forked from aosp-mirror/platform_frameworks_base
-
-
Notifications
You must be signed in to change notification settings - Fork 29
Feature/secondarycallblocking #191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
dev114a
wants to merge
392
commits into
GrapheneOS:15-qpr2
Choose a base branch
from
dev114a:feature/secondarycallblocking
base: 15-qpr2
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Feature/secondarycallblocking #191
dev114a
wants to merge
392
commits into
GrapheneOS:15-qpr2
from
dev114a:feature/secondarycallblocking
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This is needed for properly verifying updates of system packages.
versionCode of many system packages, including privileged ones, is set to the current SDK version and is thus not incremented during non-major OS upgrades. This allowed to downgrade them to the older version that had the same versionCode.
Change-Id: I5ccc4d61e52ac11ef33f44618d0e610089885b87 Squashed with: Author: Daniel Micay <[email protected]> Date: Wed Mar 15 06:32:20 2023 -0400 simplify removal of SUPL IMSI / phone number This is not required for SUPL to work and the comment about Google is unnecessary.
Adds a global data structure that is accessible by privileged installers and allows them to avoid installing the same package at the same time.
Applies to device PIN, SIM PIN and SIM PUK input screens.
This setting disables animations in keyguard PIN input UI.
This allows apps that have minor dependency on GmsCore (such as Pixel Camera) to work without having GmsCore installed.
Depends on commit: "don't crash apps that depend on missing Gservices provider"
- isolate EuiccGoogle from all non-system package via AppsFilter, which stops it from sending data to Google through GmsCore. EuiccGoogle doesn't send data to Google directly - keep EuiccGoogle disabled by default, but do not disable it after each reboot - remove a misleading "device information will be sent to Google" message that appears before eSIM download
Google's LPA that is shipped on GrapheneOS handles requesting the Camera permission at runtime, which allows the user to give it a one-time grant.
Android Auto requires this broadcast to be sent to complete its initialization.
Build.getSerial() is protected with the very broad READ_PRIVILEGED_PHONE_STATE permission. Android Auto needs Build.getSerial() in some cases, but doesn't need most of the other privileges that READ_PRIVILEGED_PHONE_STATE grants.
Originally authored by Danny Lin <[email protected]> for inclusion in GrapheneOS. It has since been substantially extended and partially rewritten by Dmitry Muhomor <[email protected]> (primarily) and Daniel Micay <[email protected]>. Commit history: (better viewed with git log --grep gmscompat $TAG_NAME) November 2024 - February 2025: https://github.com/GrapheneOS/platform_frameworks_base/commits/2025021100 August 2024 - November 2024: https://github.com/GrapheneOS/platform_frameworks_base/commits/2024112700 June 2024 - August 2024: https://github.com/GrapheneOS/platform_frameworks_base/commits/2024083100 March 2024 - June 2024: https://github.com/GrapheneOS/platform_frameworks_base/commits/2024053100 November 2023 - March 2024: https://github.com/GrapheneOS/platform_frameworks_base/commits/2024030300 August 2023 - November 2023: https://github.com/GrapheneOS/platform_frameworks_base/commits/2023112900 May 2023 - August 2023: https://github.com/GrapheneOS/platform_frameworks_base/commits/2023080800 February 2023 - May 2023: https://github.com/GrapheneOS/platform_frameworks_base/commits/TQ2A.230505.002.2023052900 August 2022 - February 2023: https://github.com/GrapheneOS/platform_frameworks_base/commits/TQ1A.230205.002.2023020600 June 2022 - August 2022: https://github.com/GrapheneOS/platform_frameworks_base/commits/SP2A.220505.006.2022073000 October 2021 - June 2022: https://github.com/GrapheneOS/platform_frameworks_base/commits/SP2A.220505.002.2022053100 July 2021 - October 2021: https://github.com/GrapheneOS/platform_frameworks_base/commits/RQ3A.211001.001.2021100606
…user is starting" This reverts commit a608e0c.
This reverts commit 8a5e90a.
…ked or stopping" This reverts commit 17e6883.
Bug: 370477460 Test: atest CtsAutoFillServiceTestCases:android.autofillservice.cts.inline.InlineLoginMixedCredentialActivityTest (cherry picked from commit 571a97a) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e61320b6fcca1b6f0fe60078cc27fcc844a63f12) Merged-In: I35f3cf616669a6879fd353876029152e3ce327f1 Change-Id: I35f3cf616669a6879fd353876029152e3ce327f1
Zero-initialize mData in CursorWindow::create(). The caller might not fully fill that buffer before sending it to the remote end. It is not necessary to zero-initialize in CursorWindow::createFromParcel(), since the buffer is immediately filled from the far end. Flag: EXEMPT bug-fix Bug: 309407957 Test: atest * libandroidfw_tests * FrameworksCoreTests:android.database * CtsDatabaseTestCases (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:9dc64621d896d05fcb0e6f45792a307fde130823) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:ae4b644a7cfb66f1e51ade508f115aec63bc16ef) Merged-In: I755240b0e3ba185c01036a5e00c8785d2e1ac11a Change-Id: I755240b0e3ba185c01036a5e00c8785d2e1ac11a
Fixes: 383080440 Test: Used test app to verify drawable frros still work Flag: EXEMPT bugfix (cherry picked from commit 12e49e7) DISABLE_TOPIC_PROTECTOR (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:2de1592713696d56d160b14959ddf1fadfa256bf) Merged-In: I4247e54f3ea0d9e4bf0d9f404e0272751a258ba2 Change-Id: I4247e54f3ea0d9e4bf0d9f404e0272751a258ba2
Also, use writeString8 for Zen-related parceling. Bug: 387498139 Test: atest NotificationManagerZenTest ZenModeConfigTest Flag: EXEMPT Serialization change with good test coverage (cherry picked from commit 3965123) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:067a8e500c707ab94d2268f9f4c84f9443143e98) Merged-In: I9925c9bcc542781832d111660e22181151526127 Change-Id: I9925c9bcc542781832d111660e22181151526127
…Transport. Bug: 388828203 Flag: EXEMPT security fix Test: atest LocationProviderTest (cherry picked from commit 225602a) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:53cf3399f5691aab020d44efff5dd01eaf16257b) Merged-In: I7251bb506f94194d8ab7cef0a5fbda195ef6341a Change-Id: I7251bb506f94194d8ab7cef0a5fbda195ef6341a
With this fix, a service which returns null in onBind() will no longer stay bound by system_server and will no longer be able to launch activities from the background. Bug: 386950836 Test: Follow steps in the bug to reproduce the issue; observe that BAL is no longer allowed. Test: atest android.security.cts.Bug_386950836 Flag: EXEMPT security bugfix (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7f0deb11e0be050b65ec8e321e9ff48750dc1326) Merged-In: Id04111b061881d23346aa90a0b5d08a28bed2c6f Change-Id: Id04111b061881d23346aa90a0b5d08a28bed2c6f
Bug: 303227969 Test: atest CtsBlobStoreTestCases Flag: EXEMPT security fix (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:aaa1cb20b89f3389f9fbc362a397770c8052e7fb) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:509d619b2f9a52c5f3a88dbaa85b9bc7f66deaea) Merged-In: I67ae28b6bc896d57abcb45ef586595bd8aa81346 Change-Id: I67ae28b6bc896d57abcb45ef586595bd8aa81346
Don't construct a random class just because you were asked to. Bug: 373467684 Test: atest PackageParsingPerfTest Flag: EXEMPT bugfix (cherry picked from commit 65c1a90) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:cfd0ded301a5848b9b2caedb44878ae6ff0a7456) Merged-In: I328eca7b8de1eab637e3991adeb2e1d147c30268 Change-Id: I328eca7b8de1eab637e3991adeb2e1d147c30268
Adding DISALLOW_BLOCK_CALLS to new secondary users
Adding new restriction DISALLOW_BLOCK_CALLS to UserRestrictionsUtils.java
Adding new restriction DISALLOW_BLOCK_CALLS to userManager
Update current.txt with new permission
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Creating new permission to create a toggle for allowing / disallowing the ability to block calls