the "debug.jni.logging" property so third-party developers can debug their JNI problems. This turns on the super-verbose but indispensible logging of all native method calls and all calls to JNI functions (for third-party code only). In particular, if you have a local reference bug, you can search for the reference given in the crash and see exactly where it came from. In every case I've seen so far, that's pinpointed the bug exactly. Change-Id: Ifb7ba02ae637bdd53cd8500febdcb9d4d7799bda
/frameworks/base/core/java/android/os/Process.java
|
f4b92ec567477fcdea24fdd18116b045dfcf9852 |
|
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Revert "Add keychain user with special keystore access permissions" This reverts commit 8c2a1a90a81f04573bfa578eab32f5fd4a30eafb. Conflicts: cmds/keystore/keystore.c Bug:4970237 Change-Id: I626023d695becfada47e5f319b18e0889b766563
/frameworks/base/core/java/android/os/Process.java
|
ebed7d6e35f7f960e6e6add2b8ab7c7a31a511c3 |
|
17-May-2011 |
Jeff Brown <jeffbrown@google.com> |
Support wrapping app processes to inject debug instrumentation. Bug: 4437846 Change-Id: I4552501c693716b14714afb5c5248edaca9547ab
/frameworks/base/core/java/android/os/Process.java
|
40c266ef4868876f75d1b7b96f6117d7497c4e41 |
|
11-Apr-2011 |
Jeff Hamilton <jham@android.com> |
am a83bc160: am 7bb236c3: am 84d34078: Make the NFC UID forward compatible. * commit 'a83bc160892078c20489897190ee163d5c4d3783': Make the NFC UID forward compatible.
|
a83bc160892078c20489897190ee163d5c4d3783 |
|
11-Apr-2011 |
Jeff Hamilton <jham@android.com> |
am 7bb236c3: am 84d34078: Make the NFC UID forward compatible. * commit '7bb236c3b5e49f53b3110855276d99e664b29931': Make the NFC UID forward compatible.
|
8c2a1a90a81f04573bfa578eab32f5fd4a30eafb |
|
08-Apr-2011 |
Brian Carlstrom <bdc@google.com> |
Add keychain user with special keystore access permissions Change-Id: I02fe5171add62c5cd9f57b01bc137f3bc1cb3a69
/frameworks/base/core/java/android/os/Process.java
|
84d340781b1e148ead9fb4790755737c9dcc1cde |
|
01-Apr-2011 |
Jeff Hamilton <jham@android.com> |
Make the NFC UID forward compatible. Change-Id: I67316ee7906c29ba11ca7c8eb36ca1b736fe59b1
/frameworks/base/core/java/android/os/Process.java
|
0c691f0eb3bc844e778f9a61e777076658879dfd |
|
30-Mar-2011 |
Jeff Hamilton <jham@android.com> |
am ad91eee2: am 9c1ef098: Update the value for the NFC shared UID. * commit 'ad91eee2774e18204a14d473242efe5640b91152': Update the value for the NFC shared UID.
|
9c1ef098837bd73044cb970545344dd03f66daa0 |
|
25-Mar-2011 |
Jeff Hamilton <jham@android.com> |
Update the value for the NFC shared UID. Change-Id: Id25e1c9f0c074d17440838a9da7bf59619726832
/frameworks/base/core/java/android/os/Process.java
|
dcaa10cd361a543cfa93bbb5c53444f437bd07a4 |
|
16-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
Add Process.MEDIA_RW_GID constant Change-Id: I2358e5ef1e55ee4b1b9725451ce06cfbf3ed54a4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/java/android/os/Process.java
|
cd0e839a2448deea50f79bddeba782c546b33893 |
|
14-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC: Move NFC service implementation out of system_server. NFC service is now an application service in packages/apps/Nfc. NFC service is registered through ServiceManager.addService(), and the proxy object NfcAdapter obtains a handle to it through ServiceManager.getService(). **Important** Had to add new symbols AID_NFC / NFC_UID / android.uid.nfc and modify service_manager.c, Process.java and PackageManagerService.java in order to force the com.android.nfc process to take a fixed uid, so that it can use ServiceManager.addService(). Most of the JNI has moved to packages/apps/Nfc/jni. However NdefRecord and NdefMessage require some in-process native code, so android_com_NdefMessage.cpp and android_com_NdefRecord.cpp stay in frameworks/base/core/jni. They link to a very small library libnfc_ndef.so that implements NDEF message parsing. This has been added to core.mk so all devices (even without NFC hardware) can work with NDEF data. Bug: 3041259 Bug: 3097445 Change-Id: If7f00cd8f2053acfc9319ca366d4a9c02bd396e6 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/java/android/os/Process.java
|
bc21fdefdfbeba1754c6cd339c7dd8e8f1d6fd48 |
|
14-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC: Move NFC service implementation out of system_server. NFC service is now an application service in packages/apps/Nfc. NFC service is registered through ServiceManager.addService(), and the proxy object NfcAdapter obtains a handle to it through ServiceManager.getService(). **Important** Had to add new symbols AID_NFC / NFC_UID / android.uid.nfc and modify service_manager.c, Process.java and PackageManagerService.java in order to force the com.android.nfc process to take a fixed uid, so that it can use ServiceManager.addService(). Most of the JNI has moved to packages/apps/Nfc/jni. However NdefRecord and NdefMessage require some in-process native code, so android_com_NdefMessage.cpp and android_com_NdefRecord.cpp stay in frameworks/base/core/jni. They link to a very small library libnfc_ndef.so that implements NDEF message parsing. This has been added to core.mk so all devices (even without NFC hardware) can work with NDEF data. Bug: 3041259 Bug: 3097445 Change-Id: If8f00ce8f2053acfc9319ca366d4a9c02bd396e6 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/java/android/os/Process.java
|
58fd98accbff409601587b3357f2b3acf370f606 |
|
24-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
Add constant for SDCARD_RW group ID. Change-Id: I3b009cd06d3c1bc308ba82694db7383134709f75 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/java/android/os/Process.java
|
160edb3645f8b7012bab70ae6e6e8c4a5733082b |
|
01-Jul-2010 |
Christopher Tate <ctate@google.com> |
Add ability to guard a thread against setting its own prio to bg The guard is compiled out by default because it adds overhead to android.os.Process.setPriority(). Change-Id: Ibb2a648c6349b381abb7ae62a358888b04fba871
/frameworks/base/core/java/android/os/Process.java
|
906497c574d45d8dfd295b16dece0d0bc32c0895 |
|
11-May-2010 |
Dianne Hackborn <hackbod@google.com> |
Hopefully fix issue #2662536: Why is launcher being killed? It looks like there was a subtle bug where Process.setOomAdj() could return false just because the given process doesn't exist, even though it is documented to only return false if OOM killing is not supported at all. This would cause the activity manager to fall into its code path of trying to clean up processes itself, which it does a much poorer problem at. I am thinking we may be seeing this problem more now that the activity manager is killing background processes itself when there are too many of them. In addition, this change cleans up and reduces some of the logging around killing processes. Finally, try to improve process LRU management a bit by taking into account process dependencies. Any dependent processes are pulled up in the LRU list with the processes that is actually moving. Also, we bring a process up if someone accesses its content provider. Change-Id: I34ea161f839679345578ffe681e8d9c5d26ab948
/frameworks/base/core/java/android/os/Process.java
|
23085b781e145ed684e7270af1d5ced6800b8eff |
|
09-Feb-2010 |
Ben Cheng <bccheng@android.com> |
Support per-application switch to execute the VM in safe mode. The new attribute can be set by adding android:safeMode="true" in AndroidManifest.xml with the SDK. Tested with pairing locally compiled SDK with Eclipse and verified that the JIT (the only component currently included in the safe mode) is indeed disabled with the new attribute. Bug: 2267583
/frameworks/base/core/java/android/os/Process.java
|
d42685d5de1dbd6d75b48d42418f370adaa4daef |
|
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
Add support for running apps with uid/gid AID_LOG by specifying android.uid.log in the manifest This is needed to allow the BugReportService to start the dumpstate service. Change-Id: I12cab23767c919592da102c654b6b80416717661 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/java/android/os/Process.java
|
0bca96bcbfe559f9330a01f723c5c9cba51ec05a |
|
17-Jul-2009 |
Marco Nelissen <marcone@google.com> |
Make Process.getFreeMemory() return a long instead of an int, to better work on the simulator now, and phones 2 years from now.
/frameworks/base/core/java/android/os/Process.java
|
854060af30f928c0a65591e9c8314ae17056e6b8 |
|
10-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix bug #1873249i: Apps can DoS/brick device This is the problem where various things are listening for broadcasts (such as battery status, PIN/PUK/Network) that an application can send to cause harm to the system. Solving this is tricky because many of these broadcasts are sticky, and I have never figured out how to do permissions with sticky broadcasts in a sane way. So instead, I am going to punt on the general problem and just brute force it: There is new a way for system components to declare specific broadcast actions to be protected, which means that only the system and the phone can send them. This is good enough for now. None of it is exposed in the public API so we can make something a little less stupid in the future if we ever need to.
/frameworks/base/core/java/android/os/Process.java
|
d158214511a3c04753de04fa6389e46d33135c38 |
|
09-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
Restore audio settings and wifi. Optimize backups by writing an entity only if the checksum of the data has changed. Call into the hidden AudioService API to apply changed audio settings. After restoring wifi data, make sure that the permissions and ownership are set properly for the supplicant process to access it. Locale isn't restoring properly - TODO added.
/frameworks/base/core/java/android/os/Process.java
|
819f928f6a9dc3fdf408236f33e17f03a7dfed2c |
|
25-Jun-2009 |
Amith Yamasani <yamasani@google.com> |
Add a method to Process to get uid for a pid. Use the uids to track native processes. Cache the uids to avoid checking /proc every time.
/frameworks/base/core/java/android/os/Process.java
|
3e458241d9930465a20a861ecb42744355d48e48 |
|
19-May-2009 |
San Mehat <san@google.com> |
process: Add setProcessGroup() hidden API call to set the cgroup of a process and all its child threads. Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/java/android/os/Process.java
|
e9d376b801b7890b1ef5006ed55de4208e64bb63 |
|
21-Apr-2009 |
San Mehat <san@google.com> |
Add support for changing a threads scheduler group. Three groups are available (default, background non interactive, foreground boost). Setting a thread priority to PRIORITY_BACKGROUND will transparently change groups to background Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/java/android/os/Process.java
|
c64edde69d18498fb2954f71a546357b07ab996a |
|
18-Apr-2009 |
Evan Millar <> |
AI 146853: Add kernel wakelock data to batteryinfo dump. BUG=1755458 Automated import of CL 146853
/frameworks/base/core/java/android/os/Process.java
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/java/android/os/Process.java
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/java/android/os/Process.java
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/frameworks/base/core/java/android/os/Process.java
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/frameworks/base/core/java/android/os/Process.java
|