Age | Commit message (Collapse) | Author |
|
"LA.QSSI.13.0.r1-12100-qssi.0"
Change-Id: I92cc197481dc008fcff3feb153c913e6fe6d2511
|
|
Change-Id: I2acb180d4f23a24ff1d77063079e8e388094e288
|
|
t-keystone-qcom-release
Change-Id: Ic300ab20f9809395b7090340d9fe3c91f2b5b71b
|
|
t-keystone-qcom-dev
|
|
Change-Id: I4ee6cf66d888a36495e03f9730bd2d1e988cdacf
|
|
t-keystone-qcom-release
Change-Id: I56769c20005b0bd2392353c9ec2a6b91cb351fad
|
|
Change-Id: I241cadfeb0b29071157021472348c87abcc80af5
|
|
CRs-Fixed: 3622453
Change-Id: Ia3799ea1a6452de81ab621997c8f708284e75bf7
|
|
"LA.QSSI.13.0.r1-11900-qssi.0"
Change-Id: If9766b97a69298bf205fcd375d01ee746035d61c
|
|
Change-Id: Ibb39226c504a4b7de509da9b3b58adf015af2984
|
|
t-keystone-qcom-release
Change-Id: I22b93cb12345a80c542b3a00c60a6f8405350a6b
|
|
04a8c299d1
Change-Id: I130617af96c29140073ad1c4f50776e2bf888f9a
|
|
"LA.QSSI.13.0.r1-11700-qssi.0"
Change-Id: I09c2644918adf810041ad17f6ff4931d1a604bdf
|
|
t-keystone-qcom-release
Change-Id: I85ce26e0f2b76a8f208516d85dededd9ccc6dc0d
|
|
|
|
t-keystone-qcom-release
Change-Id: I1f25c651dde84a38e493c59fd7f8186f1fd8da7c
|
|
Change-Id: Iaa44c2f349f3752ea59a5c9fddcd6eb51a34a865
CRs-Fixed: 3625614
|
|
"am-85c4a9df-3d07-46e2-b1d3-682cf5f55b26" into t-keystone-qcom-dev
* changes:
[LeAudio] Enable regex dotall mode for Metadata
[LE Audio] To fix the QR Code parse error
|
|
Change-Id: I67d3e092803919f4489db780d06e89e9ab1b49aa
|
|
|
|
Change-Id: I77a77b16cc90cfd4ecd10f816209ee5d3fe3cd2c
|
|
Change-Id: If2daa33c371c119920f82cc6b4c3edabcf235273
|
|
Add below permission to intent ACTION_REMOTE_ISSUE_OCCURRED
RequiresBluetoothConnectPermission
RequiresPermission(android.Manifest.permission.BLUETOOTH_CONNECT)
CRs-Fixed: 3581934
Change-Id: I6331b99555240b7d86a316b4c26165ac61fdb34d
|
|
into tm-platform-release.
Change-Id: I4cd2c89bd183a9ba1c34cfd4beccd6e0d8f617ff
|
|
When a new view becomes visible on the screen, the view notifies
AutofillManager about its visibility. AutofillManager then requests the
activity to compile an AssistStructure object which will contain the
view hierarchy of the activity as well as texts contained inside all the
views. If there are Span text fields that contain custom implementation of ClickableSpan, these spans are also copied over during the construction of the AssistStructure. By keeping the references to the ClickableSpan, it causes memory leak when the AssistStructure object outlives the activity.
Test: atest CtsAutoFillServiceTestCases, atest CtsAssistTestCases, atest android.widget.cts.TextViewTest
Bug: 146100180
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e42d05e3d01f4c3b8aa7bce29086cd968970b4ec)
Merged-In: I1fd97d9d6fdc569d14529347fcb85da409c3c1ff
Change-Id: I1fd97d9d6fdc569d14529347fcb85da409c3c1ff
|
|
"LA.QSSI.13.0.r1-11500.01-qssi.0"
Change-Id: Ib07379bca7348e0d497fabec6bb128c3b4e043b6
|
|
If the variable opVolt is 0.0 in the method updateWifiState,
the local variable monitoredRailChargeConsumedMaMs may be computed
to a large value. The logic here should be the same as the method
noteModemControlllerActivity. The variable opVolt being 0.0 should
be avoided as a divisor.
Bug: N/A
Test: Manual
Change-Id: I95ce75b960bace4c37acea89062cb21aab21aa30
|
|
E BatteryExternalStatsWorker: Error updating external stats:
E BatteryExternalStatsWorker: java.lang.ArithmeticException: divide by zero
E BatteryExternalStatsWorker: at com.android.internal.os.BatteryStatsImpl.noteModemControllerActivity(BatteryStatsImpl.java:13748)
E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker.updateExternalStatsLocked(BatteryExternalStatsWorker.java:756)
E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker.-$$Nest$mupdateExternalStatsLocked(Unknown Source:0)
E BatteryExternalStatsWorker: at com.android.server.am.BatteryExternalStatsWorker$1.run(BatteryExternalStatsWorker.java:470)
Change-Id: Ic13273965732e6eba5d33d0aa229b216da58af02
Signed-off-by: minaripenguin <minaripenguin@users.noreply.github.com>
|
|
which appears to be some kind of useless debugging stuff
Change-Id: I34f21a85ff4b556912774b053100b80dd1488879
|
|
Change-Id: Iba0495d2394b5cc77770bee28e3a24c4930b64a0
|
|
Change-Id: I5e22a590b0f1f0e9a678d45d06bb262021cf84bb
|
|
E AndroidRuntime: FATAL EXCEPTION: main
E AndroidRuntime: Process: com.android.systemui, PID: 1487
E AndroidRuntime: java.lang.NullPointerException: Attempt to read from field 'boolean com.android.systemui.statusbar.connectivity.IconState.visible' on a null object reference in method 'void com.android.systemui.qs.tiles.CastTile$1.setWifiIndicators(com.android.systemui.statusbar.connectivity.WifiIndicators)'
E AndroidRuntime: at com.android.systemui.qs.tiles.CastTile$1.setWifiIndicators(CastTile.java:31)
E AndroidRuntime: at com.android.wm.shell.bubbles.Bubble$$ExternalSyntheticLambda1.run(R8$$SyntheticClass:138)
E AndroidRuntime: at android.os.Handler.handleCallback(Handler.java:942)
E AndroidRuntime: at android.os.Handler.dispatchMessage(Handler.java:99)
E AndroidRuntime: at android.os.Looper.loopOnce(Looper.java:201)
E AndroidRuntime: at android.os.Looper.loop(Looper.java:288)
E AndroidRuntime: at android.app.ActivityThread.main(ActivityThread.java:7964)
E AndroidRuntime: at java.lang.reflect.Method.invoke(Native Method)
E AndroidRuntime: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
E AndroidRuntime: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:942)
Change-Id: I98b83b4d18f5d842ff3063b8ddba5c9f38f76b23
|
|
Reason for revert: broken beyond fix
This reverts the following commits:
7a15c15 "gmscompat: Make CTS/Play Integrity pass again"
c6f3d56 "keystore: Block key attestation for SafetyNet"
555e3a9 "Limit SafetyNet workarounds to unstable GMS process"
51c0024 "Spoof build fingerprint for Google Play Services"
Change-Id: Id683fd971dee2c7f0219cb5bcbac3c80822eccb6
|
|
t-keystone-qcom-release
Change-Id: I46284d23b632c94e50efcc8be6f9533b6a979af8
|
|
'googleplex-android-review.googlesource.com/24323876', 'googleplex-android-review.googlesource.com/24309522', 'googleplex-android-review.googlesource.com/24424817'] into sc-v2-platform-release.
Change-Id: I451b0ef73882988b23a5a14fa13c3a7359182ce9
|
|
Similar to ag/24422287, but the same URI verification should be done in
SettingsProvider as well, which can be called by apps via
Settings.System API or ContentProvider APIs without using
RingtoneManager.
BUG: 227201030
Test: manual with a test app. Will add a CTS test.
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1b234678ec122994ccbfc52ac48aafdad7fdb1ed)
Merged-In: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
Change-Id: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
|
|
Bug: 291299076
Test: Build and flash the device and check if it throws exception for
non UsbInterface object
Test: atest CtsUsbManagerTestCases
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:85d7e6712a9eeeed3bdd68ea3c3862c7e88bfe70)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7491a49b633e4eaa4f01d9b12ea4bce15b8dce00)
Merged-In: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
Change-Id: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
|
|
AM.backupAgentCreated() should enforce that caller belongs the package called in the API.
Bug: 289549315
Test: atest android.security.cts.ActivityManagerTest#testActivityManager_backupAgentCreated_rejectIfCallerUidNotEqualsPackageUid
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:4a82aa857eb738d3334a896dac525abf3b32c5bf)
Merged-In: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
Change-Id: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
|
|
We stripped the token that allows app to retrieve their own notification
and fire their own PI to launch activities from background. But we
forgot to strip the token from notification.publicVersion
Bug: 278558814
Test: NotificationManagerTest#testActivityStartFromRetrievedNotification_isBlocked
(cherry picked from commit cf851d81a954f0a6dd0c2fd7defa93932539e7f9)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8d839e4985d0acc662e1019390c88fab20bacbd6)
Merged-In: I8f25d7a5e47890a0496af023149717e1df482f98
Change-Id: I8f25d7a5e47890a0496af023149717e1df482f98
|
|
'googleplex-android-review.googlesource.com/24309523', 'googleplex-android-review.googlesource.com/23982977', 'googleplex-android-review.googlesource.com/24424817', 'googleplex-android-review.googlesource.com/24270064'] into tm-platform-release.
Change-Id: Ibaa389ceee6768b5dda0761a4ace74469f4fcd92
|
|
Currently the full user (e.g. userId 0) is required to enter device
credential (e.g. device PIN/pattern/password) to unlock the device in
certain cases as specified by StrongAuthFlags (e.g. the user has
triggered lockdown). After successfully verify the device credential,
StrongAuthFlags for the full user will be set back to
STRONG_AUTH_NOT_REQUIRED. This may or may not clear StrongAuthFlags for
a profile of the user, depending on whether the profile has a separate
or unified lock.
Case #1: the profile has a seprate lock. In this case, the user will
need to enter the device credential on lockscreen to unlock the device,
and then enter the different profile lock to unlock the profile.
StrongAuthFlags for the profile will only be cleared after successfully
verifying the profile lock.
Case #2: the profile has a unified lock. Currently in this case,
StrongAuthFlags for the profile doesn't get cleared properly after the
user verifies the device credential on lockscreen and unpauses the
profile. For example, if the user triggers lockdown and later enters the
device credential to unlock the device, StrongAuthFlags for the full
user gets cleared (so the full user exits lockdown) while
StrongAuthFlags for the profile doesn't get cleared (so the profile
remains in lockdown), and thus notifications for the profile won't be
shown properly.
This CL fixes the issue above for the case #2. The user will only need
to enter the device credential on lockscreen once to unlock the device.
If the profile is already unpaused, at this point StrongAuthFlags
should already be cleared; otherwise, StrongAuthFlags will be cleared
after the user unpauses the profile (but without having to enter any
lock again since the profile uses a unified lock).
Test: (1) Set up a profile (e.g. a managed profile) with a unified lock.
(2) Trigger the lockdown mode on lockscreen, and verify that
StrongAuthFlags for the full user and the profile are both set
properly, via "adb shell dumpsys lock_settings".
(3) Enter the device credential on lockscreen for the full user,
and verify that StrongAuthFlags for the full user is unset.
StrongAuthFlags for the profile should also be cleared at this
point if the profile was unpaused already before lockdown;
otherwise
(4) Unpause the profile and verify that StrongAuthFlags for the
profile is cleared.
Fix: 176924824
Bug: 173721373
(cherry picked from commit ea925cf0b1293ddece4a77f8cce60196ee27f146)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:498867921e79a3809a7cfbbbcf3efc2a1e8eb8eb)
Merged-In: Ic466fc22a5be9047d39194ad42c56dc4a2acb4dc
Change-Id: Ic466fc22a5be9047d39194ad42c56dc4a2acb4dc
|
|
Similar to ag/24422287, but the same URI verification should be done in
SettingsProvider as well, which can be called by apps via
Settings.System API or ContentProvider APIs without using
RingtoneManager.
BUG: 227201030
Test: manual with a test app. Will add a CTS test.
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1b234678ec122994ccbfc52ac48aafdad7fdb1ed)
Merged-In: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
Change-Id: Ic0ffa1db14b5660d02880b632a7f2ad9e6e5d84b
|
|
We stripped the token that allows app to retrieve their own notification
and fire their own PI to launch activities from background. But we
forgot to strip the token from notification.publicVersion
Bug: 278558814
Test: NotificationManagerTest#testActivityStartFromRetrievedNotification_isBlocked
(cherry picked from commit cf851d81a954f0a6dd0c2fd7defa93932539e7f9)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1896c2e7068c9ec1ab8355d863d7e8107d5d5706)
Merged-In: I8f25d7a5e47890a0496af023149717e1df482f98
Change-Id: I8f25d7a5e47890a0496af023149717e1df482f98
|
|
Bug: 291299076
Test: Build and flash the device and check if it throws exception for
non UsbInterface object
Test: atest CtsUsbManagerTestCases
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:85d7e6712a9eeeed3bdd68ea3c3862c7e88bfe70)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7d8ed27e2e1214aa615065b28f4fef0f1c350e44)
Merged-In: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
Change-Id: I2917c8331b6d56caaa9a6479bcd9a2d089f5f503
|
|
AM.backupAgentCreated() should enforce that caller belongs the package called in the API.
Bug: 289549315
Test: atest android.security.cts.ActivityManagerTest#testActivityManager_backupAgentCreated_rejectIfCallerUidNotEqualsPackageUid
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:ff4b0f29e5bcaea805fd5106c8f6353cdc92123d)
Merged-In: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
Change-Id: I9f3ae5ec0b8f00e020d471cc0eddf8bd8bdbb82d
|
|
CRs-Fixed: 3574613
Change-Id: I922c62b620ba80fdbac8237c3d440c552b4b945a
|
|
The framework's limitaion is 0-254, and add it for broadcast name
Bug: 278507301
Test: build pass and atest MediaOutputBroadcastDialogTest
CRs-Fixed: 3574613
Change-Id: I3e6673a1200b208bc726e8537daa97b49be7c351
(cherry picked from commit cd4e8304aa0a33613be6a37222926d77aa902c39)
|
|
LA.QSSI.13.0.r1-11300.01-qssi.0
Change-Id: Ia12a1170bfd054f140895ef29379c29a1ead6d05
|
|
Change-Id: Ib71d6ff389201c8ca52498533b3ad7e33668aa47
|
|
t-keystone-qcom-release
Change-Id: I1989e7e1c0ad5fb2b9ca724ceb92e1cb5e32c033
|