History log of /frameworks/native/libs/binder/IActivityManager.cpp
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
fa851800cf97d1a3d30a7a147877005dc48721ff 28-Mar-2018 Svet Ganov <svetoslavganov@google.com> Add API to query if a UID is active

Test: cts-tradefed run cts-dev -m CtsCameraTestCases

Bug: 72863398

Change-Id: I8e5021f2ef4cd77fc89ae3b47cc32ad6913da0d6
/frameworks/native/libs/binder/IActivityManager.cpp
4d85b8c0a38c14f854af8ff85391b7a8d1170d5b 02-Nov-2017 Ganesh Mahendran <opensource.ganesh@gmail.com> Don't record audio if UID is idle - native framework

If a UID is in an idle state we don't allow recording to protect
user's privacy. If the UID is in an idle state we allow recording
but report empty data (all zeros in the byte array) and once
the process goes in an active state we report the real mic data.
This avoids the race between the app being notified aboout its
lifecycle and the audio system being notified about the state
of a UID.

Test: Added - AudioRecordTest#testRecordNoDataForIdleUids
Passing - cts-tradefed run cts-dev -m CtsMediaTestCases
-t android.media.cts.AudioRecordTest

bug:63938985

Change-Id: I10db89c09498b487ce483d1868123fca95589b34
/frameworks/native/libs/binder/IActivityManager.cpp
ff81a09e19017ae1c26eecda6423e20c5a8333f6 02-Mar-2017 Sudheer Shanka <sudheersai@google.com> Add the missing Parcel.writeInterfaceToken call.

Bug: 35950090
Test: Verified that it fixes the following error.
Parcel : **** enforceInterface() expected 'android.app.IActivityManager' but read ''
Change-Id: Id70da2d2ba7198e4d5d14aeabe00328c4eb6ef14
/frameworks/native/libs/binder/IActivityManager.cpp
ec9ec7d55c63f791ab3ed9221e68d6215f7b928a 18-Dec-2016 Nick Kralevich <nnk@google.com> libbinder: replace dup() with fcntl(F_DUPFD_CLOEXEC)

Replace calls to dup() with fcntl(F_DUPFD_CLOEXEC). The only difference
between the two is that O_CLOEXEC is set on the newly duped file
descriptor. This helps address file descriptor leaks crossing an exec()
boundary in multi-threaded processes, and potentially fixes the following
non-reproducible SELinux denials which may be occurring because of FD
leakage from netd to clatd/dnsmasq.

avc: denied { use } for comm="clatd" path="socket:[860297]" dev="sockfs"
ino=860297 scontext=u:r:clatd:s0 tcontext=u:r:untrusted_app:s0:c512,c768
tclass=fd permissive=0

avc: denied { read write } for comm="clatd" path="socket:[1414454]"
dev="sockfs" ino=1414454 scontext=u:r:clatd:s0
tcontext=u:r:system_server:s0 tclass=tcp_socket permissive=0

avc: denied { use } for comm="clatd" path="socket:[681600]" dev="sockfs"
ino=681600 scontext=u:r:clatd:s0 tcontext=u:r:priv_app:s0:c512,c768
tclass=fd permissive=0

Test: Device boots and no obvious problems
Change-Id: I9dcd9911a093f329c6f12e39d2c49ef3df651ae5
/frameworks/native/libs/binder/IActivityManager.cpp
6ef26f129ce86b50d12ff4e46fae566baf54336d 24-Nov-2016 Sudheer Shanka <sudheersai@google.com> Add native interface for activity manager service.

Fix the un/marshalling code at
frameworks/av/media/libmediaplayerservice and move it here.

Bug: 30977067
Test: Verified that transaction works fine.

Change-Id: Ice6bd1c8ebc8116147b0ca3f65a293d013edfc4c
/frameworks/native/libs/binder/IActivityManager.cpp