Commit Graph

11687 Commits

Author SHA1 Message Date
Svetoslav Ganov
2cfc752278 Merge "Report permission flags for all protections based on SDK am: adb8c522a8 am: fc862c9f86" into oc-dr1-dev-plus-aosp am: bccc7625ec
am: bd0cf0ab06

Change-Id: I5bdb9b5d5ff91652a2bd4395bc4f7f783e25eb66
2017-07-28 17:27:57 +00:00
Svetoslav Ganov
bd0cf0ab06 Merge "Report permission flags for all protections based on SDK am: adb8c522a8 am: fc862c9f86" into oc-dr1-dev-plus-aosp
am: bccc7625ec

Change-Id: Idf1e289d5e70246433e5eccf286026b48e57282f
2017-07-28 17:06:59 +00:00
Svetoslav Ganov
70ec94fd12 Report permission flags for all protections based on SDK am: adb8c522a8
am: fc862c9f86

Change-Id: Ie08845d6e5afa8f75e1cc5392a1f5c2166d06d20
2017-07-28 16:54:06 +00:00
Svetoslav Ganov
fc862c9f86 Report permission flags for all protections based on SDK
am: adb8c522a8

Change-Id: I259df147b8345f6bdba5a1ed31d01d3c42e90518
2017-07-28 16:42:09 +00:00
Geoffrey Pitsch
84752fd7f2 Merge "Merge "Revert "Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev"" into oc-mr1-dev am: a6b8e4503e" into oc-mr1-dev-plus-aosp
am: 3697def242

Change-Id: I934d3681051d16a989278ba40316eb2f1ee23472
2017-07-28 15:44:26 +00:00
Svetoslav Ganov
adb8c522a8 Report permission flags for all protections based on SDK
We added a couple of protection flags that also apply to
normal and dangerous permissions. These flags are folded
in the protection level breaking apps that directly and
compare against the protection constants. Apps that target
older than O SDK don't get protection flags folded into
the protection level.

Test: All permission tests pass
      Added a new test to ensure no protection flags reported
      for normal and dangerous permissions

Change-Id: I87b10a7695d8ecfa7156525d6f3d101fc0639513
bug:62755026
2017-07-28 05:46:53 +00:00
Bart Sears
a65dd2515a Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6 am: 1a5a9be9ad am: 20c93bfe75
am: 6f1fa441be

Change-Id: I6f1fea5f5c0ede0fe3579f7419a3aee1af065900
2017-07-28 05:46:27 +00:00
Bart Sears
6f1fa441be Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6 am: 1a5a9be9ad
am: 20c93bfe75

Change-Id: Ie4791e7740eba35e0b171c11a424364a45358117
2017-07-28 05:36:17 +00:00
Bart Sears
20c93bfe75 Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6
am: 1a5a9be9ad

Change-Id: Iac6546b48308836b7a4bf41295a363032326d990
2017-07-28 05:26:30 +00:00
Bart Sears
1a5a9be9ad Revert "Report permission flags for all protections based on SDK"
am: 784b56e1e6

Change-Id: I80086249438fff193dc64d9c4d1a6b1468f8c4a1
2017-07-28 05:17:48 +00:00
Bart Sears
784b56e1e6 Revert "Report permission flags for all protections based on SDK"
This reverts commit 852cf98cb8.

Change-Id: I62763bf85ec95a02a245c6b503aa34bb0e9d997a
2017-07-28 05:05:38 +00:00
Svetoslav Ganov
c44bccd588 Merge "Report permission flags for all protections based on SDK am: 852cf98cb8 am: 3cf283558a am: 2dfbbb3aa4" into oc-mr1-dev-plus-aosp
am: df55e3ce42

Change-Id: Icaa464dc5f064605f555c3b9bb09b9443a2eb028
2017-07-28 03:40:41 +00:00
Svetoslav Ganov
2dfbbb3aa4 Report permission flags for all protections based on SDK am: 852cf98cb8
am: 3cf283558a

Change-Id: Iba5b20a777e4cf8953b73e523f25175d7b274a34
2017-07-28 03:03:51 +00:00
Svetoslav Ganov
31cab0e52f Report permission flags for all protections based on SDK am: 852cf98cb8
am: 3cf283558a

Change-Id: I09b1f8573c6e2103fa66ae56352173e64b5ed8b7
2017-07-28 02:58:37 +00:00
Svetoslav Ganov
3cf283558a Report permission flags for all protections based on SDK
am: 852cf98cb8

Change-Id: I6e87c8f40fa466f2a50f41549be41ea4fb598824
2017-07-28 02:49:30 +00:00
Svetoslav Ganov
546320e506 Report permission flags for all protections based on SDK
am: 852cf98cb8

Change-Id: Id83fa00277f6262139024eee46312bf18cd7b691
2017-07-28 02:48:37 +00:00
Svetoslav Ganov
852cf98cb8 Report permission flags for all protections based on SDK
We added a couple of protection flags that also apply to
normal and dangerous permissions. These flags are folded
in the protection level breaking apps that directly and
compare against the protection constants. Apps that target
older than O SDK don't get protection flags folded into
the protection level.

Test: All permission tests pass
      Added a new test to ensure no protection flags reproted
      for normal and dangerous permissions

bug:62755026

Change-Id: I72547b0146e6b6919803e33ff64b7208c4a255ad
2017-07-28 01:46:04 +00:00
Richard Coles
727e6a9d82 Merge "Improve ActivityManagerInternal.startIsolatedProcess." 2017-07-27 14:58:04 +00:00
Geoffrey Pitsch
76a3aa06dc Revert "Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev"
This reverts commit d691f1a200, reversing
changes made to d6a2ed194c.

Test: runtest systemui-notification
Fixes: 63920384
2017-07-26 15:07:34 -04:00
Geoffrey Pitsch
ed8e7dbee5 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev am: 0d5c1490ce am: b65450e135
am: 86a2f0bb74

Change-Id: I69289bcd1a7ce9c80e879f2488915c93c221bbd7
2017-07-26 16:50:58 +00:00
Geoffrey Pitsch
86a2f0bb74 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev am: 0d5c1490ce
am: b65450e135

Change-Id: I204c5d4080ceb4f87b2c3477f0eff4b7ee749eff
2017-07-26 16:30:46 +00:00
Geoffrey Pitsch
d691f1a200 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev
am: 0d5c1490ce

Change-Id: I130816097bc68d1978b035cb2cfb0a3c678f9291
2017-07-26 16:29:01 +00:00
Geoffrey Pitsch
b65450e135 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev
am: 0d5c1490ce

Change-Id: Iff93082f1d38becfc498fd7ba0d417ed88955c25
2017-07-26 14:39:17 +00:00
Geoffrey Pitsch
0d5c1490ce Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev 2017-07-26 14:31:23 +00:00
Geoffrey Pitsch
1556495e28 Remove ability to downgrade importance of existing channel.
Test: runtest systemui-notification
Bug: 63920384
Change-Id: Ic9f5c50c3d2a36ccd4ba9686dad1eb415b559215
2017-07-26 10:27:02 -04:00
Christine Franks
eb1c6cd633 Merge "Remove RetailDemoModeServiceInternal" into oc-mr1-dev am: cfb5d97c3f
am: a35b696054

Change-Id: I84e499f7bd6b2d5442f0cae5cfe0d6221f62bbbe
2017-07-26 03:43:04 +00:00
Christine Franks
e9e9fb257f Remove RetailDemoModeServiceInternal
Bug: 62712426
Test: make -j100
Change-Id: I0b852aef30a8cadcda08fcff1dcf861aac2a4d7e
2017-07-26 00:40:53 +00:00
Christine Franks
cb03504d21 Merge "DO NOT MERGE - Remove RetailDemoModeServiceInternal" into oc-dr1-dev
am: 4ac942f140

Change-Id: I3d09e6fe436ae1ced8f9ed88e919f1d9bb5e52db
2017-07-26 00:16:28 +00:00
Christine Franks
4ac942f140 Merge "DO NOT MERGE - Remove RetailDemoModeServiceInternal" into oc-dr1-dev 2017-07-26 00:07:14 +00:00
Christine Franks
f66a377785 DO NOT MERGE - Remove RetailDemoModeServiceInternal
Bug: 62712426
Test: make -j100
Change-Id: I0b852aef30a8cadcda08fcff1dcf861aac2a4d7e
2017-07-25 21:16:29 +00:00
Calin Juravle
7eb1eee0e3 Merge "Use the class loader context when optimizing secondary dex files" 2017-07-25 18:24:29 +00:00
Calin Juravle
3bec94d78b Use the class loader context when optimizing secondary dex files
Record the class loader context for secondary dex loads and pass it to
dexopt during compilation.

The class loader context is passed from libcore every time a
BaseDexClassLoader is created and its recorded in the package dex usage
file.

Note that the context may be:
- unknown: if the dex file was not use after the the upgrade and its
context was not yet updated
- unsupported: if any of the class loaders from the loading context is
unsupported (only PathClassLoader and DelegateLastClassLoader are
supported).
- variable: if it changes over time, form one run to another.

In all the above cases the old compilation behavior is preserved for
now.(i.e. the dex file with be compiled with SKIP_SHARED_LIBRARY_CHECK)

Bug: 38138251
Test: runtest -x
services/tests/servicestests/src/com/android/server/pm/dex/
      adb shell cmd package compile -f -m quicken ^Csecondary-dex
com.google.android.gms

Change-Id: I2486522fb811f9fc58a44b92642f43a41e7d5bac
2017-07-24 14:51:00 -07:00
TreeHugger Robot
70c72263ac Merge "Don't create WindowNode on windows with dettached view." into oc-mr1-dev 2017-07-24 20:21:15 +00:00
Torne (Richard Coles)
466cbe4bc1 Improve ActivityManagerInternal.startIsolatedProcess.
The processes created by ActivityManagerInternal.startIsolatedProcess
were not being tracked by ActivityManager after creation (other than to
handle crashes), but they still had ProcessRecords created for them.
This meant that if a second process was started with the same name, a
WTF would be triggered due to the old ProcessRecord still existing.

To resolve this, we change the way that these special isolated processes
start up: instead of directly executing the main() of the requested
class after forking, the process first runs ActivityThread as with
ordinary processes. When the process attaches to ActivityManagerService,
it is given the name and parameters of the entry point class to execute
instead of being given an ApplicationInfo to bind. We also reinstate the
previously-disabled process start timeout, since the process is now
expected to attach as normal.

This means that ActivityManagerService can observe the process's death
via Binder as usual and clean up the ProcessRecord, as well as making
this process less of a special case. To ensure the process is still
treated as important, we set a minimum OOM adjustment of
PERSISTENT_SERVICE_ADJ (which is accurate as the system server is
depending on the process even though it does not directly bind to it as
a service), and exclude processes of this type from being killed due to
being empty isolated processes. The process will exit voluntarily after
the entry point function returns instead.

Bug: 19061358
Test: Upgrade the current WebView implementation APK and check for WTFs
Change-Id: Ide4f89d308851bb591194a8d59e6d581e9d59b50
2017-07-24 14:29:50 -04:00
Selim Cinek
137123bdef Merge "Removing contents hidden string for public notifications" into oc-dr1-dev am: 8650c7c0f1
am: 001956c626

Change-Id: Ic1c65063fce8cea01b01569cba6181f4465cd88e
2017-07-23 13:04:49 +00:00
Selim Cinek
001956c626 Merge "Removing contents hidden string for public notifications" into oc-dr1-dev
am: 8650c7c0f1

Change-Id: I4dd8cfab340c595181f52659d552bc03f51818ec
2017-07-23 12:57:20 +00:00
Selim Cinek
3a82a4a0f2 Merge "Removing contents hidden string for public notifications" into oc-dr1-dev
am: 8650c7c0f1

Change-Id: I10d7ab191f47bf167a5be5e0d11d7698aae58cd1
2017-07-23 12:57:19 +00:00
TreeHugger Robot
8650c7c0f1 Merge "Removing contents hidden string for public notifications" into oc-dr1-dev 2017-07-23 12:51:43 +00:00
Andrii Kulian
d313469e28 DO NOT MERGE VirtualDisplay wrapper with input forwarding
New version of ActivityView that doesn't use expensive
ActivityContainer, but utilizes VirtualDisplays instead.

Creation of this view is only allowed for callers who have
android.Manifest.permission.INJECT_EVENTS permission.

Launching activities into this container is restricted by
the same rules that apply to launching on VirtualDisplays:
- Owner is allowed to launch its own activities.
- If activity that's being launched is not from the same
  app, then it must be embeddable and launcher must have
  permission to embed.

Bug: 63338670
Test: go/wm-smoke
Change-Id: Id9a25752367ebe8e59d2fc21c5d9de5cf597ea01
2017-07-21 13:14:37 -07:00
Andrii Kulian
94e82d9b0e DO NOT MERGE ActivityView be gone!
This hidden functionality is no longer support/needed since
we now have multi-window/display. A new view group class
will be added later that uses multi-window to support remaining
functionality of this class.

Test: go/wm-smoke
Change-Id: Ie2fa2de92841d33199da9988741905060dd1ddf4
2017-07-21 13:14:19 -07:00
Geoffrey Pitsch
3fe668a015 resolve merge conflicts of 180f4ee7f7 to master
Test: I solemnly swear I tested this conflict resolution.
Change-Id: Ic6a7751e75899c5faf32bb2b392fa623d6482e7b
2017-07-21 10:35:11 -04:00
Felipe Leme
5cfcb5cc94 Don't create WindowNode on windows with dettached view.
Test: manual verification
Fixes: 63788161

Change-Id: I1c193495753fc6f8b23bab602463d3b1234e325f
2017-07-20 15:06:56 -07:00
Selim Cinek
499c20f25d Removing contents hidden string for public notifications
We're now only showing the notification header instead of the
repetitive contents hidden string. On Aod, we're still showing
a string however, since without it, it looked too empty.

Test: manual, set sensitive setting on lockscreen, observe notifications
Change-Id: If2bb66b9b3b366715aa68087e5c35cf1cdff3693
Fixes: 63741232
2017-07-20 14:16:13 -07:00
Geoffrey Pitsch
07532c3f79 Allow apps to downgrade importance in createNotificationChannel
Only takes effect if the user has not changed any fields.
Some tangential cleanup of the test file:
 - Rename member variable "uid" to "mUid"
 - Use correct PKG instead of "test_pkg"
 - Some character limit fixes

Test: runtest systemui-notification
Fixes: 63755460
Change-Id: I3c2df0c03ec333f320ac7a0fe90792f1b0ef02ce
2017-07-20 12:45:30 -04:00
Andrii Kulian
8d5a505d6a Merge changes from topic 'activity_view_v2'
* changes:
  VirtualDisplay wrapper with input forwarding
  ActivityView be gone!
2017-07-20 15:48:26 +00:00
Geoffrey Pitsch
4158c7a215 Merge "Allow apps to downgrade importance in createNotificationChannel" into oc-dr1-dev
am: 3ca605e28c

Change-Id: Ic4e1a653f38cf9e93f8262e55865a907dfbd2c83
2017-07-20 15:41:14 +00:00
Geoffrey Pitsch
3ca605e28c Merge "Allow apps to downgrade importance in createNotificationChannel" into oc-dr1-dev 2017-07-20 15:33:41 +00:00
Selim Cinek
825719bb92 Merge "Reducing bitmap sizes in notifications" into oc-dr1-dev
am: 8ffa981686

Change-Id: I20fbb857570c0e7bb02659b9026b0800d5939bc2
2017-07-19 23:47:16 +00:00
Selim Cinek
8ffa981686 Merge "Reducing bitmap sizes in notifications" into oc-dr1-dev 2017-07-19 23:41:44 +00:00
Selim Cinek
4de4de3fa3 Merge "Reducing bitmap sizes in notifications" 2017-07-19 23:37:32 +00:00