)]}'
{
  "log": [
    {
      "commit": "b49b3f1e57784c2d00ee66aac247f64bcc92257e",
      "tree": "2ef3953db4469ffe7f15e87c9980505933d2a4be",
      "parents": [
        "e35ef2778e260632a7f73950bd15725e0a06b279",
        "86684240eb5753bb97c2cfc93d1d25fa1870f8f1"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@google.com",
        "time": "Sun Feb 04 00:12:22 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Sun Feb 04 00:12:22 2018 +0000"
      },
      "message": "Merge \"Media process should run with \"write\" access.\""
    },
    {
      "commit": "86684240eb5753bb97c2cfc93d1d25fa1870f8f1",
      "tree": "02ef27a8a065805a8d29476beca57daca6a85380",
      "parents": [
        "4a740846223aa58af065e2256fb0caa0ce6f9c53"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Sat Feb 03 15:32:31 2018 -0700"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Sat Feb 03 15:33:04 2018 -0700"
      },
      "message": "Media process should run with \"write\" access.\n\nThe WRITE_MEDIA_STORAGE permission had inadvertently been giving apps\nthe \"default\" view of storage.  This had worked for a long since,\nsince we also gave them the \"sdcard_rw\" permission, but a recent\nsecurity patch broke this for secondary users.\n\nApps holding this permission should have been mounted \"write\" all\nalong, and relied on that view to access storage devices.  This also\nmeans they no longer need the \"sdcard_rw\" GID.\n\nTest: builds, boots, secondary user media/camera works\nBug: 72732906, 71737806, 72224817\nChange-Id: I5cd687a1e128024f33b4acd93c15e75192ed1c85\n"
    },
    {
      "commit": "59c490f29bd81a1ba6f7f2979633865aa623ef8c",
      "tree": "3346ca72bde27d73370abcd02ac8128d8806f69c",
      "parents": [
        "414a7c2b0fd00864a0fa9dd0dd924cbb82407cf9",
        "568b81ac3f664da6e24534ae31f5eba861dd8df6"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Sat Feb 03 02:01:46 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Sat Feb 03 02:01:46 2018 +0000"
      },
      "message": "Merge \"Renamed BIND_DATA_SERVICE to BIND_TELEPHONY_DATA_SERVICE\""
    },
    {
      "commit": "568b81ac3f664da6e24534ae31f5eba861dd8df6",
      "tree": "c6bd11e72c3dd082948ee5cef9c88bdc934a6def",
      "parents": [
        "85d8a9931046edf0127505bc9dff78cd45c87429"
      ],
      "author": {
        "name": "Jack Yu",
        "email": "jackyu@google.com",
        "time": "Fri Feb 02 10:40:11 2018 -0800"
      },
      "committer": {
        "name": "Jack Yu",
        "email": "jackyu@google.com",
        "time": "Fri Feb 02 22:04:43 2018 +0000"
      },
      "message": "Renamed BIND_DATA_SERVICE to BIND_TELEPHONY_DATA_SERVICE\n\nAlso grated the permission to the phone process.\n\nTest: Manual\nBug: 64132030\nChange-Id: I1fc82a4e8038b1b05b56dcfa43c0c94955967700\n"
    },
    {
      "commit": "54ab6b91a839aa44ac2f741079b9e420ccab1e11",
      "tree": "7af6876dedb189acd6232726f74a1d1ea2e8d6fc",
      "parents": [
        "e2a66df86ca31403a6f28d363b9d5b57b12af98c",
        "56e6bd2cd1d6a37c6e55e33d8ad9c7ed1d0caf6c"
      ],
      "author": {
        "name": "Hall Liu",
        "email": "hallliu@google.com",
        "time": "Fri Feb 02 08:12:32 2018 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri Feb 02 08:12:32 2018 +0000"
      },
      "message": "Merge \"Check for location access on TelephonyRegistry\" am: 871202da2f am: cf59665a75\nam: 56e6bd2cd1\n\nChange-Id: If9989e10138a4fe923439c919807ca745d616043\n"
    },
    {
      "commit": "e2a66df86ca31403a6f28d363b9d5b57b12af98c",
      "tree": "9172b8bf106d3b017b71e1cf7c1a5d92f40afc05",
      "parents": [
        "058c408622a3c5134979b6e131aaa5373af5c0d7",
        "29d94726bedb0ac1d1491e018dcb3dafa576d9c3"
      ],
      "author": {
        "name": "Tyler Gunn",
        "email": "tgunn@google.com",
        "time": "Fri Feb 02 08:02:44 2018 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri Feb 02 08:02:44 2018 +0000"
      },
      "message": "Merge \"Add call recording tone support.\" am: 8d5b08c430 am: eb74233ff9\nam: 29d94726be\n\nChange-Id: I67496b63f6a7f6362faed8c6a8cbff7cd665876c\n"
    },
    {
      "commit": "871202da2f7e09e5de395d8aac8b229d47b99b8f",
      "tree": "aae8f5ef7be597bdb4a1706a71fe984fc6199302",
      "parents": [
        "8d5b08c4302f4963a442a113c503c3f9108eee14",
        "8d584f0a91b0709b28ebc64abf0a6063429c8d58"
      ],
      "author": {
        "name": "Hall Liu",
        "email": "hallliu@google.com",
        "time": "Thu Feb 01 23:05:22 2018 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu Feb 01 23:05:22 2018 +0000"
      },
      "message": "Merge \"Check for location access on TelephonyRegistry\""
    },
    {
      "commit": "8d584f0a91b0709b28ebc64abf0a6063429c8d58",
      "tree": "a01921b7d30142df96f89a6a35f04ccaeef84b54",
      "parents": [
        "cb9cd96c506a8255fbd2ad5f0ed1dde4a6c16e74"
      ],
      "author": {
        "name": "Hall Liu",
        "email": "hallliu@google.com",
        "time": "Wed Nov 22 17:38:15 2017 -0800"
      },
      "committer": {
        "name": "Hall Liu",
        "email": "hallliu@google.com",
        "time": "Thu Feb 01 01:00:52 2018 +0000"
      },
      "message": "Check for location access on TelephonyRegistry\n\nWhen sending outbound callbacks on CELL_INFO and CELL_LOCATION, check to\nmake sure that the user has authorized us and the receiving app to get\ninformation on their location.\n\nBug: 69637693\nTest: manual: telephony testapp\nChange-Id: Ib4c8c6a9765f504823016e538dd46768d1032792\n"
    },
    {
      "commit": "acdb686635fade1bc4bb6bafbd3e721392940f90",
      "tree": "980572ee3952d068c835d205776af886c314ac38",
      "parents": [
        "af5b90ff458fcbf923542bc0e79b290b83d265ab"
      ],
      "author": {
        "name": "Tyler Gunn",
        "email": "tgunn@google.com",
        "time": "Mon Jan 29 14:30:52 2018 -0800"
      },
      "committer": {
        "name": "Tyler Gunn",
        "email": "tgunn@google.com",
        "time": "Tue Jan 30 11:38:54 2018 -0800"
      },
      "message": "Add call recording tone support.\n\nAdding carrier configuration option to specify whether the carrier requires\nthe incall recording tone be played.\nAdded phone account extra used in Telephony to communicate this to\nTelecom.\nAdded permission pregrant for Telecom for MODIFY_AUDIO_ROUTING; this is\nneeded as Telecom listening to the AudioRecordingConfiguration callback\nfrom the audio framework.  It needs the permission so that it can be\ninformed of the package names of recording apps.\n\nTest: Manually enabled for local carrier and confirmed that recording\ntone plays to remote party when a recording app is started on the device.\nBug: 64138141\n\nChange-Id: I1ab521b79cbeeb4ff4dcbf83de7c17c539637bdc\n"
    },
    {
      "commit": "2a9cd149004e3457eb99043b781954e5fe4d921e",
      "tree": "fac27ae4b98cd83f4277d5f66ca745e3b65bc84c",
      "parents": [
        "8ed7f2b76930e4e52d222d6c2d55649e66be4c7a",
        "a3b692113c8c196349399857b6659774a6ef3bea"
      ],
      "author": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Tue Jan 30 11:20:50 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Jan 30 11:20:50 2018 +0000"
      },
      "message": "Merge \"Conditionally remove android.test.base from bootclasspath\""
    },
    {
      "commit": "76f0ccb5f1079040b28505e48fe8822b88d474f1",
      "tree": "d52efc5fe3044cc494fa2211fc22322290cbf2b0",
      "parents": [
        "e715ce13cbf4eb45aaafeb29a9955c38a3386f45"
      ],
      "author": {
        "name": "Alison Cichowlas",
        "email": "asc@google.com",
        "time": "Mon Jan 29 16:34:33 2018 -0500"
      },
      "committer": {
        "name": "Alison Cichowlas",
        "email": "asc@google.com",
        "time": "Mon Jan 29 16:34:33 2018 -0500"
      },
      "message": "Revert \"Security model for moving sharesheet to systemui\"\n\nThis reverts commit 88f3d4dbe1dbc08316d8a9e25edce1ad16fe2eab.\n\nBug: 72554856\nTest: repro instructions in bug\n"
    },
    {
      "commit": "a3b692113c8c196349399857b6659774a6ef3bea",
      "tree": "f78f9107796b2d2cb13d5e5e2b1473a5a760a34b",
      "parents": [
        "43c84465942a250aca938a5c3e939b73034d6a5a"
      ],
      "author": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Thu Jan 25 09:58:32 2018 +0000"
      },
      "committer": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Mon Jan 29 11:48:44 2018 +0000"
      },
      "message": "Conditionally remove android.test.base from bootclasspath\n\nThis makes the runtime handling of the android.test.base library\nconditional based on a build flag REMOVE_ATB_FROM_BCP.\n\nWhen REMOVE_ATB_FROM_BCP\u003dtrue:\n* The framework-atb-backward-compatibility is added to the\n  bootclasspath instead of android.test.base.\n* Any APK that targets pre-P (or has a dependency on android.test.runner)\n  has android.test.base added to their library list.\n\nOtherwise:\n* The android.test.base library is added to the bootclasspath.\n* Any APK that explicitly specifies that it depends on the\n  android.test.base library has the library removed as the classes\n  are available at runtime.\n\nAdded android.test.base to platform libraries so it can be used when\nnot on the bootclasspath.\n\nTested both cases by building with or without the build flag, flashing,\nsetting up, adding an account, adding a trusted place.\n\nAlso, tested that all combinations of REMOVE_ATB_FROM_BCP and\nREMOVE_OAHL_FROM_BCP work.\n\nadb install -r -g out/target/product/marlin/testcases/FrameworksCoreTests/FrameworksCoreTests.apk\nadb shell am instrument -w -e class android.content.pm.PackageBackwardCompatibilityTest,android.content.pm.AndroidTestRunnerSplitUpdaterTest,android.content.pm.OrgApacheHttpLegacyUpdaterTest,android.content.pm.RemoveUnnecessaryOrgApacheHttpLegacyLibraryTest,android.content.pm.RemoveUnnecessaryAndroidTestBaseLibraryTest,android.content.pm.AndroidTestBaseUpdaterTest com.android.frameworks.coretests/android.support.test.runner.AndroidJUnitRunner\n\nBug: 30188076\nTest: as above\nChange-Id: I4b9d8a5bed6787cd334c2b13a458bbc0efc3f3b6\n"
    },
    {
      "commit": "2627d72e61ff68b237d243e2b10ab85eb8dd6edf",
      "tree": "9fde24cbe23d6024792c43a2251a448f400a2bce",
      "parents": [
        "65b79f7edba9dd6c8a34f2f753a08113dafcd553"
      ],
      "author": {
        "name": "Selim Cinek",
        "email": "cinek@google.com",
        "time": "Fri Jan 19 12:16:49 2018 -0800"
      },
      "committer": {
        "name": "Selim Cinek",
        "email": "cinek@google.com",
        "time": "Wed Jan 24 23:29:28 2018 +0000"
      },
      "message": "Launching Notification animations inline\n\nUsing the new control mechanism introduced in order\nto coordinate notification launches and smoothly\ntransform the notification into the launching window.\n\nBug: 69168591\nTest: add notification, launch it\nChange-Id: Ib2d671c65f276ec596a2f07edf64d65bf27a2882\n"
    },
    {
      "commit": "d997d191edf668de177496e4e00e69d7d3c6b001",
      "tree": "be5a840ffca8dfd73067b0500e8c1b182fa06fb1",
      "parents": [
        "1387aaecc03855b16b96c7c4192321da852350e1",
        "88f3d4dbe1dbc08316d8a9e25edce1ad16fe2eab"
      ],
      "author": {
        "name": "Geoffrey Pitsch",
        "email": "gpitsch@google.com",
        "time": "Wed Jan 24 17:33:59 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Wed Jan 24 17:33:59 2018 +0000"
      },
      "message": "Merge \"Security model for moving sharesheet to systemui\""
    },
    {
      "commit": "88f3d4dbe1dbc08316d8a9e25edce1ad16fe2eab",
      "tree": "13e8dea03e0f1c5a91f51f6b4212e2bcfdfcbd0a",
      "parents": [
        "e437a074fa62b7b42d7d8b374f7be31f386fe059"
      ],
      "author": {
        "name": "Geoffrey Pitsch",
        "email": "gpitsch@google.com",
        "time": "Wed Nov 22 13:31:11 2017 -0500"
      },
      "committer": {
        "name": "Geoffrey Pitsch",
        "email": "gpitsch@google.com",
        "time": "Tue Jan 23 10:23:55 2018 -0500"
      },
      "message": "Security model for moving sharesheet to systemui\n\nResolverActivity (still in frameworks) now requests a \"permission token\"\nthat it hands to a stubbed system ui activity ChooserActivity.\n\nThis permission token allows an app (SysUI) with the signed permission\n\"START_ACTIVITY_AS_CALLER\" to call\nActivityManagerService#startActivityAsCaller. Permission tokens are a\none-time use, limited-time offer.\n\nTest: runtest systemui \u0026\u0026 manual testing\nBug: 69850752\nChange-Id: I3600e1a8ff9eea7397f5f59853423c79b6401f98\n"
    },
    {
      "commit": "974e56f141c31c596f89d2ed1725416245962a68",
      "tree": "726d227e69bf8097758846d9f7a6650294600bb0",
      "parents": [
        "e7193038c2a743c696a465acb87b73c6080ae691"
      ],
      "author": {
        "name": "Yi Jin",
        "email": "jinyithu@google.com",
        "time": "Mon Jan 22 10:48:04 2018 -0800"
      },
      "committer": {
        "name": "Yi Jin",
        "email": "jinyithu@google.com",
        "time": "Mon Jan 22 14:41:19 2018 -0800"
      },
      "message": "Enable incidentd.rc also add dump and usage_stats permission to statsd\nso it bypass incidentd\u0027s permission check\n\nTest: manual\nChange-Id: I65b501fe46f66f9f62fedfcfc75aa17f29fc1076\n"
    },
    {
      "commit": "82f09bcf93cc2e0f9a363f40bf8a64bcaa6d8b9f",
      "tree": "32a71e546599d857870a07775762411fb2587c54",
      "parents": [
        "6e3be007786a8b0cc46b50f96438f2860f7f868b"
      ],
      "author": {
        "name": "Svet Ganov",
        "email": "svetoslavganov@google.com",
        "time": "Fri Jan 12 22:08:40 2018 -0800"
      },
      "committer": {
        "name": "Svet Ganov",
        "email": "svetoslavganov@google.com",
        "time": "Sun Jan 21 02:55:49 2018 -0800"
      },
      "message": "No camera for idle uids - framework\n\nIf a UID is idle (being in the background for more than\ncartain amount of time) it should not be able to use the\ncamera. If the UID becomes idle we generate an eror and\nclose the cameras for this UID. If an app in an idle UID\ntries to use the camera we immediately generate an error.\nSince apps already should handle these errors it is safe\nto apply this policy to all apps to protect user privacy.\n\nTest: Pass - cts-tradefed run cts -m CtsCameraTestCases\n      Added - CameraTest#testCameraAccessForIdleUid\n\nChange-Id: If6ad1662f2af6592b6aca1aeee4bd481389b5e00\n"
    },
    {
      "commit": "d1238e7b506bd691a1e1fe35a3d54209b4bac839",
      "tree": "9b3f9a0eceef20332de6ea553829cf5425b31fc4",
      "parents": [
        "9c68323763f8c1cba088227c1058f194b84f36b2",
        "4bab3a191a70cbefac07c8fac90ec29081d91f89"
      ],
      "author": {
        "name": "Yi Jin",
        "email": "jinyithu@google.com",
        "time": "Fri Jan 19 23:27:32 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Fri Jan 19 23:27:32 2018 +0000"
      },
      "message": "Merge \"Fix permissions problems of incidentd.\""
    },
    {
      "commit": "1d2ddf8edefa1c4a19804085d6d62fabfab53aa8",
      "tree": "0278143baf137aca7396f84ddadbceae27d951ef",
      "parents": [
        "4fa2aa03ea0dac86367bec08ed09df0345c4647a",
        "fb263323800ef866fb37545f67f373a867c1b9fb"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Thu Jan 18 17:41:35 2018 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Thu Jan 18 17:41:35 2018 +0000"
      },
      "message": "Merge \"Put contacts/calendar providers in except-idle whitelist\""
    },
    {
      "commit": "4bab3a191a70cbefac07c8fac90ec29081d91f89",
      "tree": "3b56867a79ee254ec102356755d43103bd0a98fd",
      "parents": [
        "f9b7201a6358cd55c7df9149ea46e0f05dbe409d"
      ],
      "author": {
        "name": "Yi Jin",
        "email": "jinyithu@google.com",
        "time": "Wed Jan 10 16:50:59 2018 -0800"
      },
      "committer": {
        "name": "Yi Jin",
        "email": "jinyithu@google.com",
        "time": "Wed Jan 17 19:16:49 2018 -0800"
      },
      "message": "Fix permissions problems of incidentd.\n\nTest: manual\nChange-Id: I4ee0d1f2349ee1a25a422cabf1b5b87c612710d2\n"
    },
    {
      "commit": "fb263323800ef866fb37545f67f373a867c1b9fb",
      "tree": "4aceeecff3b66a986353e97f981600546280c6d0",
      "parents": [
        "03863ba52620d3c078bad5a69105b85ab6304be5"
      ],
      "author": {
        "name": "Makoto Onuki",
        "email": "omakoto@google.com",
        "time": "Wed Jan 17 13:23:50 2018 -0800"
      },
      "committer": {
        "name": "Makoto Onuki",
        "email": "omakoto@google.com",
        "time": "Wed Jan 17 13:23:50 2018 -0800"
      },
      "message": "Put contacts/calendar providers in except-idle whitelist\n\nBug: 71911050\nTest: Boot and dumpsys deviceidle\nChange-Id: I544b660583c2752dadec920305b33b5a8557ce61\n"
    },
    {
      "commit": "33a701a55c28dd20390acee1ba7881a500830d7d",
      "tree": "bd8d2ea141606aeae20be4eade300d3e9c018906",
      "parents": [
        "4876b4a273cdefaa7dfc11d5fdaa0ee5c9ea4055"
      ],
      "author": {
        "name": "Jorim Jaggi",
        "email": "jjaggi@google.com",
        "time": "Fri Dec 01 14:58:18 2017 +0100"
      },
      "committer": {
        "name": "Jorim Jaggi",
        "email": "jjaggi@google.com",
        "time": "Wed Jan 17 15:12:19 2018 +0100"
      },
      "message": "Remote animations (app-controlled animations)\n\nAdds the ability for another app to control an entire app\ntransition. It does so by creating an ActivityOptions object that\ncontains a RemoteAnimationAdapter object that describes how the\nanimation should be run: Along of some meta-data, this object\ncontains a callback that gets invoked from WM when the transition\nis ready to be started.\n\nWindow manager supplies a list of RemoteAnimationApps into the\ncallback. Each app contains information about the app as well as\nthe animation leash. The controlling app can modify the leash like\nany other surface, including the possibility to synchronize\nupdating the leash\u0027s surface properties with a frame to be drawn\nusing the Transaction.deferUntil API.\n\nWhen the animation is done, the app can invoke the finished\ncallback to get WM out of the animating state, which will also\nclean up any closing apps.\n\nWe use a timeout of 2000ms such that a buggy controlling app can\nnot break window manager forever (duration subject to change).\n\nTest: go/wm-smoke\nTest: RemoteAnimationControllerTest\n\nBug: 64674361\nChange-Id: I34e0c9a91b28badebac74896f95c6390f1b947ab\n"
    },
    {
      "commit": "0f2171041ef0615fcf10fdf95b8e096fef99d955",
      "tree": "658a7399b544cb716abe50bdf23596bdeffc173b",
      "parents": [
        "422a67987f2157cf709c07cb9132bdd775ebfc96"
      ],
      "author": {
        "name": "Yao Chen",
        "email": "yaochen@google.com",
        "time": "Tue Jan 09 10:33:15 2018 -0800"
      },
      "committer": {
        "name": "Yao Chen",
        "email": "yaochen@google.com",
        "time": "Thu Jan 11 11:58:10 2018 -0800"
      },
      "message": "make statsd run in its own uid\n\n+ Assign permission android.permission.STATSCOMPANION to statsd\n+ Fixes in StatsCompanionService to allow statsd to get uid mapping\n\nTest: manual\nChange-Id: I3e6ca79eefed7f93a4588578c156321c4c278fd3\n"
    },
    {
      "commit": "4a539441d844f85fd899862078b4c27641c1b606",
      "tree": "b0a849cc161ed072e799982a117cb053142e9837",
      "parents": [
        "61823f3a23750d672947ba7b5bb6dd4f1ff5503f"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Fri Jan 05 17:09:52 2018 -0700"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Sun Jan 07 19:40:29 2018 -0700"
      },
      "message": "Start using new reserved disk GID.\n\nWe recently created a new GID that can be granted to critical system\nprocesses, so that the system is usable enough for the user to free\nup disk space used by abusive apps.\n\nDefine a permission for the GID so we can grant it to system apps,\nand add the GID to core apps needed for system stability.  (The list\nwas mostly derived from filling a disk and seeing what caused the\ndevice to fall over.)\n\nTest: builds, boots\nBug: 62024591\nChange-Id: Icdf471ed3bed4eeb8c01f1d39f0b40c1ea098396\n"
    },
    {
      "commit": "b743b067e51143330de144290fe406a0eb0ea0c5",
      "tree": "3c4c0d59baa23fda21a558831f3ff4ef0755bfbb",
      "parents": [
        "c26b093ce522f459d71c232163cd3743370a5ee4",
        "14ab967eddc1cb2790765564152c250ecf05bcb6"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Dec 26 03:39:42 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Dec 26 03:39:42 2017 +0000"
      },
      "message": "Merge \"Don\u0027t record audio if UID is idle - core framework\""
    },
    {
      "commit": "f76dc03d6f8def2bedbfecc9ec199e2026d7349c",
      "tree": "bb85d4cb340b60818bba7792ba8d287658855b14",
      "parents": [
        "2ca87d2f72688b1eee9a8f6846a884e22013fe1c"
      ],
      "author": {
        "name": "Roshan Pius",
        "email": "rpius@google.com",
        "time": "Thu Dec 14 10:34:00 2017 -0800"
      },
      "committer": {
        "name": "Roshan Pius",
        "email": "rpius@google.com",
        "time": "Wed Dec 20 14:09:20 2017 -0800"
      },
      "message": "Settings: Add LOCAL_MAC_ADDRESS permission\n\nThis permission is needed for displaying the WIFI MAC address.\n\nBug: 70638295\nTest: Wifi network details page shows the wifi MAC address.\nChange-Id: Iaa595d520abf36ba55cfa9e888b169baae6ea1fb\n"
    },
    {
      "commit": "c3a6ed25a645459d9491348cbdeefdab697b97b9",
      "tree": "c91a93d3f17a7e053c4427eab8a99d0701fb5208",
      "parents": [
        "a3dcd16044a4d8ad57293edfa94cf9b644bd506d"
      ],
      "author": {
        "name": "Fan Zhang",
        "email": "zhfan@google.com",
        "time": "Thu Nov 30 14:11:44 2017 -0800"
      },
      "committer": {
        "name": "Fan Zhang",
        "email": "zhfan@google.com",
        "time": "Thu Nov 30 15:50:54 2017 -0800"
      },
      "message": "Whitelist SettingsIntelligence to manage fingerprint\n\nThis permission used to be Settings. With new settings suggestion\nsystem we need the permission in the unbundled app (SettingsIntelligence)\n\nBug: 69427300\nTest: rebuild\nChange-Id: Iaf8dd3281f4cdf5460dd544f50391ca241716d37\n"
    },
    {
      "commit": "14ab967eddc1cb2790765564152c250ecf05bcb6",
      "tree": "33f3258e5ba266a04c835ae82c7fdf113f1ee9ef",
      "parents": [
        "a98bd9989e88896c2caf945bf52c9164587bffc3"
      ],
      "author": {
        "name": "Svet Ganov",
        "email": "svetoslavganov@google.com",
        "time": "Wed Nov 22 18:49:32 2017 -0800"
      },
      "committer": {
        "name": "Svet Ganov",
        "email": "svetoslavganov@google.com",
        "time": "Wed Nov 22 20:59:14 2017 -0800"
      },
      "message": "Don\u0027t record audio if UID is idle - core framework\n\nIf a UID is in an idle state we don\u0027t allow recording to protect\nuser\u0027s privacy. If the UID is in an idle state we allow recording\nbut report empty data (all zeros in the byte array) and once\nthe process goes in an active state we report the real mic data.\nThis avoids the race between the app being notified aboout its\nlifecycle and the audio system being notified about the state\nof a UID.\n\nTest: Added - AudioRecordTest#testRecordNoDataForIdleUids\n      Passing - cts-tradefed run cts-dev -m CtsMediaTestCases\n                        -t android.media.cts.AudioRecordTest\n\nbug:63938985\nChange-Id: I15264c5c4b47813ca60280bce30b22b8b1f87eab\n"
    },
    {
      "commit": "220871a697290529278ed16db508eda8e12f3fc7",
      "tree": "bc13101b63c6fe39a9d92706ecb7ded7f98f5a9c",
      "parents": [
        "802f191b2b84a1b1b82c7f6f3268846084b35dfb",
        "98e12851336b7db16e583f9afac63ecc97465980"
      ],
      "author": {
        "name": "Xin Li",
        "email": "delphij@google.com",
        "time": "Tue Nov 14 12:31:11 2017 -0800"
      },
      "committer": {
        "name": "Xin Li",
        "email": "delphij@google.com",
        "time": "Tue Nov 14 12:31:11 2017 -0800"
      },
      "message": "Merge commit \u002798e12851336b7db16e583f9afac63ecc97465980\u0027 from\noc-mr1-dev-plus-aosp-without-vendor into stage-aosp-master.\n\nChange-Id: Ia7b8da4a00d215160e4a4fa40f6044208d1297b7\nMerged-In: I19846d2a3ee27aecbae2367a74ee49082eea154d\n"
    },
    {
      "commit": "b0e44af1d4f97625b5c66d9e4154bc8c6c633981",
      "tree": "9f651733bdbbedb821a00e5e5610f26394856412",
      "parents": [
        "4a55f0ad278e3b1c2f560860e2713bee98bf2635"
      ],
      "author": {
        "name": "Fan Zhang",
        "email": "zhfan@google.com",
        "time": "Wed Nov 08 11:26:44 2017 -0800"
      },
      "committer": {
        "name": "Fan Zhang",
        "email": "zhfan@google.com",
        "time": "Thu Nov 09 09:48:32 2017 -0800"
      },
      "message": "Whitelist SettingsIntelligence to read search indexables.\n\nThis permission used to be Settings. With moving ranking to\nSettingsIntelligence we need to move permission whitelisting as well\n\nIn a follow up we will remove the permission from Settings list.\n\nBug: 65065268\nTest: flash with a clean build\nChange-Id: I81fafe0b390df5990989da81629e4c6d67f1480a\n"
    },
    {
      "commit": "b119f85d3438413147997c280e03ee147cf8d1cf",
      "tree": "2ab0e4e975c8d98e4b2da3b49026734b996bfe00",
      "parents": [
        "94dffbcbfd5779b7904b3b396218a261bf640973",
        "957e50ccdfa46aeae7549fe354e6defa3b3d97d0"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Nov 07 17:24:27 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Nov 07 17:24:27 2017 +0000"
      },
      "message": "Merge \"Custom message in AoD\""
    },
    {
      "commit": "4470ab9c33cb12d056c0e64b03a2a73f0600caee",
      "tree": "f36aeba275ca79a311ffecf8b109014c2000f4b1",
      "parents": [
        "181799bc53c45282ffa50669430a5cb41f5c194d"
      ],
      "author": {
        "name": "Amith Yamasani",
        "email": "yamasani@google.com",
        "time": "Tue Oct 31 13:29:00 2017 -0700"
      },
      "committer": {
        "name": "Amith Yamasani",
        "email": "yamasani@google.com",
        "time": "Thu Nov 02 21:12:18 2017 -0700"
      },
      "message": "Make CHANGE_APP_IDLE_STATE a system API\n\nAllows a privileged app to set standby bucket states for apps.\n\nBug: 63527785\nTest: adb shell am set-standby-bucket com.example.foo 0\nChange-Id: I613f8872ae816e39b167aad1c289187362aa6094\n"
    },
    {
      "commit": "957e50ccdfa46aeae7549fe354e6defa3b3d97d0",
      "tree": "33d5542e582a27ebe3ac7e439ea46cbdc90be080",
      "parents": [
        "99ac4bdd16ce512c78f5bb9aa9bcd68b0f0e1da9"
      ],
      "author": {
        "name": "Lucas Dupin",
        "email": "dupin@google.com",
        "time": "Tue Oct 10 11:23:27 2017 -0700"
      },
      "committer": {
        "name": "Lucas Dupin",
        "email": "dupin@google.com",
        "time": "Thu Nov 02 18:03:40 2017 -0700"
      },
      "message": "Custom message in AoD\n\nOptional message that lives under the clock and also\nin AoD. Implemented using a slice.\n\nTest: launch sysui, look at the date in AoD\nTest: runtest -x packages/SystemUI/tests/src/com/android/systemui/keyguard/KeyguardSliceProviderTest.java\nChange-Id: I9dbc827bd48c6a3d1b25b0a481ffaecc0dd37f25\n"
    },
    {
      "commit": "d877f14834292c0ae24404b492c6f023667cd8a3",
      "tree": "a8cf16e850a98e65129293b07e0968f9d1d2f0fb",
      "parents": [
        "3683289e84f4dff45fa77ebf85a0ac129c0277de",
        "e2ef47f1bdc88883ae6c48e252bf97d2e4691961"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Mon Oct 30 03:42:16 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Mon Oct 30 03:42:16 2017 +0000"
      },
      "message": "Merge \"Define OWNERS for permission grant changes.\" am: 8d2a5bd42a am: 4ab5a3f8cd\nam: e2ef47f1bd\n\nChange-Id: I32c2ddf0f6c5f21651750579e045198438045d12\n"
    },
    {
      "commit": "e2ef47f1bdc88883ae6c48e252bf97d2e4691961",
      "tree": "d2e1f3dbe9a97b60b44555054ba8eea50854f80d",
      "parents": [
        "002a48f3619d5eec358e94a6e901a44d4b4a3cb7",
        "4ab5a3f8cd70ad62de14b051da63a848acffe8a7"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Mon Oct 30 03:26:54 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Mon Oct 30 03:26:54 2017 +0000"
      },
      "message": "Merge \"Define OWNERS for permission grant changes.\" am: 8d2a5bd42a\nam: 4ab5a3f8cd\n\nChange-Id: Ie27d6ee76a7ab6585881d5f83c197ab99f7d26f4\n"
    },
    {
      "commit": "e40d8409bded6fc0d0a6b6e1c1127f3b50842f75",
      "tree": "263821c0699f43ac609dfc057f8e90f1b7f13c01",
      "parents": [
        "1fab41e77119c95a6f3a9708b506489e15ecd36d"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Fri Oct 27 12:13:37 2017 -0600"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Sun Oct 29 19:32:02 2017 -0600"
      },
      "message": "Define OWNERS for permission grant changes.\n\nPermission grant changes need explicit approval from product and\nSWE leadership to ensure that CTS/CDD requirements are met.\n\nChange-Id: I0a84712b5c5b4e11e72bf5921b72ef6a47e7fdc1\n"
    },
    {
      "commit": "7e7c48ae9c247c87a32aa2daf87ee6cbf0f70735",
      "tree": "d99705a9625734a30b75045c0b0177ee002e4f42",
      "parents": [
        "97868f233f2bf1ad34360855f3a79bc7242e7cfc"
      ],
      "author": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Thu Oct 19 12:26:32 2017 -0700"
      },
      "committer": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Fri Oct 20 14:42:24 2017 -0700"
      },
      "message": "Updated the whitelist to match the state of platform apps\n\nSome apps in frameworks/base are only included in AOSP targets and\ndiscrepancies weren\u0027t discovered by CI tests.\n\nTest: manual\nBug: 67718369\nChange-Id: If88aa90f4dcab51b6e11562cadbe003948b6c149\n"
    },
    {
      "commit": "21ec85f12a4f6b0e1e64c831805c63e7549bee78",
      "tree": "0ad0d11037f21daaffd430fd7d41cf9dbd33a383",
      "parents": [
        "8cb2dcf08184c32d00e2f40cba9666f6eab80970"
      ],
      "author": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Thu Oct 19 11:48:20 2017 -0700"
      },
      "committer": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Thu Oct 19 15:02:11 2017 -0700"
      },
      "message": "Update package name for ExtServices to whitelist permissions.\n\nTest: shared images in Camera to verify this.\n\nChange-Id: Iebbe7405afa7de5246e02d7dbdb84fb0f319db5f\n"
    },
    {
      "commit": "c56106a13edde7404275bcf97ae143f600857d7c",
      "tree": "9963c933233c64ab72b0b2aebebb637ede502fc9",
      "parents": [
        "9eb155567d911516ed23bad643b47486d6cc6fcd"
      ],
      "author": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Fri Oct 06 17:02:21 2017 -0700"
      },
      "committer": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Mon Oct 09 14:27:47 2017 -0700"
      },
      "message": "Crash if not all privileged permissions are whitelisted\n\nTest: reboot device - no crashes\nTest: Ran privapp_permissions.py for fugu/marlin/taimen\nBug: 64693550\nChange-Id: I9522ccaa75858b9a3d153c95c529eff70cd13994\n"
    },
    {
      "commit": "8a56855ec438f07a760996b64e39273ac80fe5d4",
      "tree": "ed51761d00b25a62b372f11eee00ce18cb3535dc",
      "parents": [
        "c7b36eb77beed889fc8b0e5f068b9b04bfd3a40b",
        "e13b57b3b98b1ba0df28636866f025a22f5a3e49"
      ],
      "author": {
        "name": "Shubang",
        "email": "shubang@google.com",
        "time": "Sat Oct 07 01:22:28 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Sat Oct 07 01:22:28 2017 +0000"
      },
      "message": "Merge \"Add permissions for LiveTv (AOSP)\" into oc-mr1-dev am: 4dc2938418\nam: e13b57b3b9\n\nChange-Id: I91925da75262c8980d27e3e33f5822aa0b4495b4\n"
    },
    {
      "commit": "d06de348b60707fd6bb94bc9186bd18192aead7c",
      "tree": "9aac35086824aab01aa21f61d3ba524af58088bf",
      "parents": [
        "a2fbb123da6b932138240fdf4c8fa06bfecebbc7"
      ],
      "author": {
        "name": "Shubang",
        "email": "shubang@google.com",
        "time": "Thu Oct 05 18:31:00 2017 -0700"
      },
      "committer": {
        "name": "Shubang",
        "email": "shubang@google.com",
        "time": "Fri Oct 06 14:06:26 2017 -0700"
      },
      "message": "Add permissions for LiveTv (AOSP)\n\nIt crashes without the permissions\n\nBug: 67474061\nTest: make; flashall; install and open LiveTv;\nChange-Id: Ifec8bfb4ee93ac6b9189a9c337fdd2ef9ec34537\n"
    },
    {
      "commit": "158c98cee13acaa14ae96b526723347f5330f5db",
      "tree": "8e7ab0fdf11350b952dfd6c2a18c2692c61d02d5",
      "parents": [
        "a5739f199e9fd0a9a14e4442cd481ccb7d2cd21c",
        "1c56c2333178c75fe00d58e8d99deaf39199bf1f"
      ],
      "author": {
        "name": "Sunny Goyal",
        "email": "sunnygoyal@google.com",
        "time": "Fri Sep 29 23:14:54 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri Sep 29 23:14:54 2017 +0000"
      },
      "message": "Merge \"Fixing Launcher package name for privilege permission\" into oc-mr1-dev am: 22f7ae8d07\nam: 1c56c23331\n\nChange-Id: I00aca55b29ff96f5db393b1130727d6dec5e612a\n"
    },
    {
      "commit": "71d4bcc053fa34366eebbedb8baf048d09661841",
      "tree": "2e7cd0edaef4370df202f01c1d32184badb83106",
      "parents": [
        "bbdc422bb1358f039207f5a6c322fb1327e3bee8"
      ],
      "author": {
        "name": "Sunny Goyal",
        "email": "sunnygoyal@google.com",
        "time": "Thu Sep 28 14:15:30 2017 -0700"
      },
      "committer": {
        "name": "Sunny Goyal",
        "email": "sunnygoyal@google.com",
        "time": "Fri Sep 29 20:08:15 2017 +0000"
      },
      "message": "Fixing Launcher package name for privilege permission\n\nTest: None\nBug: 67017745\nChange-Id: I37b903c0c771e54a68bf4dac42a0ce39641b7933\n"
    },
    {
      "commit": "df41b3eecd0ce5dab1a90e546a0f01f151f6c947",
      "tree": "484d66b15a5ec978b8c872247032f69e91831c8a",
      "parents": [
        "e63e6fc6437563a36fdd4ead0e1e543c2316f07e"
      ],
      "author": {
        "name": "Robert Quattlebaum",
        "email": "rquattle@google.com",
        "time": "Mon Aug 14 18:34:03 2017 -0700"
      },
      "committer": {
        "name": "Robert Quattlebaum",
        "email": "rquattle@google.com",
        "time": "Wed Sep 20 23:36:12 2017 +0000"
      },
      "message": "Ensure lowpan UID can manage LoWPAN interfaces\n\nBug: b/64399805\nChange-Id: Idd0bd7ef0c4de48c95699efc43324bc4dce8e70a\n"
    },
    {
      "commit": "0a22778237dd0c05c588b06af6440869083b56fa",
      "tree": "48e247246e627c1f528cb1967d012e0e53bdbb50",
      "parents": [
        "61330a3346fa64eaf36d4a298d480b7567837a94"
      ],
      "author": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Wed Jul 26 14:24:19 2017 +0100"
      },
      "committer": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Mon Sep 11 11:28:41 2017 +0100"
      },
      "message": "Remove org.apache.http.legacy from bootclasspath\n\nUpdated data/etc/platform.xml to make the org.apache.http.legacy library\nusable by applications. The runtime location of the\norg.apache.http.legacy library is\n/system/framework/org.apache.http.legacy.boot.jar not\n/system/framework/org.apache.http.legacy.jar.\n\nStop removing org.apache.http.legacy from the required and optional\nshared library lists and instead add it to the required list if it is\nnot present in either and the package is targeted at SDK\nversion \u003c\u003d O_MR1.\n\nBug: 18027885\nTest: make FrameworksCoreTests, install and run\nChange-Id: I686e3c20f5860e58825e1b88f220f9b8c335849c\n"
    },
    {
      "commit": "93bfd052a8a76909cb56eea0ecb5bd22cb25ba77",
      "tree": "faa4d3b547e587f8010ac59e8f028c323cb7b0fc",
      "parents": [
        "9d484f015f777a786eb83cbeed28b0ed0ad67f78"
      ],
      "author": {
        "name": "Sudheer Shanka",
        "email": "sudheersai@google.com",
        "time": "Fri Sep 01 16:41:10 2017 -0700"
      },
      "committer": {
        "name": "Sudheer Shanka",
        "email": "sudheersai@google.com",
        "time": "Fri Sep 01 16:48:05 2017 -0700"
      },
      "message": "Add PACKAGE_USAGE_STATS permission to shell.\n\nThis is needed for calling AM.registerUidObserver.\n\nFixes: 64400666\nTest: cts-tradefed run singleCommand cts-dev -m CtsAppTestCases -t \\\n      android.app.cts.ActivityManagerProcessStateTest\nChange-Id: I4f500d0d8d516b6b8961ea2f8c083add3ae949a9\n"
    },
    {
      "commit": "615b37fbacb069affb6294b7dc9ce6474a848bf7",
      "tree": "1767bb53708b286361a215a1234c1cf18faff530",
      "parents": [
        "1b08a4a8a3271f04b98c34747fe077610b7ee534"
      ],
      "author": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Thu Aug 17 17:24:09 2017 -0700"
      },
      "committer": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Thu Aug 17 17:24:09 2017 -0700"
      },
      "message": "Add Audio effect session intent to config file\n\nCurrently audio effect panel can\u0027t receive session\nintent if app targetSdkVersion is Android O or later.\nBecause the intent is limited on background.\nHowever this kind of application needs to receive\nthe intent when application plays music.\n\nBug: 62777192\nTest: manual\n\nCherrypick of partner CL 870245\n\nChange-Id: Ibcebb938fa9177a9b0a7be079b1c7374ba9424ee\n"
    },
    {
      "commit": "a40b8b7431ae5265f719620b0d36737733368dc6",
      "tree": "58f007e3dbc8f617b0ed8456dfe9a792675505da",
      "parents": [
        "3c8b5d1cf2d23cf7c2e2e356205034a0aa3ed036",
        "93bf6200ebd94e93038fbc659276da38d24a951e"
      ],
      "author": {
        "name": "fionaxu",
        "email": "fionaxu@google.com",
        "time": "Tue Aug 08 09:02:23 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Tue Aug 08 09:02:23 2017 +0000"
      },
      "message": "Merge \"app link handling under restricted mobile data\" into oc-dr1-dev\nam: 93bf6200eb\n\nChange-Id: I1a506e9f8dae6fd76c74c3f9d7f93c40ce64a387\n"
    },
    {
      "commit": "d60a9d0e586e95be2f2730a940afdf1ed436c612",
      "tree": "8e42f290e7068268faaeb57658800ea15aa5f5f4",
      "parents": [
        "81977b8929c1b258cfb91d02821cbc68ee4589c7"
      ],
      "author": {
        "name": "fionaxu",
        "email": "fionaxu@google.com",
        "time": "Tue May 23 14:55:27 2017 -0700"
      },
      "committer": {
        "name": "fionaxu",
        "email": "fionaxu@google.com",
        "time": "Fri Aug 04 18:13:12 2017 -0700"
      },
      "message": "app link handling under restricted mobile data\n\n1. new actions to allow default carrier app dynamically enable/disable\napp-link filtering\n2. new intent to notify registered carrier apps of other default\nnetworks\n3. signal-to-actions config to sepcify carrier actions on default\nnetwork change\ndefault network available -\u003e disable intent filter for app-link\ndefaut network lost -\u003e enable intent filter for app-link\n4. new carrier actions to allow carrier apps to register/unregister\nother network status dynmacially\n\nBug: 62487488\nTest: Manual\nChange-Id: Ie9fa9f3f4ca38f9f26a90a3dbf95f7f20a8ad773\n"
    },
    {
      "commit": "68a0dafc135a28cf6bbc72e44798083075aac872",
      "tree": "f4689ae7922efc5ec31c781c4682566876a13ad9",
      "parents": [
        "64aa52c135c4c17c36746c90592684ac38ce568c",
        "df77643cd8024b381c7df2f509175c7be719fae9"
      ],
      "author": {
        "name": "Tomasz Wasilczyk",
        "email": "twasilczyk@google.com",
        "time": "Tue Jul 25 17:18:50 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Jul 25 17:18:50 2017 +0000"
      },
      "message": "Merge \"Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission.\" into oc-mr1-dev"
    },
    {
      "commit": "df77643cd8024b381c7df2f509175c7be719fae9",
      "tree": "35f31e845c6b9c56c25f5797a1b0a6cdc6516372",
      "parents": [
        "cfc55bb0a6be0e65317cd216486f15f428832f7a"
      ],
      "author": {
        "name": "Tomasz Wasilczyk",
        "email": "twasilczyk@google.com",
        "time": "Fri Jul 21 14:07:09 2017 -0700"
      },
      "committer": {
        "name": "Tomasz Wasilczyk",
        "email": "twasilczyk@google.com",
        "time": "Fri Jul 21 14:22:05 2017 -0700"
      },
      "message": "Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission.\n\nThis is a backwards incompatible change against System API,\nbut as there are no existing radio apps, nobody uses it.\n\nBug: b/63405337\nTest: manual\nChange-Id: Iaf6085914434be01e1c1e363609e5b0087ffe127\n"
    },
    {
      "commit": "02689a78847fa4f8b6077e23b35a2f9b30322036",
      "tree": "b35f2c55f8e0912be9f26e102a5bad1f7bc2854a",
      "parents": [
        "3a419bee91b6cc14c6807eed1f9578e71a1aa80f"
      ],
      "author": {
        "name": "Andrii Kulian",
        "email": "akulian@google.com",
        "time": "Thu Jul 06 14:28:59 2017 -0700"
      },
      "committer": {
        "name": "Andrii Kulian",
        "email": "akulian@google.com",
        "time": "Fri Jul 21 18:31:20 2017 +0000"
      },
      "message": "DO NOT MERGE Add permission to launch activities on VD\n\n1. Added permission ACTIVITY_EMBEDDING which allows apps to launch\nactivities on virtual displays.\n2. Allow owner of display to launch activities from same app without\npermission check to owned display.\n3. Added permission checks for launching on secondary displays to\nmore target task/stack resolution paths in ActivityStarter.\n\nBug: 63117330\nTest: android.server.cts.ActivityManagerDisplayTests\nTest: go/wm-smoke\nChange-Id: If169a77fb56241e06f7de20168dc38c4b0a217f5\n(cherry picked from commit 71587649836d8e97c2ca00d968fc95293b59b0d3)\n"
    },
    {
      "commit": "9f09e6a73df1748e980eff26a57e611d68c7ee9a",
      "tree": "cb742002214a750dd9fc490a1e9cd1ae464e4ce1",
      "parents": [
        "1d47c55407f539d7d57ed16bd088de0a79a6ad82"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Mon Jun 26 11:24:47 2017 -0600"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Mon Jul 17 16:10:55 2017 -0600"
      },
      "message": "Unify permissions under UPDATE_DEVICE_STATS.\n\nThe UPDATE_DEVICE_STATS permission has become the de-facto mechanism\nthat platform components use to shift blame for resource usage, so\nit\u0027s confusing to also have a separate MODIFY_NETWORK_ACCOUNTING\npermission.  So this change replaces MODIFY_NETWORK_ACCOUNTING with\nUPDATE_DEVICE_STATS.\n\nBug: 62483389\nTest: builds, boots\nExempt-From-Owner-Approval: Bug 63673347\nChange-Id: I872759f02327b6d531ec2338bd876890aded60ad\n"
    },
    {
      "commit": "c8d6ad8b70c63f7105f201c768771b9ea573bddf",
      "tree": "5f9e1279e005e4bad5431b7b27741c5a716b85d5",
      "parents": [
        "99f0e0ef1e5be661a3f18c4eb7acee133dea2f8c",
        "aa7f92dc6a53890599b129ea67c462cfe276c942"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Tue Jul 11 02:03:11 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Tue Jul 11 02:03:11 2017 +0000"
      },
      "message": "Merge \"Move eUICC permissions to com.android namespace.\" into oc-dr1-dev am: 3fc57019bb\nam: aa7f92dc6a\n\nChange-Id: Ibd65e174e4067a8d45c8b9d45a7f020a48e1cdab\n"
    },
    {
      "commit": "6ed04553eff6f91fbdfb4a50299a1cb92bc9344e",
      "tree": "6eee8345dd8c357bbdd03ce7c9fc6b2ae652346a",
      "parents": [
        "c276c79e83680c4d14e790ba002c14e4a7dacb49"
      ],
      "author": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Fri Jul 07 12:12:06 2017 +0100"
      },
      "committer": {
        "name": "Paul Duffin",
        "email": "paulduffin@google.com",
        "time": "Fri Jul 07 12:12:06 2017 +0100"
      },
      "message": "Add android.test.mock to the optional runtime libraries\n\nThis is needed in order to make the following manifest entry work\nproperly.\n  \u003cuses-library android:name\u003d\"android.test.mock\"/\u003e\n\nTested by adding the entry to an APK and installing it which caused an\nerror about an unknown library. Then updated this file, rebuilt,\nreflashed and installed APK again at which point it worked.\n\nFollow up change to cts/tests/signature will add proper test for this\nlibrary.\n\nBug: 30188076\nTest: see above\nChange-Id: I630b7bc48a50ab1c52bb5feed54c2e4deb876339\n"
    },
    {
      "commit": "3b16d3fc1ebfbd7b318c328a6060cb61d5a94e0b",
      "tree": "4694527f6369612baa04a55a61dfcaaac5e7a4f7",
      "parents": [
        "484d742af094a6a2038e5f9f18c4d95dea938132"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Wed Jul 05 16:17:27 2017 -0700"
      },
      "committer": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Wed Jul 05 23:42:54 2017 +0000"
      },
      "message": "Move eUICC permissions to com.android namespace.\n\nChange-Id: I3457fbb29d04ec82cb5bf819ca479bfe707e3e3f\nTest: eSIM sanity check + CTS PermissionPolicyTest\nFixes: 62375320\n"
    },
    {
      "commit": "210625408818c03a8e9e20c0cfc45c72c84d3c2f",
      "tree": "0527372faf979be0384e3d982795a66b45cee828",
      "parents": [
        "d49d82b4c10d69bab7483f5026bf80df38e385b9"
      ],
      "author": {
        "name": "Malcolm Chen",
        "email": "refuhoo@google.com",
        "time": "Tue Jun 20 11:36:01 2017 -0700"
      },
      "committer": {
        "name": "Malcolm Chen",
        "email": "refuhoo@google.com",
        "time": "Thu Jun 29 16:32:24 2017 -0700"
      },
      "message": "Adding \"Mobile data\" and \"Data usage\" button in mobile settings.\n\nGrant \"READ_NETWORK_USAGE_HISTORY\" permission to phone because\n\"Datat usage\" button summary needs it. Settings provides new\nintent to open mobile data usage page.\n\nBug: 62201918\nTest: Manual\nChange-Id: Ie317109c723f3946ace4d34c743081a7ae046462\n"
    },
    {
      "commit": "fa028b414509a5b6c75653586125b0c6f4c28235",
      "tree": "c07185d9275756079accce2f0b611321160e4faf",
      "parents": [
        "13851a791dbe4e3faa2f99cd82a0e0378ee2ab9e",
        "c1ef5336bc4907300c050896296d918d92eda5db"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Wed May 24 01:01:25 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Wed May 24 01:01:32 2017 +0000"
      },
      "message": "Merge \"Declare new permission for Phone process.\""
    },
    {
      "commit": "8b3d839a5e402e69cc5dce4a30105ba8889e0465",
      "tree": "4657dff0d9ba383d7fecc793803acaf39f01fd69",
      "parents": [
        "b2d50b4f9260bac241d59b993069604571291610"
      ],
      "author": {
        "name": "Lucas Dupin",
        "email": "dupin@google.com",
        "time": "Tue May 23 09:45:50 2017 -0700"
      },
      "committer": {
        "name": "Lucas Dupin",
        "email": "dupin@google.com",
        "time": "Tue May 23 15:43:54 2017 -0700"
      },
      "message": "Add change_overlay permission to systemui\n\nSystemUI needs to be able to enable and disable\noverlays in order to invert text and surface colors.\n\nBug: 38164700\nTest: make\nChange-Id: I7685d5fddb5a476e10012dab2d6e7ee5da206f80\n"
    },
    {
      "commit": "c1ef5336bc4907300c050896296d918d92eda5db",
      "tree": "ea6d45b5c4c553f6fd04131f218b6878dc5f3e7a",
      "parents": [
        "5649d3e93b8ae553b5b167071d69c166fc3e5000"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Mon May 15 17:29:59 2017 -0700"
      },
      "committer": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Mon May 15 17:57:51 2017 -0700"
      },
      "message": "Declare new permission for Phone process.\n\nBug: 37480432\nTest: TreeHugger + E2E IPC test\nChange-Id: I7881651986b73ec6e21f121a8c5c2b85c9e52c3f\n"
    },
    {
      "commit": "d2b712fae941c0225caede6fc96d24273edf71f3",
      "tree": "ae476d6ff10f235bd9d40c64cf9dcd7fce1bee84",
      "parents": [
        "58a772cfa757560a58a649e3596a16f4df76be57",
        "b78aad827cb1a74e2746b9ebd320857714c33646"
      ],
      "author": {
        "name": "Siarhei Vishniakou",
        "email": "svv@google.com",
        "time": "Fri May 12 03:49:55 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri May 12 03:49:55 2017 +0000"
      },
      "message": "Merge \"Merge \"Adding \u0027uhid\u0027 permission for bluetooth stack.\" am: 3e010d1353 am: 96d3b668bb am: 50c5253c2d\" into oc-dev-plus-aosp\nam: b78aad827c\n\nChange-Id: Ifbef6c022fc9d944e6126051977f181eca49a29a\n"
    },
    {
      "commit": "b1080dbf95e0e7f71048108fc5fb8dd85a5c5c5d",
      "tree": "ddb8b0b57da29711eec8859bf96c2d6879504223",
      "parents": [
        "cd9c540f38f50fecba3fbb8e7fc21c83d1ec45fd",
        "e0375adaaf127eea46d276c94fe318252947da02"
      ],
      "author": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Fri May 12 03:43:09 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri May 12 03:43:09 2017 +0000"
      },
      "message": "Merge \"Merge \"Finish issue #37815224: DeviceManagementService is incorrectly...\" into oc-dev am: 8d0ba598cf\" into oc-dev-plus-aosp\nam: e0375adaaf\n\nChange-Id: I675107ab7e7cb5a497e56ca10307aed50e6df735\n"
    },
    {
      "commit": "4bb8bea04a75194bd693b28a96fb1b1647ae465d",
      "tree": "c6f1df072cd45c7af331be1170d0ac4f0abb69f6",
      "parents": [
        "e0375adaaf127eea46d276c94fe318252947da02",
        "50c5253c2d1f757d457faf45cd7104d45114f107"
      ],
      "author": {
        "name": "Siarhei Vishniakou",
        "email": "svv@google.com",
        "time": "Fri May 12 01:00:34 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Fri May 12 01:00:34 2017 +0000"
      },
      "message": "Merge \"Adding \u0027uhid\u0027 permission for bluetooth stack.\" am: 3e010d1353 am: 96d3b668bb\nam: 50c5253c2d\n\nChange-Id: I965b2ad6b603dba82116180a43fc20684d2f1b59\n"
    },
    {
      "commit": "06640fea7bd8a799ff717e5b447d9d62e165ca18",
      "tree": "eaeab5c0c9ee78a335460d010e2521c316e5fe59",
      "parents": [
        "fb194bb81c234faa7b4e7253f8cf4228dbda4534"
      ],
      "author": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Thu May 11 12:14:31 2017 -0700"
      },
      "committer": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Thu May 11 12:15:08 2017 -0700"
      },
      "message": "Finish issue #37815224: DeviceManagementService is incorrectly...\n\n...starting services from jobs\n\nRemove dmagent from whitelist.\n\nTest: manual\n\nChange-Id: Id13b95b9ca4f8fa890f4e20cf133a6f4bc0e3cc5\n"
    },
    {
      "commit": "9e089567fdbbce18549d9a6fd7e4603bbc8aa2b2",
      "tree": "6208ffccf55ac37763080bc5d28b82d77ccd40ea",
      "parents": [
        "9d9aab48fa832b60b56f3c905017da1ef2737ff3"
      ],
      "author": {
        "name": "Siarhei Vishniakou",
        "email": "svv@google.com",
        "time": "Mon May 08 15:42:14 2017 -0700"
      },
      "committer": {
        "name": "Siarhei Vishniakou",
        "email": "svv@google.com",
        "time": "Thu May 11 01:35:25 2017 +0000"
      },
      "message": "Adding \u0027uhid\u0027 permission for bluetooth stack.\n\nThis CL is in support of another CL c/2048848, topic\n\u0027Refactor hid command in /frameworks/base/cmds\u0027\nin internal master. Adding the permissions for bluetooth\ndevices here to access uhid_node as part of the new \u0027uhid\u0027\ngroup.\n\nBug: 34052337\nTest: Tested on angler, bluetooth mouse works OK.\n\nChange-Id: I63963984a0a3dccb4fccc64bb6fef4e809e2737e\n"
    },
    {
      "commit": "55b4d62c4bd903d6fff17a468830acd1d61c17a3",
      "tree": "c75893c9a99cab8db8a675267dc635a7c52d74a4",
      "parents": [
        "4fab38f1be0791464dd175141b04fd4fb1c46b56",
        "c812cf27ab3d081cae5fd81bc2f4cfbd8014b01e"
      ],
      "author": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Tue May 02 18:00:22 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Tue May 02 18:00:22 2017 +0000"
      },
      "message": "Merge \"Work on issue #37815224: DeviceManagementService is incorrectly...\" into oc-dev am: 72c0ab518a\nam: c812cf27ab\n\nChange-Id: I7a7b4b17a4eeeeda7619e6fa9702ef059af7d76f\n"
    },
    {
      "commit": "d1f3df43c066c3141d1ac028df1b65c0ae162821",
      "tree": "8e728d816c98b4b07902566f17580b4ba156c0d3",
      "parents": [
        "f1a4b507394f32a9a1fe83b5f6a9d5c543587a6c"
      ],
      "author": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Mon May 01 14:33:05 2017 -0700"
      },
      "committer": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Mon May 01 14:33:57 2017 -0700"
      },
      "message": "Work on issue #37815224: DeviceManagementService is incorrectly...\n\n...starting services from jobs\n\nBring back the correct bg check restrictions on jobs, but also\nbring back whitelisting of dmagent so it doesn\u0027t crash.\n\nTest: booted and ran\n\nChange-Id: I78892386bdcd4f39e0b1a6d33b224bdff958af37\n"
    },
    {
      "commit": "4ac16f9a40a92dc470e482eea06bcfefa46118be",
      "tree": "c4722f0f8aca8f2afc41dfa7b4f1c0d17b76581e",
      "parents": [
        "f3024d69ec137eba558974c0dee44533f255756b",
        "5cfba6f7eed9fd1f6650857de5b252db03e4392a"
      ],
      "author": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Tue Apr 25 20:22:51 2017 +0000"
      },
      "committer": {
        "name": "android-build-merger",
        "email": "android-build-merger@google.com",
        "time": "Tue Apr 25 20:22:51 2017 +0000"
      },
      "message": "Merge \"Revert \"Whitelist DMAgent from bg check\"\" into oc-dev am: 730bf42e44\nam: 5cfba6f7ee\n\nChange-Id: I328bea0b7a38822feeea27cc9966815ffb2da013\n"
    },
    {
      "commit": "730bf42e446b021e720088eb6dfa6ec94d86a641",
      "tree": "c011c86593c6f50d64c06d60ae1f8e27adb0441e",
      "parents": [
        "bad4573bd459c7a0219f56ddc208e84ff45cb7c6",
        "39d081015acabae8f983681df2c402fadf067045"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Apr 25 18:55:03 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Apr 25 18:55:08 2017 +0000"
      },
      "message": "Merge \"Revert \"Whitelist DMAgent from bg check\"\" into oc-dev"
    },
    {
      "commit": "39d081015acabae8f983681df2c402fadf067045",
      "tree": "468c4269256d475871c83277a2eb5d10c01d0f2b",
      "parents": [
        "ea00f16c8555c765f921f909974a1a426ea51b24"
      ],
      "author": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Mon Apr 24 15:55:56 2017 +0000"
      },
      "committer": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Mon Apr 24 15:55:56 2017 +0000"
      },
      "message": "Revert \"Whitelist DMAgent from bg check\"\n\nThis reverts commit ea00f16c8555c765f921f909974a1a426ea51b24.\n\nReason for revert: \u003cINSERT REASONING HERE\u003e\n\nChange-Id: Id4ef18c858b320a31273f0b68d2a6c14d34d526d\n"
    },
    {
      "commit": "0f80719a6f3c30619ad73a9f2452626ed5ef5bd0",
      "tree": "14b02bfd7e3108a10e37d1a8808d5e718f1daa0b",
      "parents": [
        "eedceb57216748bc6efe0b554c064222c035467a"
      ],
      "author": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Thu Apr 13 09:17:07 2017 -0700"
      },
      "committer": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Fri Apr 21 19:56:59 2017 +0000"
      },
      "message": "Moved LRResolverRankerService to ExtServices, and added a permission to\nensure that ResolverRankerServices are from trust sources.\n\nTest: manually shared images in Camera, and in PTP to confirm it works\nas expected.\n\nChange-Id: I3549292d424fec949e9115faea7a0c5bdec06e87\n(cherry picked from commit 61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3)\n"
    },
    {
      "commit": "ee8187688effbe5a2036d95d115e75bc828f7a0f",
      "tree": "5f77e6fa102c7bb771fcbd7730760051f41bdf9b",
      "parents": [
        "215f1ed817c5dd8354d35d40d57e006ed4d98b1b",
        "61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3"
      ],
      "author": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Fri Apr 21 19:53:26 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Fri Apr 21 19:53:35 2017 +0000"
      },
      "message": "Merge \"Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources.\""
    },
    {
      "commit": "61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3",
      "tree": "1b9e0a21d0f0e4a209e30c202a000a90b163ede3",
      "parents": [
        "b88cf3d3fb134aa7b5d602339fe1e447df09eb51"
      ],
      "author": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Thu Apr 13 09:17:07 2017 -0700"
      },
      "committer": {
        "name": "Kang Li",
        "email": "kanlig@google.com",
        "time": "Fri Apr 21 15:44:51 2017 +0000"
      },
      "message": "Moved LRResolverRankerService to ExtServices, and added a permission to\nensure that ResolverRankerServices are from trust sources.\n\nTest: manually shared images in Camera, and in PTP to confirm it works\nas expected.\n\nChange-Id: I3549292d424fec949e9115faea7a0c5bdec06e87\n"
    },
    {
      "commit": "5d7027db6e0b82c0ffcb101c3a17997f6aefafc5",
      "tree": "9f25ddb6643b1ffbfc325c818351a3b01fa6d7d9",
      "parents": [
        "a112757e1f53a0f99cacd94d886dca05bbc86519"
      ],
      "author": {
        "name": "Andrew Scull",
        "email": "ascull@google.com",
        "time": "Wed Apr 12 11:46:27 2017 +0100"
      },
      "committer": {
        "name": "Andrew Scull",
        "email": "ascull@google.com",
        "time": "Wed Apr 19 15:17:34 2017 +0100"
      },
      "message": "Add implementation alternatives for OemLockManager.\n\nThe OEM lock can be implemented with the persistent data block or the\nOemLock HAL.\n\nTest: gts-tradefed run gts -m GtsOemLockServiceTestCases -t com.google.android.oemlock.gts.OemLockServiceTest\nBug: 34766843\nChange-Id: I16b31785d9af58212a050a299ef024be3139f0c6\n"
    },
    {
      "commit": "9a4a45762219f43903f54d5f29157dc6b3881557",
      "tree": "e3dcbc3002454f5a3ef144a428b1a7154c507ff7",
      "parents": [
        "43112fd26e89b0b27b968c54d9d8d45928f8304e"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Fri Apr 14 16:28:59 2017 -0600"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Fri Apr 14 16:29:04 2017 -0600"
      },
      "message": "Clear identity to handle ALLOCATE_AGGRESSIVE.\n\nWe\u0027re not actually clearing any files, only deciding how much free\nspace is available, so we\u0027re fine assuming the remote caller has the\npermission.\n\nTest: builds, boots\nBug: 37169076\nChange-Id: I6cd42f77c43e9d2de40e2b8b937c7f2145f1b869\n"
    },
    {
      "commit": "a4daf89f0f6b445b59a0e8069e78b9ae952b2870",
      "tree": "d3fd08a59adb66440039bf1f448cb5323f13a67d",
      "parents": [
        "eca0d421d10e3cdaec150ef736a3fa3dad652bcb"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Sun Apr 09 21:37:56 2017 -0600"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Tue Apr 11 13:03:54 2017 -0600"
      },
      "message": "Grant Shell ability to clear cached app data.\n\nIt already has CLEAR_APP_USER_DATA to clear everything inside app\nstorage, and clearing cached data is a subset of that.\n\nTest: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.StorageHostTest\nBug: 36731175\nChange-Id: Iefc5be6c80e2562a95424fd6fe413bdb018201a9\n"
    },
    {
      "commit": "ea00f16c8555c765f921f909974a1a426ea51b24",
      "tree": "85739a75a4c7e20a0078cb14c206f5b1d7c66c8b",
      "parents": [
        "e35d50622c8387919e42b81c7b052c64decb0615"
      ],
      "author": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Mon Apr 03 18:39:45 2017 +0100"
      },
      "committer": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Mon Apr 03 19:29:51 2017 +0100"
      },
      "message": "Whitelist DMAgent from bg check\n\nThis should be reverted before O is shipped.\n\nTest: Found DMAgent in the whitelist in Settings.\n\nBug: 36856786\n\nChange-Id: I7828566e4bc93a30457c594471fa43270c0bf3b3\n"
    },
    {
      "commit": "0c224f96746828b113fc3ac62266bc0f293c95c2",
      "tree": "1b9debf8ccd7a60c5084246a42e325d48728c151",
      "parents": [
        "891e03203c8e699610cf218da0e52a1c847796df",
        "54479c5e239efffffb3b64b8541c5fbedd639896"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Mon Apr 03 11:06:53 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Mon Apr 03 11:06:59 2017 +0000"
      },
      "message": "Merge \"Revert \"Whitelist ManagedProvisioning from bg check\"\" into oc-dev"
    },
    {
      "commit": "e0d00e65ce52876017a27382deac27b956245cee",
      "tree": "223767116f1a9ec92b27b34a6e0d44daef9f3135",
      "parents": [
        "f114667f2dc1f8dbbbb9239d6d3eaa22632ea32b"
      ],
      "author": {
        "name": "Tyler Gunn",
        "email": "tgunn@google.com",
        "time": "Fri Mar 31 17:50:56 2017 -0700"
      },
      "committer": {
        "name": "Tyler Gunn",
        "email": "tgunn@google.com",
        "time": "Fri Mar 31 17:50:56 2017 -0700"
      },
      "message": "Add SUBSTITUTE_NOTIFICATION_APP_NAME pregrant for Telecom.\n\nTest: Manual\nBug: 36817809\nChange-Id: I2d7439e3d0040b617a842812b6ae8bda3c32f1ee\n"
    },
    {
      "commit": "54479c5e239efffffb3b64b8541c5fbedd639896",
      "tree": "fa6ae182ad7b114db5575646a4ebc0ab8294b7d9",
      "parents": [
        "bbb551cfb5df58512f6d0df889766887d440eb08"
      ],
      "author": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Thu Mar 30 16:27:49 2017 +0000"
      },
      "committer": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Thu Mar 30 16:27:49 2017 +0000"
      },
      "message": "Revert \"Whitelist ManagedProvisioning from bg check\"\n\nThis reverts commit bbb551cfb5df58512f6d0df889766887d440eb08.\n\nReason for revert: \u003cINSERT REASONING HERE\u003e\n\nChange-Id: I1d36b8760aac68fc4d3fca106d20cddfddaa9230\n"
    },
    {
      "commit": "bbb551cfb5df58512f6d0df889766887d440eb08",
      "tree": "6ff4f3dafa2e7ee25f1db5f8951e2aaa3a6972c8",
      "parents": [
        "76c32a35a956fa3a4559c6ed9512f4083ec011b7"
      ],
      "author": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Wed Mar 29 15:53:07 2017 +0100"
      },
      "committer": {
        "name": "Tony Mak",
        "email": "tonymak@google.com",
        "time": "Wed Mar 29 20:41:17 2017 +0000"
      },
      "message": "Whitelist ManagedProvisioning from bg check\n\nNotice that app put in this list is also exempted from doze.\nAlso, this only exempts us from the service restriction, but not the broadcast one.\n\nTest: adb shell am make-uid-idle  --user 0 com.android.managedprovisioning\n      \u0026\u0026 adb shell am broadcast -a android.intent.action.PRE_BOOT_COMPLETED -n com.android.managedprovisioning/com.android.managedprovisioning.ota.PreBootListener\n      Observe there is no crash\n\nChange-Id: Ic0a943a9b66c909a6727f9411af519a8c6cf0157\nFix: 36705375\n"
    },
    {
      "commit": "b1669bf22bb8d1fc72633c713e7c6236e55c19d8",
      "tree": "2bb074fa1984317a3bf36d63a10ca5dd8ea61e5c",
      "parents": [
        "c344373ed49c768f3b1cc8486c6ab376e5ef5256",
        "ec3a9f3346d672e916e83eb2c9c827593d8412c1"
      ],
      "author": {
        "name": "Chris Tate",
        "email": "ctate@android.com",
        "time": "Wed Mar 22 18:07:43 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Wed Mar 22 18:07:49 2017 +0000"
      },
      "message": "Merge \"Give shell the CHANGE_DEVICE_IDLE_TEMP_WHITELIST permission\""
    },
    {
      "commit": "ec3a9f3346d672e916e83eb2c9c827593d8412c1",
      "tree": "46fd8409e1171c7ef8e3beafc82e87b6390b9718",
      "parents": [
        "68745b2a5512f209a6a86a7ec1dc91fe908d2bb9"
      ],
      "author": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Tue Mar 21 17:43:47 2017 -0700"
      },
      "committer": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Tue Mar 21 17:52:42 2017 -0700"
      },
      "message": "Give shell the CHANGE_DEVICE_IDLE_TEMP_WHITELIST permission\n\nShell needs to have this permission in order for the deviceidle\ntempwhitelist shell command to exist.\n\nBug 34715096\nTest: cts-tradefed run cts -m CtsAppTestCases \\\n  -t android.app.cts.ActivityManagerTest#testBackgroundCheckService\n\nChange-Id: Ic1fdd87b6020649705ba0c9349dd00dd096037f3\n"
    },
    {
      "commit": "6dad6d41b8b4d0d09de220dd8a7e7951b8ea6a12",
      "tree": "6ed3fdc29b471cf6ea968419709d98828c616232",
      "parents": [
        "a03686cc2ecc694f26e3bb211a490fb00c47a806"
      ],
      "author": {
        "name": "Conrad Chen",
        "email": "conradchen@google.com",
        "time": "Mon Mar 20 15:19:11 2017 -0700"
      },
      "committer": {
        "name": "Conrad Chen",
        "email": "conradchen@google.com",
        "time": "Tue Mar 21 16:59:50 2017 -0700"
      },
      "message": "Declare privileged permissions of Live TV app\n\nTest: build\nBug: 35782070\nChange-Id: Ia1e39dcf8fdd3345837ebec1729ad4d02699763b\n"
    },
    {
      "commit": "5517b7372679d4a496cb9afbd88a161c18c8f0ce",
      "tree": "657af3a78147a2e9627c9967cc1023789159e145",
      "parents": [
        "c7eefdbda7864c71f2bc1845e83d9a21aa10c338"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Tue Mar 07 14:20:03 2017 -0700"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Tue Mar 07 14:21:30 2017 -0700"
      },
      "message": "Revert \"Start locking down /data/media access.\"\n\nCaused b/35926593 because ExternalStorageProvider needs raw\naccess to underlying devices that aren\u0027t mounted visibly, like\nUSB mass storage devices.\n\nThis reverts commit 53d64fc839ad79be28d783f0f14082310a647dd9.\n"
    },
    {
      "commit": "272fe5c33866ccc9f590e8fa383f7d96577f8068",
      "tree": "4f6f8da4aaee903a860aa7e72d5732375371d1cc",
      "parents": [
        "d4bd7f1ee69793ed70e38bf42aa8488745e29193",
        "7344159c71d5a6b38639ab9e1c911e0b26f698ea"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Mon Mar 06 18:57:42 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Mon Mar 06 18:57:48 2017 +0000"
      },
      "message": "Merge \"Declare new com.android.phone permission in whitelist.\""
    },
    {
      "commit": "7344159c71d5a6b38639ab9e1c911e0b26f698ea",
      "tree": "d00b090538ed9a65b9478746ed5dc724e408b12e",
      "parents": [
        "7485a9bbb38779746bc8555a4de2b6d88a20f0f7"
      ],
      "author": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Fri Mar 03 17:42:35 2017 -0800"
      },
      "committer": {
        "name": "Jeff Davidson",
        "email": "jpd@google.com",
        "time": "Fri Mar 03 17:42:35 2017 -0800"
      },
      "message": "Declare new com.android.phone permission in whitelist.\n\nBug: 35948554\nTest: Will verify T/H build\nChange-Id: I41773160aa6515983a15365905a2cbb6b13e10c6\n"
    },
    {
      "commit": "1991f5723070d9464c06f2bb8dc6bf3a2432f9fd",
      "tree": "e342f40202c07d3749a1f5cf09baf674d42d0c93",
      "parents": [
        "2c66f192ca3f43b35db84c13af687a847b10301d"
      ],
      "author": {
        "name": "Alex Klyubin",
        "email": "klyubin@google.com",
        "time": "Fri Mar 03 14:08:36 2017 -0800"
      },
      "committer": {
        "name": "Alex Klyubin",
        "email": "klyubin@google.com",
        "time": "Fri Mar 03 14:25:14 2017 -0800"
      },
      "message": "Restrict access from apps to bluetooth_address setting\n\nBluetoothManagerService for some reason leaks the Android\u0027s Bluetooth\nMAC address via Settings.Secure which is normally readable by all\napps. This lets apps bypass the restriction on access to Bluetooth MAC\naddress from apps.\n\nThis commit fixes the issue by restricting access to bluetooth_address\nsecure setting (Settings.Secure). Only packages which hold the\nandroid.permission.LOCAL_MAC_ADDRESS permission retain access.\n\nThis commit accordingly grants LOCAL_MAC_ADDRESS permission to the\nsystem Shell app because a number of scripts (including Android CTS)\nuse \"adb shell settings get secure bluetooth_address\" as a convenient\nway to query the device\u0027s Bluetooth MAC address over ADB. This is\nacceptable because the user of the device can see the Bluetooth MAC\naddress and thus it\u0027s fine for shell to be able to see the address as\nwell.\n\nTest: See CTS test added in the cts project in this topic.\nTest: \"adb shell settings get secure bluetooth_address\" returns the\n      Bluetooth MAC address of the Android.\nTest: \"adb shell settings list secure | grep bluetooth_address\"\n      returns the Bluetooth MAC address of the Android.\nTest: Bluetooth works (toggling off/on, pairing, file transfer)\nBug: 33701414\n\nChange-Id: I17b110b96eb3794b25c1661e93d29a7a003e3c9a\n"
    },
    {
      "commit": "aea3cf40d61d5ecdbec729ff1e6ca06dcd7c3534",
      "tree": "db13d49c705712cadd3bba4c27071474b3f7cf1e",
      "parents": [
        "8a362bb9a5bb3dd77f4b514dbc7b67024adeced4"
      ],
      "author": {
        "name": "Adam Lesinski",
        "email": "adamlesinski@google.com",
        "time": "Thu Feb 23 18:17:11 2017 -0800"
      },
      "committer": {
        "name": "Adam Lesinski",
        "email": "adamlesinski@google.com",
        "time": "Thu Feb 23 18:52:30 2017 -0800"
      },
      "message": "Whitelist new CHANGE_OVERLAY_PACKAGES permission\n\nThe Shell application needs access to change which overlays are\nenabled in OverlayManagerService.\n\nTest: Manual: invoke adb exec-out cmd overlay enable some.package.name\nwhen shell is not root (adb unroot on eng builds).\nChange-Id: I1849f68e244cfc9b1e13eb0e673dde7be03cba6d\n"
    },
    {
      "commit": "53d64fc839ad79be28d783f0f14082310a647dd9",
      "tree": "48d0ff3d64b6995613d2d69c70ee6a3e91afcbfd",
      "parents": [
        "458428ea6633e6000b453ef272c13823f5d02fe5"
      ],
      "author": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Wed Feb 22 14:10:44 2017 -0700"
      },
      "committer": {
        "name": "Jeff Sharkey",
        "email": "jsharkey@android.com",
        "time": "Wed Feb 22 15:48:46 2017 -0700"
      },
      "message": "Start locking down /data/media access.\n\nThe new sdcardfs filesystem requires that we have stricter access\ncontrols around /data/media style locations.  Start by taking away\nthe \"media_rw\" GID from apps requesting the WRITE_MEDIA_STORAGE\npermission.\n\nCommon use-cases like music playback appear to continue working fine,\nas clients should only be attempting to use /data/media paths after\ncalling maybeTranslateEmulatedPathToInternal().\n\nTest: builds, boots, music playback works\nBug: 35447080\nChange-Id: Iba9f3ef41d3277c75497f675a1fe6d3406cf4542\n"
    },
    {
      "commit": "f970636072727046006d72195c0c5786c15147f1",
      "tree": "ccf1305920de4fba27392bb0c0f051c446dbeb9c",
      "parents": [
        "54dc4cb09601096656fa941d0eda57ce819f714a"
      ],
      "author": {
        "name": "Jerry Zhang",
        "email": "zhangjerry@google.com",
        "time": "Fri Feb 17 11:46:58 2017 -0800"
      },
      "committer": {
        "name": "Jerry Zhang",
        "email": "zhangjerry@google.com",
        "time": "Fri Feb 17 11:50:30 2017 -0800"
      },
      "message": "Allow the shell to set USB functions.\n\nBug: 25596495\nTest: svc usb setFunction mtp true\nChange-Id: I4472464a1c7ed100cb257dbad83d1d8cfef88fc7\n"
    },
    {
      "commit": "3283079e5e6e100c183eac2c8c2da251d5d3d42b",
      "tree": "17c3ea781cd3cc41d30565b69a46cce23632f034",
      "parents": [
        "62185042fabd40072df5ac3a4484f1a69cffdc81"
      ],
      "author": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Fri Feb 10 11:23:43 2017 -0800"
      },
      "committer": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Fri Feb 10 11:42:23 2017 -0800"
      },
      "message": "Put shell on the idle/background whitelist\n\nBug 35229549\n\nChange-Id: I9f7dd66c37af9c28c9f0714be4358b94930c2d32\n"
    },
    {
      "commit": "3f13c54f1443809ea14dbc04e14cdf2d4201be60",
      "tree": "34618cbaa14d3b6c6ad547558d803690855306b5",
      "parents": [
        "660ea8c6d7b18ad84d797f5746aec9db4fa3ecba"
      ],
      "author": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Thu Feb 09 11:05:11 2017 -0800"
      },
      "committer": {
        "name": "Dianne Hackborn",
        "email": "hackbod@google.com",
        "time": "Thu Feb 09 11:07:18 2017 -0800"
      },
      "message": "Fix issue #34592078: Mobile broadcast crash observed randomly...\n\n...when using device on mobile data\n\nWhitelist CellBroadcastReceiver, this is a core OS component anyway\nso this probably makes sense.\n\nTest: manual\n\nChange-Id: I1560093640e81064ad123ff0bbcb307583fc47c6\n"
    },
    {
      "commit": "4244c91e2788bc34862dbef7a72ad45a6a2bd5bd",
      "tree": "abf1188cceb0099941f7851469e51155d4fbc291",
      "parents": [
        "fd4e9e0f8d71a49f85532419e69b817c756f0d2c"
      ],
      "author": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Wed Feb 08 14:26:50 2017 -0800"
      },
      "committer": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Wed Feb 08 16:37:57 2017 -0800"
      },
      "message": "Whitelist LocalTransport here in the framework sysconfig\n\nThis shouldn\u0027t properly be emplaced as a side-effect of partner-\nspecific configurations; so now we don\u0027t do that any more.\n\nBug 35151478\nTest: verify whitelist contents with \u0027bmgr whitelist\u0027\n\nChange-Id: I854ddfdbcec1def882b24f5ea7955b28d4789806\n"
    },
    {
      "commit": "c15add00405c85317e89480f65383ed6025cf252",
      "tree": "f03de9874ae79f8b92331a4ba43fb8f3637862bb",
      "parents": [
        "620f72841fb3284e43878789ef7029d316d7b54e",
        "bd8851022e36a14b068af3ef00b3a19e46f1f04e"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Feb 07 10:13:06 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Feb 07 10:13:09 2017 +0000"
      },
      "message": "Merge \"Extend permissions of cameraserver\""
    },
    {
      "commit": "bd8851022e36a14b068af3ef00b3a19e46f1f04e",
      "tree": "a3539998ef01d31d75159c82fdfc0f74de5f8c8e",
      "parents": [
        "85a05cd9b5945c42f46ce1bcacb2d1e0aa8c7a44"
      ],
      "author": {
        "name": "Emilian Peev",
        "email": "epeev@google.com",
        "time": "Wed Feb 01 16:07:31 2017 +0000"
      },
      "committer": {
        "name": "Emilian Peev",
        "email": "epeev@google.com",
        "time": "Mon Feb 06 17:14:20 2017 +0000"
      },
      "message": "Extend permissions of cameraserver\n\nCamera service will need to a way to query\nthe process state and oom score.\n\nBUG: 34701266\nTest: Manual testing + cts-tradefd run cts -m Camera --abi armeabi-v7a --disable-reboot\nChange-Id: I4df704817d2fc728d421daeffbbbcee2e61d8c3b\n"
    },
    {
      "commit": "cab1dad44f2c4adbc4bdd6938a6131e592fd18aa",
      "tree": "4bdf0bf328ea8b8198e5c75aa4e87712218138b8",
      "parents": [
        "e7da87a41f7860c2240b744947656d8c298bba95"
      ],
      "author": {
        "name": "Brad Ebinger",
        "email": "breadley@google.com",
        "time": "Fri Feb 03 10:42:25 2017 -0800"
      },
      "committer": {
        "name": "Brad Ebinger",
        "email": "breadley@google.com",
        "time": "Fri Feb 03 10:51:05 2017 -0800"
      },
      "message": "Add BIND_IMS_SERVICE to permissions whitelist\n\nAdds android.permission.BIND_IMS_SERVICE to the permissions\nwhitelist xml file.\n\nBug: 34813244\nTest: Manual\nChange-Id: I7a7ad1a361c9d2dcc51769bc74a436878ad4adc5\n"
    },
    {
      "commit": "fffa2eb0460dbb790d565b3e2a651b6a9fb7c9b9",
      "tree": "1420ef129be82022ac9b65ba62b9720c8215f994",
      "parents": [
        "18b317cf9857693e905b44a1c46f4806270d0a95",
        "03a1ba2da4f8789d1c5f707764c0b9467bf78b24"
      ],
      "author": {
        "name": "TreeHugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Jan 24 22:40:11 2017 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Tue Jan 24 22:40:17 2017 +0000"
      },
      "message": "Merge \"Deliver MEDIA_SCANNER_SCAN_FILE to background receivers\""
    },
    {
      "commit": "03a1ba2da4f8789d1c5f707764c0b9467bf78b24",
      "tree": "bff2c8f1498bf3ba11ab83c57929b451fcfa79de",
      "parents": [
        "5a5afca93618a3ea669693d231e050be595e7a94"
      ],
      "author": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Mon Jan 23 17:50:34 2017 -0800"
      },
      "committer": {
        "name": "Christopher Tate",
        "email": "ctate@google.com",
        "time": "Tue Jan 24 12:45:09 2017 -0800"
      },
      "message": "Deliver MEDIA_SCANNER_SCAN_FILE to background receivers\n\nBug 34630982\nTest: download mp3 file in Chrome, see it taken up in Play Music\n\nChange-Id: Ia2d35d266d0066f0c2bd278bc8b6024ba94261bb\n"
    },
    {
      "commit": "02616eaac81831cea8627c9d760c148e2896baf1",
      "tree": "2019c09771ee9e8779f8daacf15c14ac18021622",
      "parents": [
        "e5ec708000ed714bd3a493cfa682a1af207eb8d3"
      ],
      "author": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Tue Jan 24 11:39:23 2017 -0800"
      },
      "committer": {
        "name": "Fyodor Kupolov",
        "email": "fkupolov@google.com",
        "time": "Tue Jan 24 11:39:23 2017 -0800"
      },
      "message": "Whitelist CHANGE_DEVICE_IDLE_TEMP_WHITELIST for systemui\n\nTest: device starts without warning\nChange-Id: Ia13f7cee3da7eb2ac185415b44b6905f0f28c487\n"
    }
  ],
  "next": "42a386b7717300bf6d75cbd3b4f7ad00f294be0d"
}
