Skip to content

Conversation

@gwolf2u
Copy link
Member

@gwolf2u gwolf2u commented Feb 1, 2026

No description provided.

lijilou and others added 30 commits December 14, 2025 10:35
In some cases,the getFadeOutVolumeShaperConfig method may return null value.

Test: OEM monkey test
Flag: EXEMPT bugfix
Bug: 384435132
Google: 3415680
Change-Id: Ie75934f9520d0747c3baeb82bbef48c9d3227660
the getActivity mehod of WindowContainer may be return null if no match activity find.

Test: OEM monkey test
Flag: EXEMPT bugfix
Bug: 384839854
Google: 3420560
Change-Id: I1916ccbd9783a4f8c65450797a587c8af57ec070
…happen.

Bug: none
Flag: EXEMPT minor optimization
Google: 3412242
Change-Id: Ic035870b886ac13a6c8c38ad484eec2840cc3165
Will toggle private DNS between off and last used mode
If no mode was selected will toggle to opportunistic

Shows the active mode in subtitle text as such:
Off for off
Automatic for opportunistic
and the hostname string for manual

Signed-off-by: Pranav Vashi <[email protected]>
Allows using the VPN's DNS instead of the set private DNS
Automatically restores the previous set mode

Signed-off-by: Pranav Vashi <[email protected]>
The getOrCreateRootHomeTask method  return value is Nullable ,so we should make NonNull judgment before use the return value.

Test: OEM monkey test
Flag: EXEMPT bugfix
Bug: 386025825
Google: 3433344
Change-Id: I7efc57e94a3cdaf1db27fb696a975e194e86d8a3
Bug:
dumpValidateUids[Proto]() could to be invoked while dispatchUidsChanged which might cause the following error
as mValidateUids (a SparseArray) is not thread safe
  *** FATAL EXCEPTION IN SYSTEM PROCESS: android.ui
  java.lang.ArrayIndexOutOfBoundsException: src.length=159 srcPos=124 dst.length=159 dstPos=125 length=-81
  at java.lang.System.arraycopy(Native Method)
  at com.android.internal.util.GrowingArrayUtils.insert(GrowingArrayUtils.java:135)
  at android.util.SparseArray.put(SparseArray.java:280)
  at com.android.server.am.ActiveUids.put(ActiveUids.java:48)
  at com.android.server.am.UidObserverController.dispatchUidsChanged(UidObserverController.java:294)
  at com.android.server.am.UidObserverController$$ExternalSyntheticLambda0.run(D8$$SyntheticClass:0)
  at android.os.Handler.handleCallback(Handler.java:959)
  at android.os.Handler.dispatchMessage(Handler.java:100)
  at android.os.Looper.loopOnce(Looper.java:249)
  at android.os.Looper.loop(Looper.java:337)
  at android.os.HandlerThread.run(HandlerThread.java:85)
  at com.android.server.ServiceThread.run(ServiceThread.java:46)
Test: Manual

Google: 3420561
Change-Id: I72e54ee165c8723349f90929608f386200dac99f
Signed-off-by: zhoutongyu <[email protected]>
 Install the renamed apk,use the new name to getPackageLPr may be null,so we should make a null judgment.

Test: monkey test
Flag: EXEMPT bugfix
Bug: 386727719
Google: 3433745
Change-Id: Ia41a401bceaa13889ea66f5e3e337b99e3e4b799
* Settings->System->Gestures->Prevent ringing

core: Remove `@SystemApi` annotation for VOLUME_HUSH_CYCLE.

  This addition should not be annotated with `@SystemApi` because it
  creates an addition that fails the API test in user builds

Signed-off-by: rituj <[email protected]>
Co-authored-by: Evan Anderson <[email protected]>
Change-Id: I334bd165e970665ac5300d387a0ea6745748d3ad
Signed-off-by: aswin7469 <[email protected]>
No top non finishing activity exist in task.

Test: monkey test
Flag: EXEMPT bugfix
Bug: 387957062
Google: 3438659
Change-Id: I58e3fd1bca3088b0f187d3a12994d3ceb6ed7553
Fixes build breakage from upstream LLVM change:
llvm/llvm-project@ffc7380

frameworks/base/libs/hwui/renderthread/HintSessionWrapper.h:101:41: error: implicit instantiation of undefined template 'std::shared_ptr<android::uirenderer::renderthread::HintSessionWrapper::HintSessionBinding>'
  101 |     std::shared_ptr<HintSessionBinding> mBinding;
      |                                         ^
prebuilts/clang/host/linux-x86/clang-dev/include/c++/v1/__fwd/memory.h:24:28: note: template is declared here
   24 | class _LIBCPP_TEMPLATE_VIS shared_ptr;
      |                            ^

Test: presubmit
Google: 3440745
Change-Id: Icc0f366c6f1e57aa9ede9fe4868f0a66dff2db94
The call chain: mRoot.anyTaskForId --> mTaskSupervisor.restoreRecentTaskLocked(need add global lock).

Bug: none
Flag: EXEMPT bugfix
Google: 3440746
Change-Id: I381e6af800f2c62f44879c13022f050b8a108eae
…pen.

Bug: none
Flag: EXEMPT minor optimization
Google: 3442220
Change-Id: Ie4d86cc88de765cdb42270de44fa61cfb04c88d2
Following internal discussions, this CL removes a rarely-occuring bug.

At latitudes -+90°, cos() is 0, leading to a division by zero.
This exception happens only if the device location (plus offset) is exactly at the North or South pole, so I assume it never happened in practice.

Change-Id: I6e91791e1b7e87ed88e48cff13a0af9b3a680908
Test: atest FrameworksMockingServicesTests:LocationFudgerTest
Bug: 388189593
Flag: EXEMPT Bug Fix
Currently, we are blocking on a lock which is not necessary if we have already cached the value. Chrome is seeing real-world pain from this - we have a background task that sits for a while in constructSplit (spinning up a large ClassLoader), and our main thread is blocking on this mLock for absolutely no purpose.

Google: 3382768
Change-Id: I9ddadde23ffd9e04988c8f1933d2c8652bc5f222
Problem: {
    1. When long press is performed on any image in an application which uses webview, a drag operation with null ClipData is initiated via startDragAndDrop API in View.java
    2. A drag operation with null ClipData is notified to the framework on Android WebView versions 131.x.x.x and later. Earlier webview versions do not notify such operations with null clipdata.
    3. This drag event is notified to all windows in Z-order via DragState#broadcastDragStartedLocked().
    4. Now in DragState#dragStartedLocked(), if any window has PRIVATE_FLAG_INTERCEPT_GLOBAL_DRAG_AND_DROP flag, there is a null pointer crash due to null ClipData. This exception is handled in the caller View.java
    5. While the long press is still held(drag is in progress) and performSurfacePlacement is called, the updateInputWindows() calls DragState#sendDragStartedIfNeededLocked() for all windows.
    6. Further in this flow, DragState#dragStartedLocked() is called and if any window has PRIVATE_FLAG_INTERCEPT_GLOBAL_DRAG_AND_DROP flag, a Null pointer crash due to null ClipData occurs.
    7. There is no catch block to handle this exception at the caller(system server itself) and the device reboots.
}

Solution: {
    1. When ClipData obtained in the drag operation is null and drag operation is in progress, do not notify DragState#dragStartedLocked() for any of windows to avoid this crash.
}

Google: 3446830
Change-Id: I2f8b9ce54b229254c4ac0c688099183818114093
Signed-off-by: Aditya Jadhav <[email protected]>
 This situation may happen by mistake when calling the setParent method and passing a null value.

Test: monkey test
Flag: EXEMPT bugfix
Bug: 388883786
Google: 3446630
Change-Id: I762d3aaaa7a4b2eac2784d1f578960c4348a5a9d
When opening and closing activities in Settings, a significant amount of
CPU time is spent looking up ArrayMap entries, as reported by simpleperf:

0.12%     /system/framework/arm64/boot-framework.oat                                                                                                android.util.ArrayMap.binarySearchHashes

ThemedResourceCache is responsible for a significant portion of the time
spent in ArrayMap lookups:

0.08%     0.08%  /system/framework/arm64/boot-framework.oat                                                                              android.util.ArrayMap.binarySearchHashes
       |
       -- android.util.ArrayMap.binarySearchHashes
          |
           --50.00%-- android.util.ArrayMap.indexOf
               |
               |--36.71%-- android.util.ArrayMap.get
               |    |--0.87%-- [hit in function]
               |    |
               |    |--9.64%-- android.content.res.ThemedResourceCache.getThemedLocked
               |    |          android.content.res.ThemedResourceCache.get
               |    |    |
               |    |    |--77.92%-- android.content.res.DrawableCache.getInstance
               |    |    |           android.content.res.ResourcesImpl.loadDrawable
               |    |    |           android.content.res.Resources.loadDrawable
               |    |    |           android.content.res.TypedArray.getDrawableForDensity
               |    |    |           android.content.res.Resources.getColor [DEDUPED]
               |    |    |    |
               |    |    |    |--62.94%-- android.view.View.<init>
               |    |    |    |    |
               |    |    |    |    |--64.58%-- android.view.ViewGroup.<init>
               |    |    |    |    |           android.widget.LinearLayout.<init>
               |    |    |    |    |           android.widget.LinearLayout.<init>
               |    |    |    |    |           art_quick_invoke_stub
               |    |    |    |    |           art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)
               |    |    |    |    |           art::InvokeConstructor(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::ObjPtr<art::mirror::Object>, _jobject*)
               |    |    |    |    |           art::Constructor_newInstance0(_JNIEnv*, _jobject*, _jobjectArray*)
               |    |    |    |    |           art_jni_trampoline
               |    |    |    |    |           java.lang.reflect.Constructor.newInstance
               |    |    |    |    |           android.view.LayoutInflater.createView
               |    |    |    |    |           com.android.internal.policy.PhoneLayoutInflater.onCreateView
               |    |    |    |    |           android.view.LayoutInflater.onCreateView
               |    |    |    |    |           android.view.LayoutInflater.onCreateView
               |    |    |    |    |           android.view.LayoutInflater.createViewFromTag
               |    |    |    |    |           android.view.LayoutInflater.inflate
               |    |    |    |    |           android.view.LayoutInflater.inflate
               |    |    |    |    |
               |    |    |    |     --35.42%-- android.widget.TextView.<init>
               |    |    |    |                android.widget.Button.<init>
               |    |    |    |                art_quick_invoke_stub
               |    |    |    |                art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)
               |    |    |    |                art::InvokeConstructor(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::ObjPtr<art::mirror::Object>, _jobject*)
               |    |    |    |                art::Constructor_newInstance0(_JNIEnv*, _jobject*, _jobjectArray*)
               |    |    |    |                art_jni_trampoline
               |    |    |    |                java.lang.reflect.Constructor.newInstance
               |    |    |    |                android.view.LayoutInflater.createView
               |    |    |    |                com.android.internal.policy.PhoneLayoutInflater.onCreateView
               |    |    |    |                android.view.LayoutInflater.onCreateView
               |    |    |    |                android.view.LayoutInflater.onCreateView
               |    |    |    |                android.view.LayoutInflater.createViewFromTag
               |    |    |    |                android.view.LayoutInflater.rInflate
               |    |    |    |                android.view.LayoutInflater.rInflate
               |    |    |    |                android.view.LayoutInflater.rInflate
               |    |    |    |                android.view.LayoutInflater.inflate
               |    |    |    |                android.view.LayoutInflater.inflate
               |    |    |    |                android.view.LayoutInflater.inflate
               |    |    |    |
               |    |    |     --37.06%-- com.android.internal.widget.ToolbarWidgetWrapper.<init>
               |    |    |
               |    |     --22.08%-- android.content.res.ConfigurationBoundResourceCache.get
               |    |                android.content.res.ConfigurationBoundResourceCache.getInstance
               |    |                android.content.res.ResourcesImpl.loadComplexColorFromName
               |    |                android.content.res.ResourcesImpl.loadColorStateList
               |    |                android.content.res.Resources.loadColorStateList
               |    |                android.content.res.TypedArray.getColorStateList
               |    |                android.widget.TextView.readTextAppearance
               |    |                android.widget.TextView.setTextAppearance
               |    |                android.widget.TextView.setTextAppearance
               |    |                android.widget.Toolbar.setTitle
               |    |                com.android.wifi.x.com.android.internal.util.StateMachine$SmHandler.handleMessage
               |    |                android.view.SurfaceControl.copyFrom

Empirical testing reveals that mThemedEntries usually contains around 14
entries, at which HashMap is 35% faster than ArrayMap for lookups and
54% faster [1] for insertions. The increased memory usage should be
negligible at this size, so we can safely convert the map to a HashMap
in order to improve performance in this hotpath.

[1] https://docs.google.com/spreadsheets/d/136UJS2yVlZyPx30KDNgj4AWldkp9xbzIcWkLFj9RGgk/edit

Test: simpleperf record -a; verify that ThemedResourceCache no longer
      appears under ArrayMap.binarySearchHashes
Change-Id: I39e1c4b03fe0e60f933f02e253d2d3c4a483146f
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/6195
Reviewed-by: Anay Wadhera <[email protected]>
Tested-by: Anay Wadhera <[email protected]>
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/7159
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/8668
Reviewed-by: Sourajit Karmakar <[email protected]>
Tested-by: Sourajit Karmakar <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
* reduce memory usage overhead

Signed-off-by: minaripenguin <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Test: Manual test
Bug:374925259

Change-Id: Ifbb20a003863b8e0f472c9fc6af69c419aa29253
Signed-off-by: yangjing24 <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Summary: Some framework components do not check
whether the system service being called is null or not
causing "FATAL EXCEPTION" in zygote system process.
Adding nullptr or NULL obj check before calling.

Test: m
flash the device
verify the zygote is running stable and not hitting
FATAL EXECEPTION.

Google: 3349287
Change-Id: Icd504fb529716ff0870d0d911b1cd8b356bf9bb7
Signed-off-by: Abdelrahman Daim <[email protected]>
Bug: none
Flag: EXEMPT minor optimization
Change-Id: I987f4cb7d84af0561d75b494549c7bc2868e0d0f
 The activities in the task may already be finishing. Then the task could be removed when performing the idle check.

Test: monkey test
Flag: EXEMPT bugfix
Bug: 388883786
Google: 3446630
Change-Id: I762d3aaaa7a4b2eac2784d1f578960c4348a5a9d
Can be useful in some cases.

Change-Id: I999337cc55e9675cedde35191a6438d90744e5aa
Signed-off-by: LibXZR <[email protected]>

Adapt to Android 13
Signed-off-by: someone5678 <[email protected]>
When AudioFlinger binder dies and AudioService receives
onError/onAudioServerDied callback but AudioPolicy service is alive,
we get INVALID_OPERATION error because mixes was already registered.
This causes calling release on AudioPolicyProxy.

Test: Manual
Bug: 380092408
Google: 3370477
Change-Id: I4e5c6e3d3aace03f02f312fda26e5696ac090d04
Merged-In: I17017c9da0a55fb860a9ad9d4a547b1c818b7fac
Google: 3439303
Change-Id: I9e323fba572ccf13b064c17999e0c47075375ad2
wenbo wang and others added 30 commits December 14, 2025 10:44
In the recent animation scene, we don't need to wait for the launcher to draw, we just need the wallpaper to finish drawing and start the animation.

Bug: 422656135
Test:Three key navigation and gesture swipe up to recent to test for any issues.
Change-Id: I9d9433434e334ee68cb5b2dd2cc182a584207c7f
Bug: 422656135

Test: Test with various foreground apps (fullscreen, heavy, custom animations) and return to the desktop
Change-Id: Idce70630688de74a27550bf5829d8d3e0e713b5f
Root Cause:
At the end of a scroll gesture, as the velocity drops, the per-frame distance approximation oscillates between 1 px and 0 px, resulting in visible jitter.

Solution:
During the scroll, if the computed distance for the next frame is 0 px, force it to 1 px to keep the animation continuous to  eliminate jitter.

Bug: 425738878

Test:scroll on the activity of app using ListView, observe whether exist jitter.
Change-Id: I1dae1283f9cd084db841c5f807376268eedc75b5
When restoring setting after audioserver crash
1. The setHdmiSystemAudioSupported doesn't setForceUse with SAM
because the setting value is equal to mHdmiSystemAudioSupported.
2. The SAD is stored in the AudioDescriptor, but AudioDescriptor
isn't pass to native layer.

Adjust logic to ensure that SAM and AudioDescriptor can set to
native layer when restoring setting after the crash.

Bug: 412816152
Test: manual
Change-Id: I3a473dddfd4e69a4dbfe0905c2ba0aa849c8cfae
During user switch test, there is a probability that the UserExecutors
under certain user is terminated while dispatchChangeNotifications need
to execute, it throws RejectedExecutionException
FutureAppSearchSessionImpl.put parames callback did not override the onSystemError method, resulting in a RuntimeException exception.

Bug:441384820

Test: pressure test
Change-Id: I372999b26227a32a8c29fb768cdbc04421e27429
Bug: 429041152

When any IOException is received during flush operation of ProtoOutputStream, a RuntimeException is re-throwed. Failing to catch this exception resulted in exit of system_server process.

Signed-off-by: Trong Vu <[email protected]>
Change-Id: If408334dfee39d9884f385ed34bf37d6d5104131
…ower key double-click

On a Pixel phone, open com.google.android.calculator and repeatedly
press the power key twice in a short period of time, the calculator app
will be shown on the keyguard, then click the power key twice again, we
will find the screen is dark, caused by KEYGUARD_UNOCCLUDE Transition
timed out for display not ready

Reproduce the Method:

1. Open com.google.android.calculator
2. Continue to click the power key twice in a short period of time
3. When the top app is calculator, click the power key twice again

Test result: UI is dark when powered on

Change-Id: If7461b1c5827a6dc132ef70af38a78f86c3fe7d6
… main thread time

During the notification bar case fluency test in the system core UI scene, the SystemUIUi main thread experienced severe frame drops due to frequent execution of the following DateTimeView logic while updating the status bar time once a minute:
android.view.ViewRootImpl$ViewRootHandler: android.widget.DateTimeView$ReceiverInfo$$ExternalSyntheticLambda0

Signed-off-by:
Shuangxi Xiang <[email protected]>

Change-Id: I888218897555d596b46b78f23a63d1df1750b3ca
Change-Id: I5406c6c5687eebf751ae20d035169ff42059f143
Signed-off-by: minaripenguin <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Add proper exception handling and synchronization to prevent crashes when unlinking death recipients that were already unlinked due to binder death or previous cleanup calls.

* Track death recipient link state to avoid double unlink attempts
* Add synchronization between destroy() and binderDied() methods

Log:
09-01 10:34:03.104 12243 12243 E AndroidRuntime: FATAL EXCEPTION: main
09-01 10:34:03.104 12243 12243 E AndroidRuntime: Process: com.google.android.as, PID: 12243
09-01 10:34:03.104 12243 12243 E AndroidRuntime: java.util.NoSuchElementException: Death link does not exist (NAME_NOT_FOUND)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.BinderProxy.unlinkToDeathNative(Native Method)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.BinderProxy.unlinkToDeath(BinderProxy.java:646)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService$CallbackWrapper.destroy(SmartspaceService.java:325)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService$$ExternalSyntheticLambda2.accept(D8$$SyntheticClass:0)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at java.util.ArrayList.forEach(ArrayList.java:1613)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService.doDestroy(SmartspaceService.java:253)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService.-$$Nest$mdoDestroy(Unknown Source:0)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService$1.$r8$lambda$NJ3IgkAOxkZC_JEnBs7ZefJs7y4(Unknown Source:0)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.service.smartspace.SmartspaceService$1$$ExternalSyntheticLambda5.accept(D8$$SyntheticClass:0)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at com.android.internal.util.function.pooled.PooledLambdaImpl.doInvoke(PooledLambdaImpl.java:281)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at com.android.internal.util.function.pooled.PooledLambdaImpl.invoke(PooledLambdaImpl.java:204)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at com.android.internal.util.function.pooled.OmniFunction.run(OmniFunction.java:87)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.Handler.handleCallback(Handler.java:995)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.Handler.dispatchMessage(Handler.java:103)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.Looper.loopOnce(Looper.java:248)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.os.Looper.loop(Looper.java:338)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at android.app.ActivityThread.main(ActivityThread.java:9137)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at java.lang.reflect.Method.invoke(Native Method)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:593)
09-01 10:34:03.104 12243 12243 E AndroidRuntime: 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940)

Change-Id: If20bd44d5ff2620257ed7f4ae18d09b20b150246
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: cjh1249131356 <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Root Cause:
 The function convertAudioGainConfigToNative forgets to call ReleaseIntArrayElements
to release memory after calling GetIntArrayElements.

Bug: 444915885
Test: atest

Co-authored-by: Zheng Xiaoying <[email protected]>
Change-Id: Ifa323280d744cb82ae6ae648f04aa31000c5ba06
Avoids ANRs and excessive I/O by delaying the system APK summary scan, which was previously triggered inappropriately during the boot phase. The scan will now initiate 1 minute after boot if triggered within the initial 30 seconds.

Test: test steps are:
1.Install 60 APKs; All Logs, Data filled to 95%;
2.Close watchdog, open Sysdump;
3.Repeated restart for a long time (120h)

Bug: 414507692
Change-Id: I1d329484ac12d4763248bd9c650d15e8741aea5d
Language Settings crashing due to ConcurrentModificationException. The
structure of the map used for supportedLocaleInfos is being changed
while it's being read. One way to fix this is by creating a copy of map
for iteration.

bug: 420412904

Change-Id: Ideb02ac913f474edec5bb437574fb6da94344d0f
Change-Id: Ic19fe142be51fad4bbf7e29168c6e33c9ab1809b
Signed-off-by: rmp22 <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
it's not always 3...

Signed-off-by: Pranav Vashi <[email protected]>
* Not sure where this is failing for main thread check.
* Let's remove assert check for dump function.

Log:

time: 1761829105393
msg: java.lang.IllegalStateException: should be called from the main thread. sMainLooper.threadName=main Thread.currentThread()=dump-thread
stacktrace: java.lang.IllegalStateException: should be called from the main thread. sMainLooper.threadName=main Thread.currentThread()=dump-thread
	at com.android.systemui.util.Assert.isMainThread(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:60)
	at com.android.systemui.statusbar.notification.collection.NotifCollection.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:3)
	at com.android.systemui.dump.DumpHandler$Companion.dumpDumpable(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:21)
	at com.android.systemui.dump.DumpHandler.dumpCritical(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:31)
	at com.android.systemui.dump.DumpHandler.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:8)
	at com.android.systemui.SystemUIService.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:19)
	at android.app.ActivityThread.handleDumpService(ActivityThread.java:5389)
	at android.app.ActivityThread.-$$Nest$mhandleDumpService(Unknown Source:0)
	at android.app.ActivityThread$ApplicationThread.lambda$dumpService$0(ActivityThread.java:1521)
	at android.app.ActivityThread$ApplicationThread.$r8$lambda$OeHpPo9a5q6Dn6gB6isOwWv_X-E(Unknown Source:0)
	at android.app.ActivityThread$ApplicationThread$$ExternalSyntheticLambda8.run(D8$$SyntheticClass:0)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1156)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:651)
	at java.lang.Thread.run(Thread.java:1119)

Signed-off-by: Pranav Vashi <[email protected]>
Change-Id: Ic7ba1db1a0845242cecb55e6012bf56f4329a30d
Signed-off-by: Ghosuto <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
This fixes "No service" displayed on internet tile.
Based on upstream fix:
https://cs.android.com/android/_/android/platform/frameworks/base/+/8bb53fdae8ed19c988e66abb02d940b3c17a7029

Change-Id: I3de9397c6816f4b61269d926bf39cd3bcafb0f2f
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
02-06 09:15:36.049  2082  2082 E AndroidRuntime: Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'com.android.providers.settings.SettingsState$Setting com.android.providers.settings.SettingsState.getSettingLocked(java.lang.String)' on a null object reference
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at com.android.providers.settings.SettingsProvider$SettingsRegistry$UpgradeController.onUpgradeLocked(SettingsProvider.java:4345)
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at com.android.providers.settings.SettingsProvider$SettingsRegistry$UpgradeController.upgradeIfNeededLocked(SettingsProvider.java:3957)
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at com.android.providers.settings.SettingsProvider$SettingsRegistry.migrateAllLegacySettingsIfNeededLocked(SettingsProvider.java:3592)
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at com.android.providers.settings.SettingsProvider$SettingsRegistry.-$$Nest$mmigrateAllLegacySettingsIfNeededLocked(SettingsProvider.java:0)
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at com.android.providers.settings.SettingsProvider.onCreate(SettingsProvider.java:414)
02-06 09:15:36.049  2082  2082 E AndroidRuntime: 	at android.content.ContentProvider.attachInfo(ContentProvider.java:2649)

Signed-off-by: Pranav Vashi <[email protected]>
11-19 11:15:51.792  1830  8762 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.792  1830  8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.792  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.793  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.793  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.793  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.793  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.793  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.793  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.793  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.793  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.793  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.793  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.793  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.793  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.793  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.793  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.793  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.793  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.793  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.800  1830  3971 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.800  1830  3971 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.801  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.801  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.801  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.801  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.801  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.801  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.801  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.801  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.801  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.801  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.801  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.801  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.801  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.801  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.801  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.801  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.801  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.815  1830  1852 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.815  1830  1852 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.817  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.817  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.817  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.817  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.817  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.817  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.817  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.817  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.817  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.817  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.817  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.817  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.817  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.817  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.817  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.817  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.817  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.818   666   666 D lowmemorykiller: medium pressure event polling check
11-19 11:15:51.819   666   666 D lowmemorykiller: thrashing: 0% thrashing_limit: 30%
11-19 11:15:51.819   666   666 D lowmemorykiller: Not killing for medium pressure event polling check
11-19 11:15:51.823  1830  1852 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.823  1830  1852 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.823  1830  1852 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.824  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.824  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.824  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.824  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.824  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.824  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.824  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.824  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.824  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.824  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.824  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.824  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.824  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.824  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.824  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.824  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.824  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.831  1830  3971 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.831  1830  3971 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.832  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.832  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.832  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.832  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.832  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.832  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.832  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.832  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.832  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.832  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.832  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.832  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.832  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.832  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.832  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.832  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.832  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.841  1830  8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.841  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.843  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.843  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.843  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.843  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.843  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.843  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.843  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.843  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.843  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.843  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.843  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.843  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.843  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.843  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.843  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.843  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.843  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.857  1047  2100 D android.hardware.audio.service: ipc_resp_thread: opcode: 0xd, payload_size: 3876, resp_buf size: 3888
11-19 11:15:51.857  1047  2100 D android.hardware.audio.service: pktzr_resp_cb: opcode = 0xd size = 3876 token = 123
11-19 11:15:51.857  1047  2100 D android.hardware.audio.service: pktzr_resp_cb: token 123 matched
11-19 11:15:51.858  1047  5444 D android.hardware.audio.service: pktzr_send_cmd: opcode = 0xc, size = 24, token = 125
11-19 11:15:51.869  1830  8762 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.869  1830  8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.869  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.870  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]
11-19 11:15:51.870  3262  9258 W clgf    : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.os.Parcel.createExceptionOrNull(Parcel.java:3057)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.os.Parcel.createException(Parcel.java:3041)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.os.Parcel.readException(Parcel.java:3024)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.content.ContentProviderProxy.call(ContentProviderNative.java:764)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.provider.Settings$Config.putString(Settings.java:19611)
11-19 11:15:51.870  3262  9258 W clgf    : 	at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.provider.Settings$Config.setStrings(Settings.java:19632)
11-19 11:15:51.870  3262  9258 W clgf    : 	at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225)
11-19 11:15:51.870  3262  9258 W clgf    : 	at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46)
11-19 11:15:51.870  3262  9258 W clgf    : 	at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66)
11-19 11:15:51.870  3262  9258 W clgf    : 	at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32)
11-19 11:15:51.870  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76)
11-19 11:15:51.870  3262  9258 W clgf    : 	at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205)
11-19 11:15:51.870  3262  9258 W clgf    : 	at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2)
11-19 11:15:51.870  3262  9258 W clgf    : 	at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10)
11-19 11:15:51.870  3262  9258 W clgf    : 	at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70)
11-19 11:15:51.870  3262  9258 W clgf    : 	at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152)
11-19 11:15:51.870  3262  9258 W clgf    : 	at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13)
11-19 11:15:51.870  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
11-19 11:15:51.870  3262  9258 W clgf    : 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
11-19 11:15:51.870  3262  9258 W clgf    : 	at java.lang.Thread.run(Thread.java:1012)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: Writing exception to parcel
11-19 11:15:51.879  1830  8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider.call(ContentProvider.java:2679)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at android.content.ContentProvider$Transport.call(ContentProvider.java:628)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransactInternal(Binder.java:1339)
11-19 11:15:51.879  1830  8762 E DatabaseUtils: 	at android.os.Binder.execTransact(Binder.java:1275)
11-19 11:15:51.880  3262  9258 W clgf    : setProperties failed with SecurityException [CONTEXT service_id=204 ]

Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
* New translations cr_strings.xml (Indonesian)

* New translations cr_strings.xml (Indonesian)
* New translations cr_strings.xml (Bulgarian)

* New translations cr_strings.xml (Bulgarian)

* New translations cr_strings.xml (Bulgarian)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.