summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-11-16Merge tag 'LA.QSSI.13.0.r1-12100-qssi.0' into tachibana-mr1tachibana-mr1alk3pInjection
"LA.QSSI.13.0.r1-12100-qssi.0" Change-Id: I92cc197481dc008fcff3feb153c913e6fe6d2511
2023-11-08Merge 7c0c44a2fdb8d37a91c6883ac4bad0e0c09d8ebd on remote branchLinux Build Service Account
Change-Id: I2acb180d4f23a24ff1d77063079e8e388094e288
2023-10-31Snap for 11022443 from 29c6010d705aaa6bd84537b577ba05ed2b872263 to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: Ic300ab20f9809395b7090340d9fe3c91f2b5b71b
2023-10-30Merge "perf: add exit app animation boost for apps exit." into ↵Treehugger Robot
t-keystone-qcom-dev
2023-10-27Merge 330dd01f0437e7679e744f215ff719a831b13ea6 on remote branchLinux Build Service Account
Change-Id: I4ee6cf66d888a36495e03f9730bd2d1e988cdacf
2023-10-27Snap for 11003398 from 3e0ac26af18ee11b3f24d87af5df1fdb89a23677 to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I56769c20005b0bd2392353c9ec2a6b91cb351fad
2023-10-24Merge t-mpr-2023-11Omkar Sai Sandeep Katadi
Change-Id: I241cadfeb0b29071157021472348c87abcc80af5
2023-10-24perf: add exit app animation boost for apps exit.Tingting Zhang
CRs-Fixed: 3622453 Change-Id: Ia3799ea1a6452de81ab621997c8f708284e75bf7
2023-10-13Merge tag 'LA.QSSI.13.0.r1-11900-qssi.0' into tachibana-mr1alk3pInjection
"LA.QSSI.13.0.r1-11900-qssi.0" Change-Id: If9766b97a69298bf205fcd375d01ee746035d61c
2023-10-06Merge 5dd8b1dc5d5ff52cb6c1ac2e6fb65b2be3386b88 on remote branchLinux Build Service Account
Change-Id: Ibb39226c504a4b7de509da9b3b58adf015af2984
2023-10-06Snap for 10909030 from 76ca6c8be058361e1b0b6998b6eb2618b6a4a4be to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I22b93cb12345a80c542b3a00c60a6f8405350a6b
2023-10-04[automerger skipped] Adding support for Bootanimation in vendor skipped: ↵LAVEENA FULWANI
04a8c299d1 Change-Id: I130617af96c29140073ad1c4f50776e2bf888f9a
2023-10-01Merge tag 'LA.QSSI.13.0.r1-11700-qssi.0' into tachibana-mr1alk3pInjection
"LA.QSSI.13.0.r1-11700-qssi.0" Change-Id: I09c2644918adf810041ad17f6ff4931d1a604bdf
2023-09-29Snap for 10876279 from 9ff3f3b051226b7cc4403cb0d7faa1fa306d1eb0 to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I85ce26e0f2b76a8f208516d85dededd9ccc6dc0d
2023-09-27Merge "Merge t-mpr-2023-10" into t-keystone-qcom-devOmkar Sai Sandeep Katadi
2023-09-27Snap for 10868107 from 191da53b8b8a06aaba8244045cf4e0de16da00ca to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I1f25c651dde84a38e493c59fd7f8186f1fd8da7c
2023-09-26Adding support for Bootanimation in vendorLAVEENA FULWANI
Change-Id: Iaa44c2f349f3752ea59a5c9fddcd6eb51a34a865 CRs-Fixed: 3625614
2023-09-26Merge changes from topics "am-222aa430-7b70-43ef-a7d5-7886893cb801", ↵Treehugger Robot
"am-85c4a9df-3d07-46e2-b1d3-682cf5f55b26" into t-keystone-qcom-dev * changes: [LeAudio] Enable regex dotall mode for Metadata [LE Audio] To fix the QR Code parse error
2023-09-26Merge t-mpr-2023-10Omkar Sai Sandeep Katadi
Change-Id: I67d3e092803919f4489db780d06e89e9ab1b49aa
2023-09-25Merge "Merge s-mpr-2023-10" into s-keystone-qcom-devOmkar Sai Sandeep Katadi
2023-09-23Merge a9233b9ff1bad9f5c62a277ee21cd29ab90c7bc9 on remote branchLinux Build Service Account
Change-Id: I77a77b16cc90cfd4ecd10f816209ee5d3fe3cd2c
2023-09-22Merge s-mpr-2023-10Omkar Sai Sandeep Katadi
Change-Id: If2daa33c371c119920f82cc6b4c3edabcf235273
2023-09-21Frameworks: Add Bluetooth and connect permissionsAmit Kumar Prasad
Add below permission to intent ACTION_REMOTE_ISSUE_OCCURRED RequiresBluetoothConnectPermission RequiresPermission(android.Manifest.permission.BLUETOOTH_CONNECT) CRs-Fixed: 3581934 Change-Id: I6331b99555240b7d86a316b4c26165ac61fdb34d
2023-09-20Merge cherrypicks of ['googleplex-android-review.googlesource.com/24304450'] ↵Android Build Coastguard Worker
into tm-platform-release. Change-Id: I4cd2c89bd183a9ba1c34cfd4beccd6e0d8f617ff
2023-09-20Strips spans from AssistStructure textDaniel
When a new view becomes visible on the screen, the view notifies AutofillManager about its visibility. AutofillManager then requests the activity to compile an AssistStructure object which will contain the view hierarchy of the activity as well as texts contained inside all the views. If there are Span text fields that contain custom implementation of ClickableSpan, these spans are also copied over during the construction of the AssistStructure. By keeping the references to the ClickableSpan, it causes memory leak when the AssistStructure object outlives the activity. Test: atest CtsAutoFillServiceTestCases, atest CtsAssistTestCases, atest android.widget.cts.TextViewTest Bug: 146100180 (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e42d05e3d01f4c3b8aa7bce29086cd968970b4ec) Merged-In: I1fd97d9d6fdc569d14529347fcb85da409c3c1ff Change-Id: I1fd97d9d6fdc569d14529347fcb85da409c3c1ff
2023-09-19Merge tag 'LA.QSSI.13.0.r1-11500.01-qssi.0' into tachibana-mr1alk3pInjection
"LA.QSSI.13.0.r1-11500.01-qssi.0" Change-Id: Ib07379bca7348e0d497fabec6bb128c3b4e043b6
2023-09-17BatteryStatsImpl: Avoid dividing by 0.0 in updateWifiState.Shumao Hou
If the variable opVolt is 0.0 in the method updateWifiState, the local variable monitoredRailChargeConsumedMaMs may be computed to a large value. The logic here should be the same as the method noteModemControlllerActivity. The variable opVolt being 0.0 should be avoided as a divisor. Bug: N/A Test: Manual Change-Id: I95ce75b960bace4c37acea89062cb21aab21aa30
2023-09-17BatteryStatsImpl: Fix divide by zero errorminaripenguin
E BatteryExternalStatsWorker: Error updating external stats: E BatteryExternalStatsWorker: java.lang.ArithmeticException: divide by zero E BatteryExternalStatsWorker: at com.android.internal.os.BatteryStatsImpl.noteModemControllerActivity(BatteryStatsImpl.java:13748) E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker.updateExternalStatsLocked(BatteryExternalStatsWorker.java:756) E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker.-$$Nest$mupdateExternalStatsLocked(Unknown Source:0) E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker$1.run(BatteryExternalStatsWorker.java:470) Change-Id: Ic13273965732e6eba5d33d0aa229b216da58af02 Signed-off-by: minaripenguin <minaripenguin@users.noreply.github.com>
2023-09-17fwb: Entirely drop qti servicetracker dependencyalk3pInjection
which appears to be some kind of useless debugging stuff Change-Id: I34f21a85ff4b556912774b053100b80dd1488879
2023-09-17Zygote: Do not spam logcat when libbeluga is absentAdithya R
Change-Id: Iba0495d2394b5cc77770bee28e3a24c4930b64a0
2023-09-17BoostFramework: Guard it with overlayjhenrique09
Change-Id: I5e22a590b0f1f0e9a678d45d06bb262021cf84bb
2023-09-17SystemUI: Fix NPE in CastTilejhonboy121
E AndroidRuntime: FATAL EXCEPTION: main E AndroidRuntime: Process: com.android.systemui, PID: 1487 E AndroidRuntime: java.lang.NullPointerException: Attempt to read from field 'boolean com.android.systemui.statusbar.connectivity.IconState.visible' on a null object reference in method 'void com.android.systemui.qs.tiles.CastTile$1.setWifiIndicators(com.android.systemui.statusbar.connectivity.WifiIndicators)' E AndroidRuntime: at com.android.systemui.qs.tiles.CastTile$1.setWifiIndicators(CastTile.java:31) E AndroidRuntime: at com.android.wm.shell.bubbles.Bubble$$ExternalSyntheticLambda1.run(R8$$SyntheticClass:138) E AndroidRuntime: at android.os.Handler.handleCallback(Handler.java:942) E AndroidRuntime: at android.os.Handler.dispatchMessage(Handler.java:99) E AndroidRuntime: at android.os.Looper.loopOnce(Looper.java:201) E AndroidRuntime: at android.os.Looper.loop(Looper.java:288) E AndroidRuntime: at android.app.ActivityThread.main(ActivityThread.java:7964) E AndroidRuntime: at java.lang.reflect.Method.invoke(Native Method) E AndroidRuntime: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548) E AndroidRuntime: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:942) Change-Id: I98b83b4d18f5d842ff3063b8ddba5c9f38f76b23
2023-09-17fw/b: Squashed revert of SafetyNet workaroundsalk3pInjection
Reason for revert: broken beyond fix This reverts the following commits: 7a15c15 "gmscompat: Make CTS/Play Integrity pass again" c6f3d56 "keystore: Block key attestation for SafetyNet" 555e3a9 "Limit SafetyNet workarounds to unstable GMS process" 51c0024 "Spoof build fingerprint for Google Play Services" Change-Id: Id683fd971dee2c7f0219cb5bcbac3c80822eccb6
2023-09-15Snap for 10816361 from ced509b78c99c4a89c71f977373cea9d068c76d8 to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I46284d23b632c94e50efcc8be6f9533b6a979af8
2023-09-11Merge cherrypicks of ['googleplex-android-review.googlesource.com/23983543', ↵Android Build Coastguard Worker
'googleplex-android-review.googlesource.com/24323876', 'googleplex-android-review.googlesource.com/24309522', 'googleplex-android-review.googlesource.com/24424817'] into sc-v2-platform-release. Change-Id: I451b0ef73882988b23a5a14fa13c3a7359182ce9
2023-09-11[SettingsProvider] verify ringtone URI before settingSongchun Fan
Similar to ag/24422287, but the same URI verification should be done in SettingsProvider as well, which can be called by apps via Settings.System API or ContentProvider APIs without using RingtoneManager. BUG: 227201030 Test: manual with a test app. Will add a CTS test. (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1b234678ec122994ccbfc52ac48aafdad7fdb1ed) Merged-In: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b Change-Id: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
2023-09-11Use type safe API of readParcelableArraykumarashishg
Bug: 291299076 Test: Build and flash the device and check if it throws exception for non UsbInterface object Test: atest CtsUsbManagerTestCases (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:85d7e6712a9eeeed3bdd68ea3c3862c7e88bfe70) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7491a49b633e4eaa4f01d9b12ea4bce15b8dce00) Merged-In: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503 Change-Id: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
2023-09-11[DO NOT MERGE] Check caller's uid in backupAgentCreated callbackPiyush Mehrotra
AM.backupAgentCreated() should enforce that caller belongs the package called in the API. Bug: 289549315 Test: atest android.security.cts.ActivityManagerTest#testActivityManager_backupAgentCreated_rejectIfCallerUidNotEqualsPackageUid (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:4a82aa857eb738d3334a896dac525abf3b32c5bf) Merged-In: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d Change-Id: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
2023-09-11DO NOT MERGE Fix BAL via notification.publicVersionNan Wu
We stripped the token that allows app to retrieve their own notification and fire their own PI to launch activities from background. But we forgot to strip the token from notification.publicVersion Bug: 278558814 Test: NotificationManagerTest#testActivityStartFromRetrievedNotification_isBlocked (cherry picked from commit cf851d81a954f0a6dd0c2fd7defa93932539e7f9) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8d839e4985d0acc662e1019390c88fab20bacbd6) Merged-In: I8f25d7a5e47890a0496af023149717e1df482f98 Change-Id: I8f25d7a5e47890a0496af023149717e1df482f98
2023-09-11Merge cherrypicks of ['googleplex-android-review.googlesource.com/24308838', ↵Android Build Coastguard Worker
'googleplex-android-review.googlesource.com/24309523', 'googleplex-android-review.googlesource.com/23982977', 'googleplex-android-review.googlesource.com/24424817', 'googleplex-android-review.googlesource.com/24270064'] into tm-platform-release. Change-Id: Ibaa389ceee6768b5dda0761a4ace74469f4fcd92
2023-09-11RESTRICT AUTOMERGE Unset StrongAuthFlags when unlocking a user profileHaining Chen
Currently the full user (e.g. userId 0) is required to enter device credential (e.g. device PIN/pattern/password) to unlock the device in certain cases as specified by StrongAuthFlags (e.g. the user has triggered lockdown). After successfully verify the device credential, StrongAuthFlags for the full user will be set back to STRONG_AUTH_NOT_REQUIRED. This may or may not clear StrongAuthFlags for a profile of the user, depending on whether the profile has a separate or unified lock. Case #1: the profile has a seprate lock. In this case, the user will need to enter the device credential on lockscreen to unlock the device, and then enter the different profile lock to unlock the profile. StrongAuthFlags for the profile will only be cleared after successfully verifying the profile lock. Case #2: the profile has a unified lock. Currently in this case, StrongAuthFlags for the profile doesn't get cleared properly after the user verifies the device credential on lockscreen and unpauses the profile. For example, if the user triggers lockdown and later enters the device credential to unlock the device, StrongAuthFlags for the full user gets cleared (so the full user exits lockdown) while StrongAuthFlags for the profile doesn't get cleared (so the profile remains in lockdown), and thus notifications for the profile won't be shown properly. This CL fixes the issue above for the case #2. The user will only need to enter the device credential on lockscreen once to unlock the device. If the profile is already unpaused, at this point StrongAuthFlags should already be cleared; otherwise, StrongAuthFlags will be cleared after the user unpauses the profile (but without having to enter any lock again since the profile uses a unified lock). Test: (1) Set up a profile (e.g. a managed profile) with a unified lock. (2) Trigger the lockdown mode on lockscreen, and verify that StrongAuthFlags for the full user and the profile are both set properly, via "adb shell dumpsys lock_settings". (3) Enter the device credential on lockscreen for the full user, and verify that StrongAuthFlags for the full user is unset. StrongAuthFlags for the profile should also be cleared at this point if the profile was unpaused already before lockdown; otherwise (4) Unpause the profile and verify that StrongAuthFlags for the profile is cleared. Fix: 176924824 Bug: 173721373 (cherry picked from commit ea925cf0b1293ddece4a77f8cce60196ee27f146) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:498867921e79a3809a7cfbbbcf3efc2a1e8eb8eb) Merged-In: Ic466fc22a5be9047d39194ad42c56dc4a2acb4dc Change-Id: Ic466fc22a5be9047d39194ad42c56dc4a2acb4dc
2023-09-11[SettingsProvider] verify ringtone URI before settingSongchun Fan
Similar to ag/24422287, but the same URI verification should be done in SettingsProvider as well, which can be called by apps via Settings.System API or ContentProvider APIs without using RingtoneManager. BUG: 227201030 Test: manual with a test app. Will add a CTS test. (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1b234678ec122994ccbfc52ac48aafdad7fdb1ed) Merged-In: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b Change-Id: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
2023-09-11DO NOT MERGE Fix BAL via notification.publicVersionNan Wu
We stripped the token that allows app to retrieve their own notification and fire their own PI to launch activities from background. But we forgot to strip the token from notification.publicVersion Bug: 278558814 Test: NotificationManagerTest#testActivityStartFromRetrievedNotification_isBlocked (cherry picked from commit cf851d81a954f0a6dd0c2fd7defa93932539e7f9) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1896c2e7068c9ec1ab8355d863d7e8107d5d5706) Merged-In: I8f25d7a5e47890a0496af023149717e1df482f98 Change-Id: I8f25d7a5e47890a0496af023149717e1df482f98
2023-09-11Use type safe API of readParcelableArraykumarashishg
Bug: 291299076 Test: Build and flash the device and check if it throws exception for non UsbInterface object Test: atest CtsUsbManagerTestCases (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:85d7e6712a9eeeed3bdd68ea3c3862c7e88bfe70) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7d8ed27e2e1214aa615065b28f4fef0f1c350e44) Merged-In: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503 Change-Id: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
2023-09-11[DO NOT MERGE] Check caller's uid in backupAgentCreated callbackPiyush Mehrotra
AM.backupAgentCreated() should enforce that caller belongs the package called in the API. Bug: 289549315 Test: atest android.security.cts.ActivityManagerTest#testActivityManager_backupAgentCreated_rejectIfCallerUidNotEqualsPackageUid (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:ff4b0f29e5bcaea805fd5106c8f6353cdc92123d) Merged-In: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d Change-Id: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
2023-09-08Adjust max length of broadcast name to 32xiaowang
CRs-Fixed: 3574613 Change-Id: I922c62b620ba80fdbac8237c3d440c552b4b945a
2023-09-08Add the limitaion for broadcast nameSongFerngWang
The framework's limitaion is 0-254, and add it for broadcast name Bug: 278507301 Test: build pass and atest MediaOutputBroadcastDialogTest CRs-Fixed: 3574613 Change-Id: I3e6673a1200b208bc726e8537daa97b49be7c351 (cherry picked from commit cd4e8304aa0a33613be6a37222926d77aa902c39)
2023-09-07Merge tag 'LA.QSSI.13.0.r1-11300.01-qssi.0' into tachibana-mr1alk3pInjection
LA.QSSI.13.0.r1-11300.01-qssi.0 Change-Id: Ia12a1170bfd054f140895ef29379c29a1ead6d05
2023-09-06Merge 62d727255ece4cf02d762e13223b6081bc5d5bdd on remote branchLinux Build Service Account
Change-Id: Ib71d6ff389201c8ca52498533b3ad7e33668aa47
2023-09-06Snap for 10765946 from 247eb56192c7fb40c72db6e1f8c38e9b854c2ea3 to ↵Android Build Coastguard Worker
t-keystone-qcom-release Change-Id: I1989e7e1c0ad5fb2b9ca724ceb92e1cb5e32c033