Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
353 commits
Select commit Hold shift + click to select a range
09cde79
DeviceIdleJobsController: don't ignore whitelisted system apps
muhomorr Jul 7, 2022
05535c5
do not allow disabling app visibility filtering
muhomorr Apr 6, 2023
df21e16
add hooks for modifying PackageManagerService behavior
muhomorr Mar 27, 2023
a82c143
rename AppsFilterImpl.grantImplicitAccess method
muhomorr Apr 30, 2024
e930b68
add hooks for modifying ActivityThread behavior
muhomorr Aug 18, 2023
df713ce
add helper class for launching non-standard Settings intents
muhomorr Nov 15, 2023
3a40476
AppBindArgs: infrastructure for passing extra args to app process init
muhomorr May 16, 2023
235b120
infrastructure for custom handling of known packages
muhomorr Dec 20, 2023
81ce227
SettingsProvider: add support for further restriction of setting access
muhomorr Mar 28, 2025
310dd40
gosps: support for per-app GrapheneOS-specific persistent state
muhomorr Jul 31, 2022
6a745ec
extend excludedMethods list in AndroidPackageTest
muhomorr Jun 2, 2024
8cc2124
add method for updating cached package permission state
muhomorr Dec 18, 2023
2155880
PackageHooks: infrastructure for per-package hooks in system_server
muhomorr Dec 18, 2023
e347ae0
add base class for complex per-app switches
muhomorr Sep 24, 2023
99abaef
SettingsLib: add CategoryKey for Exploit protection screen
muhomorr Jul 30, 2024
48a6de7
infrastructure for spoofing self permission checks
muhomorr Jul 31, 2022
6ddafb5
infrastructure for special runtime permissions
muhomorr Feb 9, 2023
3bddda9
add special runtime permission for other sensors
muhomorr Feb 9, 2023
fd52324
notify the user when sensors access is denied by OTHER_SENSORS perm
muhomorr Oct 4, 2022
6f5f1ff
make INTERNET into a special runtime permission
thestinger Mar 17, 2019
9f5dbf1
improve compatibility of INTERNET special runtime permission
muhomorr Jul 31, 2022
5c86f08
don't run jobs that need connectivity in apps that lack INTERNET perm
muhomorr May 19, 2023
f8a7b71
PackageInstallerUI: an option to skip auto-grant of INTERNET permission
muhomorr Oct 7, 2022
52a5cef
use permanent fingerprint lockout immediately
thestinger Sep 12, 2017
db18cfe
add system property for disabling keyguard camera
thestinger Jul 25, 2017
82344bd
add auto-reboot feature
muhomorr Jan 13, 2024
be219e2
infrastructure for the Storage Scopes feature
muhomorr Jul 31, 2022
6374174
sscopes: temp: disable incomplete handling of READ_MEDIA_VISUAL_USER_…
muhomorr Oct 5, 2023
893c965
control access to Android/obb directory with a GosPackageState flag
muhomorr Jul 31, 2022
c8f8d8a
ErrorDialogController: do not auto-dismiss crash dialogs
muhomorr Oct 1, 2023
45f714d
fix ANR details link not working in profiles and in secondary users
muhomorr Nov 1, 2024
4dfabdf
include path of ANR stack traces file in ApplicationErrorReport
muhomorr Oct 7, 2024
ce1de15
don't block reading ANR stack traces file via Unix file permissions
muhomorr Oct 8, 2024
e1dd423
add option to view application error details in LogViewer app
muhomorr Aug 8, 2022
9a48eda
Set always-on and lockdown on by default on first vpn connection at s…
quh4gko8 Aug 1, 2022
83cca11
pre-grant POST_NOTIFICATIONS to more system apps
muhomorr Aug 22, 2022
5c92e53
allow privileged installer to search for packages across all users
muhomorr Nov 23, 2022
951cc9f
extend original-package renaming to provider authorities for Vanadium
muhomorr Nov 5, 2022
4ff4f62
extend original-package renaming to static launcher shortcuts
muhomorr Nov 23, 2022
9572e15
bugfix: properly acquire package state from original package
quh4gko8 Mar 13, 2024
cdec16e
disable package parser cache
muhomorr Jan 30, 2023
e8ef356
perform additional boot-time checks on system package updates
muhomorr Jan 31, 2023
6c54003
allow out-of-band package updates to use original-package system
muhomorr Jan 27, 2023
ec3847a
require fs-verity when installing system package updates
muhomorr Jan 31, 2023
92db0a5
don't allow updating system packages to the same versionCode
muhomorr Dec 27, 2022
712c208
allow privileged installers to use getSharedLibraries(MATCH_ANY_USER)
muhomorr Mar 30, 2024
fa13ad4
allow only first party app source and shell to update system packages
muhomorr May 2, 2024
8866fd5
Remove build fingerprint from screenshot EXIF
x86pup Apr 29, 2022
bc434e4
add toggle for screenshot timestamp EXIF metadata
x86pup Feb 18, 2023
9c9cc8a
SUPL: Don't send IMSI / Phone number to SUPL server
MSe1969 Oct 29, 2018
8a500a6
add GNSS SUPL setting
muhomorr Mar 3, 2023
9478d27
allow privileged installers to maintain a global list of busy packages
muhomorr Mar 4, 2023
fd16c53
add option to scramble PIN layout
muhomorr Feb 24, 2023
69c22d8
enable LOCK_PIN_ENHANCED_PRIVACY setting by default
muhomorr Jun 14, 2023
8c05605
don't crash apps that depend on missing Gservices provider
muhomorr Mar 26, 2023
e8cde9b
integrate Google's EuiccSupportPixel package
muhomorr Mar 27, 2023
dc79769
integrate Google's eUICC LPA package (EuiccGoogle)
muhomorr May 30, 2023
df72026
do not auto-grant Camera permission to the eUICC LPA UI app
muhomorr Mar 19, 2023
ef84669
add a method for sending BOOT_COMPLETED broadcast to a specific package
muhomorr Dec 23, 2023
48be5e8
define READ_DEVICE_SERIAL_NUMBER permission for Build.getSerial() access
muhomorr Dec 18, 2023
c7270ec
aauto: define a restricted version of the MANAGE_USB permission
muhomorr Dec 18, 2023
49e2e33
aauto: add definition of restricted BLUETOOTH_PRIVILEGED permission
muhomorr Dec 18, 2023
d05bfec
aauto: add definition of restricted WIFI_PRIVILEGED permission
muhomorr Dec 18, 2023
30d2d52
aauto: add definition of restricted READ_PRIVILEGED_PHONE_STATE permi…
muhomorr Dec 25, 2023
f1cdf5c
adjust definition of TelecomManager.getUserSelectedOutgoingPhoneAccou…
muhomorr Dec 25, 2023
519152d
aauto: support using aauto USB accessory activity as a default activity
muhomorr Dec 20, 2023
0ff256d
aauto: define ASSOCIATE_COMPANION_DEVICES_RESTRICTED permission
muhomorr Dec 18, 2023
abd83d5
aauto: support allowing association with "automotive projection" devices
muhomorr Dec 18, 2023
9cb5c94
add BinderWrapper
muhomorr Jan 17, 2025
bad4865
gmscompat: add compatibility layer for unprivileged GMS
thestinger Jun 6, 2023
c5b929e
require vendor camera extensions package to be a system app by default
muhomorr Mar 30, 2023
f2c4f8c
add config for Pixel Camera Services
muhomorr Jan 9, 2024
56b7d64
infrastructure for creating per-package seinfo overrides
muhomorr Mar 30, 2023
103408e
support denying special access to hardware accelerators by Google apps
muhomorr Apr 6, 2023
706ffe3
add GNSS PSDS setting
muhomorr May 2, 2023
d9a7c1f
support redirecting ContentProvider calls to another provider
muhomorr May 16, 2023
8bc25e7
infrastructure for the Contact Scopes feature
muhomorr May 16, 2023
a419342
add connectivity checks setting and its migration from Settings.Global
muhomorr May 25, 2023
3712e31
Wi-Fi auto turn off
muhomorr Jul 31, 2022
30f4cad
Bluetooth auto turn off
muhomorr Jul 31, 2022
224b975
add support for hooking LocationManager methods
muhomorr Jun 19, 2023
277802d
improve compat with apps that try to access network location provider
muhomorr Jun 19, 2023
667c0ac
add RemoteKeyProvisioning server override setting
muhomorr Aug 10, 2023
3a1206d
don't skip AOT compilation of apps that weren't recently used
muhomorr Nov 14, 2022
0c7d745
do not delete compiled code (OAT files) of hibernated apps
muhomorr Oct 11, 2023
606ddcb
disable OtaDexoptService
muhomorr Oct 23, 2023
0cb2e59
add notification-based UI for the background dexopt job
muhomorr Oct 23, 2023
d1670ba
infrastructure for per-package dex2oat compiler filter overrides
muhomorr Oct 31, 2023
def3130
always use speed dex2oat compiler filter for VPN service packages
muhomorr Nov 1, 2023
3fe431c
add helper class for notifications that link AppSwitch UI
muhomorr Nov 8, 2023
7893a2c
infrastructure for passing extra args to Zygote and WebViewZygote
muhomorr Sep 23, 2023
22dcc6f
infrastructure for passing SELinux flags to the kernel
muhomorr Sep 24, 2023
eddc547
add per-app setting for hardened_malloc and extended VA space
muhomorr Sep 26, 2023
2bfe48e
always stop app zygotes when app is being force-stopped
muhomorr Nov 8, 2023
aea7b70
add per-app native debugging setting
muhomorr Sep 26, 2023
6159f04
add system API for getting app info by PID
muhomorr Nov 8, 2023
4348756
infrastructure for handling callbacks from logd to system_server
muhomorr Nov 8, 2023
5d4a282
infrastructure for showing notifications about SELinux TSEC_FLAG denials
muhomorr Nov 15, 2023
69b7d2e
show notification after app is blocked from accessing ptrace
muhomorr Nov 19, 2023
29bb579
fix rate limiting for non-app tombstones
muhomorr Nov 8, 2023
b89ca6d
DropBoxManager: fix TreeSet API contract violations
muhomorr Dec 23, 2023
76143a4
fix an upstream race condition in handling of system error files
muhomorr Oct 7, 2024
9c0e6f0
DropBox: skip spurious system_server_crash entries
muhomorr Jan 15, 2024
dbf0f2c
DropBox: skip fsck.f2fs results that don't contain errors
muhomorr Jan 16, 2024
f324d3b
notify the user about notable system journal entries
muhomorr Nov 8, 2023
7dda49e
support for per-app dynamic code loading restrictions
muhomorr Sep 26, 2023
f8d2a87
add test for SELinux flags-based per-app hardening features
muhomorr Sep 20, 2023
dcce7b4
add per-app memory tagging setting
muhomorr Nov 5, 2023
56ef533
Widevine provisioning setting
maade93791 Sep 29, 2023
62ed04b
hide from Aurora Store packages that it's not allowed to update
muhomorr Jan 15, 2024
e298136
run full explicit GC in SystemUI and system_server after locking
thestinger Feb 2, 2024
cc08cb3
add UsbManager API for configuring USB port security state
muhomorr Feb 23, 2024
7e22c6b
add setting for USB port security state
muhomorr Feb 23, 2024
8ee5a09
Do not use filter calling uid parameter originally intended for insta…
quh4gko8 Nov 3, 2023
8ddac8a
Disallow the camera shortcut toggle from the lockscreen
neelchauhan May 28, 2024
c6acc78
disable support for adoptable storage
muhomorr May 29, 2024
16efd42
add a helper class for wiping eUICCs
muhomorr May 29, 2024
19f8ead
extend the upstream wipe-without-reboot implementation
muhomorr Jun 1, 2024
c6ea576
add duress password feature
muhomorr May 29, 2024
1d8fd7c
add lock_settings shell commands for testing the duress password feature
muhomorr May 30, 2024
7020d61
add lock_settings shell command option for printing executed Weaver ops
muhomorr Jun 1, 2024
7748119
add a test for the duress password feature
muhomorr May 29, 2024
a51457f
fix ApplicationInfo flag initialization being skipped in some cases
muhomorr Jun 13, 2024
ec8857a
stub out reads of hidden system settings in Google's text-to-speech app
muhomorr Jul 1, 2024
14f8bea
make Google's text-to-speech app force-queryable
muhomorr Nov 25, 2024
f41b77f
show a deprecation warning dialog on each launch of a 32-bit app
muhomorr Jul 6, 2024
d8b561a
better 32-bit deprecation warning
thestinger Jul 7, 2024
9ef061a
fix touch-to-unlock on Google devices with side fingerprint scanner
muhomorr Jul 16, 2024
2a8b198
add setting for alternative touchscreen mode
muhomorr Jun 19, 2024
0f7d140
don't report some android.hardware.bluetooth-service.bcmbtlinux crashes
muhomorr Aug 5, 2024
f8336df
don't report harmless fingerprint-service.goodix crash
muhomorr Nov 15, 2024
703e903
sysconfig: support enabling association restrictions without exemptions
muhomorr Aug 29, 2024
90c60eb
add config for Pixel Health app
muhomorr Aug 26, 2024
167b28c
new PermissionService: implement shouldBlockGrantRuntimePermission()
muhomorr Aug 10, 2024
9d657ce
new PermissionService: implement updatePermissions()
muhomorr Aug 10, 2024
e2ddb8f
new PermissionService: implement PackageHooks support
muhomorr Aug 10, 2024
9245f85
new PermissionService: support for special runtime permissions
muhomorr Aug 11, 2024
399a820
temp: unconditionally enable system crash notifications
muhomorr Jun 3, 2024
3b1b206
Revert "temp: unconditionally enable system crash notifications"
thestinger Jun 13, 2024
7131644
ignore factory reset protection (FRP)
muhomorr Oct 16, 2024
21bd15d
fix check for the current holder of the Wallet app role
muhomorr Oct 19, 2024
56f6635
disable memory tagging for Pixel Camera Services
muhomorr Oct 20, 2024
df21123
don't remove app widgets from user's home screen when the user stops
muhomorr Oct 22, 2024
b249677
raise backup transport timeout
thestinger Oct 23, 2024
b3ef9c0
add utility class for obtaining and keeping track of Binder caller info
muhomorr Nov 4, 2024
b470658
fix handling of MATCH_ARCHIVED_PACKAGES flag in getPackageUidInternal()
muhomorr Nov 4, 2024
83f715f
delay activation of the Allow button in USB ADB confirmation dialog
muhomorr Dec 5, 2024
5d6b012
FusedLocation: remove racy and redundant lazy init in Service.onBind()
muhomorr Dec 4, 2024
7097293
never remove location providers at runtime
muhomorr Dec 4, 2024
b668469
disable safe media volume management
muhomorr Dec 11, 2024
6efc9d8
add battery charge limit setting
muhomorr Dec 29, 2024
f70a2ea
SystemUI: add support for battery charge limit feature
muhomorr Dec 29, 2024
426164a
add dev option to log Java binder transaction
muhomorr Dec 28, 2024
d71ed87
prevent recycling user IDs
u-fred Dec 21, 2024
4487eb7
add LockDomain
u-fred Dec 21, 2024
72408b1
add second factor to DevicePolicyManagerService
u-fred Dec 21, 2024
e7d9427
add second factor to LockSettingsService
u-fred Dec 21, 2024
18c6e69
add second factor to LockSettingsStateListener
u-fred Dec 21, 2024
7d1ac9a
add second factor to AdaptiveAuthService
u-fred Dec 21, 2024
7eec4ac
add second factor to TrustManagerService
u-fred Dec 21, 2024
03adac7
add biometric keyguard settings to LPU
u-fred Dec 21, 2024
706459a
improve upstream LPU#isCredentialSharableWithParent
u-fred Dec 21, 2024
c4b8505
add second factor to LockPattern classes
u-fred Dec 21, 2024
e4b4b89
add BiometricAuthTokenStore
u-fred Dec 21, 2024
fec3a28
add second factor to FingerprintService
u-fred Dec 21, 2024
1009163
add second factor UI
u-fred Dec 21, 2024
edcfaa8
throw Exception to notify of SceneContainerFlag
u-fred Dec 21, 2024
934e76e
prevent face auth in KUM
u-fred Dec 21, 2024
6743bea
fix upstream fingerprint mode change bug
u-fred Dec 21, 2024
6a13bec
append "Safe" to risky upstream method names
u-fred Dec 22, 2024
38023bf
add second factor to fingerprint unlock
u-fred Dec 21, 2024
362319b
fix feature check in DPMS.getPasswordMinimumMetricsUnchecked()
muhomorr Dec 25, 2024
e78e2b8
fix collision check in SyntheticPasswordManager.generateProtectorId()
muhomorr Dec 25, 2024
74fee51
SystemUI: don't skip fingerprint auth success haptic when 2FA is on
muhomorr Jan 3, 2025
f0f8eee
add workaround for SSM.newTargetUser() system_server crash
muhomorr Jan 6, 2025
46deffe
add workaround for updateWifiBatteryStats() system_server crash
muhomorr Jan 6, 2025
e93681d
don't break boot of debug OS build on permission allowlist violations
muhomorr Jan 7, 2025
d45481d
opt-out TunerSettings from edge-to-edge
thestinger Jan 9, 2025
41d8bf1
protect against upstream bugs bypassing 2FA
thestinger Jan 14, 2025
13dea6f
fix serious upstream lockscreen animation bug
thestinger Jan 14, 2025
0567feb
unconditionally show KASAN kernel crash notifications
muhomorr Jan 16, 2025
dc52eaa
disable wake lock based on 2+ screen undims
thestinger Jan 21, 2025
16f2a5e
zygote: don't reload android.os.Build after applying appcompat sysprops
muhomorr Jan 24, 2025
a57babb
enable appcompat sysprop overrides for user-installed apps
muhomorr Jan 24, 2025
09cde8b
don't delay setting observer callbacks for background system packages
muhomorr Feb 1, 2025
70e2210
add network location setting
soupslurpr Nov 5, 2024
7ea82ff
add network location provider to config_locationProviderPackageNames
soupslurpr Dec 24, 2024
996b59f
gosps: allow cross-user-profile read permission to PermissionController
muhomorr Feb 26, 2025
9bad375
FusedLocation: don't attempt to flush inactive providers
muhomorr Feb 28, 2025
723d8c0
exclude Network Location from location indicator
thestinger Feb 28, 2025
bbcea9f
gmscompat: skip location settings check activity when rerouting is on
muhomorr Mar 2, 2025
a0f3d70
disable HttpEngine preloading for exec spawning
muhomorr Mar 5, 2025
8229e80
gosps: fix parseFlag(), which is used by automated tests
muhomorr Mar 6, 2025
cc3255b
gmscompat: fix Play Services for AR being non-installable
Feb 19, 2025
870ed45
gmscompat: fix dev option for installing Pixel Health app
muhomorr Mar 7, 2025
fc718ac
Fix an NPE when a user is added and then removed quickly
Dec 11, 2024
d193f4c
JobConcurrencyManager: fix the NPE problem.
Dec 2, 2024
7c8ad16
ContentRecorder: fix the NPE problem.
Dec 9, 2024
710aed6
Fix the NPE problem.
Nov 27, 2024
1c51879
RecentTasks:fix NPE problem to avoid system_server process crash.
Dec 16, 2024
0485cdf
ContentRecorder: fix NPE problem to avoid crash when start recording.
Dec 17, 2024
56e8f90
CameraStateMonitor:fix the potential NPE problem.
Dec 17, 2024
7c5c4c6
ScreenRecordingCallbackController: fix NPE problem.
Dec 18, 2024
d295102
FadeOutManager: the NPE problem due to add null value to SparseArray.
Dec 16, 2024
4dc5ea3
TaskDisplayArea: fix NPE problem.
Dec 26, 2024
a4b40bd
Fix NPE problem to avoid systemserver process crash.
Feb 19, 2025
9e6415d
Use local var method to avoid NPE in multithread suition.
Jan 20, 2025
e28ee41
Transition: fix NPE problem.
Jan 6, 2025
6eef687
[Bugfix]Fix NPE for PackageInstallerSession
Feb 20, 2025
0f996f9
Fix array index out of bounds exception problem.
Feb 27, 2025
c00c773
AudioService: fix voice volume adjustments
Feb 27, 2025
44513a4
Revert "SystemUI: make screenshot sound use touch sounds setting"
muhomorr Mar 8, 2025
267b671
SystemUI: make screenshot sound use sound effects setting
muhomorr Mar 8, 2025
e2ede04
gmscompat: don't call Binder.getCallingUid() in RPC mode
muhomorr Mar 9, 2025
a6dcd7b
exempt Terminal app from WebView DCL restrictions
muhomorr Mar 9, 2025
2573b91
SystemUI: Fix constraints for keyguard slice view
luk1337 Dec 28, 2024
cac3df9
SystemUI: Don't remove keyguard slice view
luk1337 Dec 28, 2024
0586913
SystemUI: Fix burn-in translations not applying to keyguard slices
AndyCGYan Jan 18, 2025
4a12c5a
disable config_keyguardUserSwitcher on tablet devices
muhomorr Mar 9, 2025
d0a08ec
Revert "gmscompat: skip location settings check activity when rerouti…
muhomorr Mar 13, 2025
bedba8a
config: enable desktop mode support
muhomorr Mar 15, 2025
b9f0b61
SystemUI: improve alignment between keyguard clock and date
muhomorr Mar 18, 2025
e2a24fa
SystemUI: fix keyguard media section placement when split shade is used
muhomorr Mar 18, 2025
7113cca
SystemUI: fix orientation of keyguard slice view rows
muhomorr Mar 20, 2025
9276791
SystemUI: don't hide date text on lockscreen when media is playing
muhomorr Mar 20, 2025
74bd306
SystemUI: add keyguard slice view to split shade layout
muhomorr Mar 20, 2025
4ad19ff
gmscompat: improve support for overriding Gservices flags
muhomorr Mar 20, 2025
1cc0c69
gmscompat: improve support for overriding phenotype flags
muhomorr Mar 21, 2025
51a58c7
gmscompat: remove unused valueSupplier support in GmsFlag class
muhomorr Mar 21, 2025
730bf7b
gmscompat: remove no longer needed hooks for phenotype flag overrides
muhomorr Mar 21, 2025
1627df0
gmscompat: fix flag overrides not being applied in some cases
muhomorr Mar 21, 2025
f1fe22b
bp1f: update Build.VERSION_CODES.BAKLAVA
muhomorr Mar 23, 2025
c8144b7
SystemUI: fix a screenshot process crash in ScrollCaptureController
muhomorr Mar 25, 2025
ec4389a
Revert "don't allow to install APEXes"
muhomorr Mar 23, 2025
bde5758
don't allow to install APEXes on user builds
muhomorr Mar 23, 2025
eae31c0
fix NPE system_server crash in F2fsUtils.getFilesRecursive()
muhomorr Mar 28, 2025
111c1b9
don't allow enabling the instant apps feature
muhomorr Mar 30, 2025
c091d24
don't allow enabling the "add users when locked" setting
muhomorr Mar 30, 2025
7b498cf
gmscompat: Remove STATS_MANAGER from hidden system services
quh4gko8 Apr 2, 2025
ee90b3b
fix upstream RecoverySystem.verifyPackage vulnerability
thestinger Apr 9, 2025
61f8dab
Avoid auto-granting special permissions to unarchived apps
chenxiaolong Apr 16, 2025
80ad81a
Section for adding non-runtime permissions downstream
quh4gko8 Dec 15, 2024
2c63e8d
Add permission definition to read additional security state
quh4gko8 Dec 18, 2024
871ddcb
Extend getting security state bundle to include downstream configurat…
quh4gko8 Dec 16, 2024
935ddb5
RemoteViews - Always load new ApplicationInfo from PackageManager.
zc-android Jan 17, 2025
a3c5baa
Allow core uids to register receiver as "android".
Mar 4, 2025
a3fb2ff
Revert "Allow core uids to register receiver as "android"."
thestinger May 6, 2025
c0c2721
Make UserSwitchObserver.onBeforeUserSwitching oneway but still blocking.
Jan 2, 2025
758ae79
Always disable pinning apps in PinnerService
quh4gko8 Mar 27, 2025
2361696
Remove configs for pinning apps in PinnerService
quh4gko8 Mar 28, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
1 change: 1 addition & 0 deletions Android.bp
Original file line number Diff line number Diff line change
Expand Up @@ -247,6 +247,7 @@ java_library {
"android.hardware.usb-V1.0-java-constants",
"android.hardware.usb-V1.1-java-constants",
"android.hardware.usb-V1.2-java-constants",
"android.hardware.usb.ext-V1-java",
"android.hardware.usb.gadget-V1-java",
"android.hardware.usb.gadget-V1.0-java",
"android.hardware.usb.gadget-V1.1-java",
Expand Down
12 changes: 12 additions & 0 deletions apex/jobscheduler/framework/java/android/app/AlarmManager.java
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@
import android.annotation.SystemApi;
import android.annotation.SystemService;
import android.annotation.TestApi;
import android.app.compat.gms.GmsCompat;
import android.compat.annotation.ChangeId;
import android.compat.annotation.EnabledSince;
import android.compat.annotation.UnsupportedAppUsage;
Expand Down Expand Up @@ -1049,6 +1050,17 @@ private void setImpl(@AlarmType int type, long triggerAtMillis, long windowMilli
long intervalMillis, int flags, PendingIntent operation, final OnAlarmListener listener,
String listenerTag, Executor targetExecutor, WorkSource workSource,
AlarmClockInfo alarmClock) {
if (GmsCompat.isEnabled()) {
if (windowMillis == WINDOW_EXACT && !canScheduleExactAlarms()) {
windowMillis = WINDOW_HEURISTIC;
}
// non-null WorkSource requires privileged UPDATE_DEVICE_STATS permission
workSource = null;

// requires privileged SCHEDULE_PRIORITIZED_ALARM permission
flags &= ~FLAG_PRIORITIZE;
}

if (triggerAtMillis < 0) {
/* NOTYET
if (mAlwaysExact) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,8 +30,11 @@
import android.annotation.SystemApi;
import android.annotation.SystemService;
import android.annotation.UserHandleAware;
import android.app.compat.gms.GmsCompat;
import android.content.Context;

import com.android.internal.gmscompat.GmsCompatApp;

import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.util.Collections;
Expand Down Expand Up @@ -626,6 +629,11 @@ public void removeFromPermanentAllowList(@NonNull String packageName) {
@RequiresPermission(android.Manifest.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST)
public void addToTemporaryAllowList(@NonNull String packageName, @ReasonCode int reasonCode,
@Nullable String reason, long durationMs) {
if (GmsCompat.isEnabled()) {
GmsCompatApp.raisePackageToForeground(packageName, durationMs, reason, reasonCode);
return;
}

try {
mService.addPowerSaveTempWhitelistApp(packageName, durationMs, mContext.getUserId(),
reasonCode, reason);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ void addPowerSaveTempWhitelistAppDirect(int uid, long duration,

boolean isAppOnWhitelist(int appid);

int[] getPowerSaveWhitelistUserAppIds();
int[] getPowerSaveWhitelistAppIds();

int[] getPowerSaveTempWhitelistAppIds();

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2389,14 +2389,14 @@ public String[] getFullPowerWhitelistExceptIdle() {
}

/**
* Returns the array of app ids whitelisted by user. Take care not to
* Returns the array of whitelisted app ids. Take care not to
* modify this, as it is a reference to the original copy. But the reference
* can change when the list changes, so it needs to be re-acquired when
* {@link PowerManager#ACTION_POWER_SAVE_WHITELIST_CHANGED} is sent.
*/
@Override
public int[] getPowerSaveWhitelistUserAppIds() {
return DeviceIdleController.this.getPowerSaveWhitelistUserAppIds();
public int[] getPowerSaveWhitelistAppIds() {
return DeviceIdleController.this.getAppIdWhitelistInternal();
}

@Override
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1034,7 +1034,7 @@ void determineAssignmentsLocked(final ArraySet<ContextAssignment> changed,
for (int p = preferredUidOnly.size() - 1; p >= 0; --p) {
final ContextAssignment assignment = preferredUidOnly.get(p);
final JobStatus runningJob = assignment.context.getRunningJobLocked();
if (runningJob.getUid() != nextPending.getUid()) {
if (runningJob == null || runningJob.getUid() != nextPending.getUid()) {
continue;
}
final int jobBias = mService.evaluateJobBiasLocked(runningJob);
Expand Down Expand Up @@ -1916,8 +1916,9 @@ boolean executeStopCommandLocked(PrintWriter pw, String pkgName, int userId,
for (int i = 0; i < mActiveServices.size(); i++) {
final JobServiceContext jc = mActiveServices.get(i);
final JobStatus js = jc.getRunningJobLocked();
if (jc.stopIfExecutingLocked(pkgName, userId, namespace, matchJobId, jobId,
stopReason, internalStopReason)) {
if (js != null &&
jc.stopIfExecutingLocked(pkgName, userId, namespace,
matchJobId, jobId, stopReason, internalStopReason)) {
foundSome = true;
pw.print("Stopping job: ");
js.printUniqueId(pw);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ public void onReceive(Context context, Intent intent) {
case PowerManager.ACTION_POWER_SAVE_WHITELIST_CHANGED:
synchronized (mLock) {
mDeviceIdleWhitelistAppIds =
mLocalDeviceIdleController.getPowerSaveWhitelistUserAppIds();
mLocalDeviceIdleController.getPowerSaveWhitelistAppIds();
if (DEBUG) {
Slog.d(TAG, "Got whitelist "
+ Arrays.toString(mDeviceIdleWhitelistAppIds));
Expand Down Expand Up @@ -133,7 +133,7 @@ public DeviceIdleJobsController(JobSchedulerService service) {
mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
mLocalDeviceIdleController =
LocalServices.getService(DeviceIdleInternal.class);
mDeviceIdleWhitelistAppIds = mLocalDeviceIdleController.getPowerSaveWhitelistUserAppIds();
mDeviceIdleWhitelistAppIds = mLocalDeviceIdleController.getPowerSaveWhitelistAppIds();
mPowerSaveTempWhitelistAppIds =
mLocalDeviceIdleController.getPowerSaveTempWhitelistAppIds();
mDeviceIdleUpdateFunctor = new DeviceIdleUpdateFunctor();
Expand Down Expand Up @@ -194,7 +194,7 @@ public void setUidActiveLocked(int uid, boolean active) {
}

/**
* Checks if the given job's scheduling app id exists in the device idle user whitelist.
* Checks if the given job's scheduling app id exists in the device idle whitelist.
*/
boolean isWhitelistedLocked(JobStatus job) {
return Arrays.binarySearch(mDeviceIdleWhitelistAppIds,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@
import android.app.job.UserVisibleJobSummary;
import android.content.ClipData;
import android.content.ComponentName;
import android.content.Context;
import android.net.Network;
import android.net.NetworkRequest;
import android.net.Uri;
Expand Down Expand Up @@ -2501,6 +2502,23 @@ private boolean isConstraintsSatisfied(int satisfiedConstraints) {
return true;
}

if ((mRequiredConstraintsOfInterest & CONSTRAINT_CONNECTIVITY) != 0) {
if ((satisfiedConstraints & CONSTRAINT_CONNECTIVITY) != 0) {
var pmi = LocalServices.getService(
com.android.server.pm.permission.PermissionManagerServiceInternal.class);

if (pmi.checkUidPermission(getSourceUid(), android.Manifest.permission.INTERNET, Context.DEVICE_ID_DEFAULT) !=
android.content.pm.PackageManager.PERMISSION_GRANTED) {
if (DEBUG) {
Slog.d(TAG, "skipping job " + getJobId() + " for " + getSourcePackageName()
+ " in user " + getSourceUserId() + ": it has CONSTRAINT_CONNECTIVITY, "
+ "but its UID doesn't have the INTERNET permission");
}
return false;
}
}
}

int sat = satisfiedConstraints;
if (overrideState == OVERRIDE_SOFT) {
// override: pretend all 'soft' requirements are satisfied
Expand Down
6 changes: 4 additions & 2 deletions cmds/app_process/app_main.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -85,8 +85,10 @@ class AppRuntime : public AndroidRuntime
AndroidRuntime* ar = AndroidRuntime::getRuntime();
ar->callMain(mClassName, mClass, mArgs);

IPCThreadState::self()->stopProcess();
hardware::IPCThreadState::self()->stopProcess();
if (mClassName != "com.android.internal.os.ExecInit") {
IPCThreadState::self()->stopProcess();
hardware::IPCThreadState::self()->stopProcess();
}
}

virtual void onZygoteInit()
Expand Down
9 changes: 6 additions & 3 deletions core/api/current.txt
Original file line number Diff line number Diff line change
Expand Up @@ -234,6 +234,7 @@ package android {
field public static final String NFC = "android.permission.NFC";
field public static final String NFC_PREFERRED_PAYMENT_INFO = "android.permission.NFC_PREFERRED_PAYMENT_INFO";
field public static final String NFC_TRANSACTION_EVENT = "android.permission.NFC_TRANSACTION_EVENT";
field public static final String OTHER_SENSORS = "android.permission.OTHER_SENSORS";
field public static final String OVERRIDE_WIFI_CONFIG = "android.permission.OVERRIDE_WIFI_CONFIG";
field public static final String PACKAGE_USAGE_STATS = "android.permission.PACKAGE_USAGE_STATS";
field @Deprecated public static final String PERSISTENT_ACTIVITY = "android.permission.PERSISTENT_ACTIVITY";
Expand Down Expand Up @@ -353,7 +354,9 @@ package android {
field public static final String LOCATION = "android.permission-group.LOCATION";
field public static final String MICROPHONE = "android.permission-group.MICROPHONE";
field public static final String NEARBY_DEVICES = "android.permission-group.NEARBY_DEVICES";
field public static final String NETWORK = "android.permission-group.NETWORK";
field public static final String NOTIFICATIONS = "android.permission-group.NOTIFICATIONS";
field public static final String OTHER_SENSORS = "android.permission-group.OTHER_SENSORS";
field public static final String PHONE = "android.permission-group.PHONE";
field public static final String READ_MEDIA_AURAL = "android.permission-group.READ_MEDIA_AURAL";
field public static final String READ_MEDIA_VISUAL = "android.permission-group.READ_MEDIA_VISUAL";
Expand Down Expand Up @@ -33416,7 +33419,7 @@ package android.os {

public static class Build.VERSION_CODES {
ctor public Build.VERSION_CODES();
field @FlaggedApi("android.sdk.major_minor_versioning_scheme") public static final int BAKLAVA = 10000; // 0x2710
field @FlaggedApi("android.sdk.major_minor_versioning_scheme") public static final int BAKLAVA = 36; // 0x24
field public static final int BASE = 1; // 0x1
field public static final int BASE_1_1 = 2; // 0x2
field public static final int CUPCAKE = 3; // 0x3
Expand Down Expand Up @@ -33456,7 +33459,7 @@ package android.os {
}

@FlaggedApi("android.sdk.major_minor_versioning_scheme") public static class Build.VERSION_CODES_FULL {
field public static final int BAKLAVA = 1000000000; // 0x3b9aca00
field public static final int BAKLAVA = 3600000; // 0x36ee80
field public static final int BASE = 100000; // 0x186a0
field public static final int BASE_1_1 = 200000; // 0x30d40
field public static final int CUPCAKE = 300000; // 0x493e0
Expand Down Expand Up @@ -44421,7 +44424,7 @@ package android.telecom {
method public android.telecom.PhoneAccountHandle getSimCallManager();
method @Nullable public android.telecom.PhoneAccountHandle getSimCallManagerForSubscription(int);
method @Nullable public String getSystemDialerPackage();
method @Nullable @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) public android.telecom.PhoneAccountHandle getUserSelectedOutgoingPhoneAccount();
method @Nullable @RequiresPermission(anyOf={"android.permission.READ_PRIVILEGED_PHONE_STATE", "android.permission.READ_PRIVILEGED_PHONE_STATE_ANDROID_AUTO"}) public android.telecom.PhoneAccountHandle getUserSelectedOutgoingPhoneAccount();
method @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) public String getVoiceMailNumber(android.telecom.PhoneAccountHandle);
method @RequiresPermission(android.Manifest.permission.MODIFY_PHONE_STATE) public boolean handleMmi(String);
method @RequiresPermission(android.Manifest.permission.MODIFY_PHONE_STATE) public boolean handleMmi(String, android.telecom.PhoneAccountHandle);
Expand Down
37 changes: 37 additions & 0 deletions core/api/module-lib-current.txt
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,20 @@ package android.app.admin {

}

package android.app.compat.gms {

public class GmsModuleHooks {
method @Nullable public static String deviceConfigGetProperty(@NonNull String, @NonNull String);
method public static boolean deviceConfigSetProperties(@NonNull android.provider.DeviceConfig.Properties);
method public static boolean deviceConfigSetProperty(@NonNull String, @NonNull String, @Nullable String);
method @Nullable public static Boolean enableBluetoothAdapter();
method public static void enableNfc();
method public static boolean interceptSynchronousResultReceiverException(@NonNull RuntimeException);
method public static void makeBluetoothAdapterDiscoverable();
}

}

package android.content {

public abstract class ContentProvider implements android.content.ComponentCallbacks2 {
Expand Down Expand Up @@ -154,6 +168,29 @@ package android.content.pm {

}

package android.ext.settings {

public class ConnChecksSetting {
method public static int get();
method public static boolean put(int);
field public static final int VAL_DEFAULT = 0; // 0x0
field public static final int VAL_DISABLED = 2; // 0x2
field public static final int VAL_GRAPHENEOS = 0; // 0x0
field public static final int VAL_STANDARD = 1; // 0x1
}

public class RemoteKeyProvisioningSettings {
method @Nullable public static String getServerUrlOverride(@NonNull android.content.Context);
field public static final int GRAPHENEOS_PROXY = 0; // 0x0
field public static final int STANDARD_SERVER = 1; // 0x1
}

public class WidevineProvisioningSettings {
method @Nullable public static String getServerHostnameOverride(@NonNull android.content.Context);
}

}

package android.hardware.usb {

public class UsbManager {
Expand Down
Loading