-
Notifications
You must be signed in to change notification settings - Fork 376
New Crowdin updates #1288
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
gwolf2u
wants to merge
861
commits into
15.0
Choose a base branch
from
15.0-translations
base: 15.0
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
New Crowdin updates #1288
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
In some cases,the getFadeOutVolumeShaperConfig method may return null value. Test: OEM monkey test Flag: EXEMPT bugfix Bug: 384435132 Google: 3415680 Change-Id: Ie75934f9520d0747c3baeb82bbef48c9d3227660
the getActivity mehod of WindowContainer may be return null if no match activity find. Test: OEM monkey test Flag: EXEMPT bugfix Bug: 384839854 Google: 3420560 Change-Id: I1916ccbd9783a4f8c65450797a587c8af57ec070
…happen. Bug: none Flag: EXEMPT minor optimization Google: 3412242 Change-Id: Ic035870b886ac13a6c8c38ad484eec2840cc3165
Signed-off-by: Pranav Vashi <[email protected]>
Will toggle private DNS between off and last used mode If no mode was selected will toggle to opportunistic Shows the active mode in subtitle text as such: Off for off Automatic for opportunistic and the hostname string for manual Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Allows using the VPN's DNS instead of the set private DNS Automatically restores the previous set mode Signed-off-by: Pranav Vashi <[email protected]>
The getOrCreateRootHomeTask method return value is Nullable ,so we should make NonNull judgment before use the return value. Test: OEM monkey test Flag: EXEMPT bugfix Bug: 386025825 Google: 3433344 Change-Id: I7efc57e94a3cdaf1db27fb696a975e194e86d8a3
Bug: dumpValidateUids[Proto]() could to be invoked while dispatchUidsChanged which might cause the following error as mValidateUids (a SparseArray) is not thread safe *** FATAL EXCEPTION IN SYSTEM PROCESS: android.ui java.lang.ArrayIndexOutOfBoundsException: src.length=159 srcPos=124 dst.length=159 dstPos=125 length=-81 at java.lang.System.arraycopy(Native Method) at com.android.internal.util.GrowingArrayUtils.insert(GrowingArrayUtils.java:135) at android.util.SparseArray.put(SparseArray.java:280) at com.android.server.am.ActiveUids.put(ActiveUids.java:48) at com.android.server.am.UidObserverController.dispatchUidsChanged(UidObserverController.java:294) at com.android.server.am.UidObserverController$$ExternalSyntheticLambda0.run(D8$$SyntheticClass:0) at android.os.Handler.handleCallback(Handler.java:959) at android.os.Handler.dispatchMessage(Handler.java:100) at android.os.Looper.loopOnce(Looper.java:249) at android.os.Looper.loop(Looper.java:337) at android.os.HandlerThread.run(HandlerThread.java:85) at com.android.server.ServiceThread.run(ServiceThread.java:46) Test: Manual Google: 3420561 Change-Id: I72e54ee165c8723349f90929608f386200dac99f Signed-off-by: zhoutongyu <[email protected]>
Install the renamed apk,use the new name to getPackageLPr may be null,so we should make a null judgment. Test: monkey test Flag: EXEMPT bugfix Bug: 386727719 Google: 3433745 Change-Id: Ia41a401bceaa13889ea66f5e3e337b99e3e4b799
* Settings->System->Gestures->Prevent ringing core: Remove `@SystemApi` annotation for VOLUME_HUSH_CYCLE. This addition should not be annotated with `@SystemApi` because it creates an addition that fails the API test in user builds Signed-off-by: rituj <[email protected]> Co-authored-by: Evan Anderson <[email protected]> Change-Id: I334bd165e970665ac5300d387a0ea6745748d3ad Signed-off-by: aswin7469 <[email protected]>
No top non finishing activity exist in task. Test: monkey test Flag: EXEMPT bugfix Bug: 387957062 Google: 3438659 Change-Id: I58e3fd1bca3088b0f187d3a12994d3ceb6ed7553
Fixes build breakage from upstream LLVM change: llvm/llvm-project@ffc7380 frameworks/base/libs/hwui/renderthread/HintSessionWrapper.h:101:41: error: implicit instantiation of undefined template 'std::shared_ptr<android::uirenderer::renderthread::HintSessionWrapper::HintSessionBinding>' 101 | std::shared_ptr<HintSessionBinding> mBinding; | ^ prebuilts/clang/host/linux-x86/clang-dev/include/c++/v1/__fwd/memory.h:24:28: note: template is declared here 24 | class _LIBCPP_TEMPLATE_VIS shared_ptr; | ^ Test: presubmit Google: 3440745 Change-Id: Icc0f366c6f1e57aa9ede9fe4868f0a66dff2db94
The call chain: mRoot.anyTaskForId --> mTaskSupervisor.restoreRecentTaskLocked(need add global lock). Bug: none Flag: EXEMPT bugfix Google: 3440746 Change-Id: I381e6af800f2c62f44879c13022f050b8a108eae
…pen. Bug: none Flag: EXEMPT minor optimization Google: 3442220 Change-Id: Ie4d86cc88de765cdb42270de44fa61cfb04c88d2
Following internal discussions, this CL removes a rarely-occuring bug. At latitudes -+90°, cos() is 0, leading to a division by zero. This exception happens only if the device location (plus offset) is exactly at the North or South pole, so I assume it never happened in practice. Change-Id: I6e91791e1b7e87ed88e48cff13a0af9b3a680908 Test: atest FrameworksMockingServicesTests:LocationFudgerTest Bug: 388189593 Flag: EXEMPT Bug Fix
Currently, we are blocking on a lock which is not necessary if we have already cached the value. Chrome is seeing real-world pain from this - we have a background task that sits for a while in constructSplit (spinning up a large ClassLoader), and our main thread is blocking on this mLock for absolutely no purpose. Google: 3382768 Change-Id: I9ddadde23ffd9e04988c8f1933d2c8652bc5f222
Problem: {
1. When long press is performed on any image in an application which uses webview, a drag operation with null ClipData is initiated via startDragAndDrop API in View.java
2. A drag operation with null ClipData is notified to the framework on Android WebView versions 131.x.x.x and later. Earlier webview versions do not notify such operations with null clipdata.
3. This drag event is notified to all windows in Z-order via DragState#broadcastDragStartedLocked().
4. Now in DragState#dragStartedLocked(), if any window has PRIVATE_FLAG_INTERCEPT_GLOBAL_DRAG_AND_DROP flag, there is a null pointer crash due to null ClipData. This exception is handled in the caller View.java
5. While the long press is still held(drag is in progress) and performSurfacePlacement is called, the updateInputWindows() calls DragState#sendDragStartedIfNeededLocked() for all windows.
6. Further in this flow, DragState#dragStartedLocked() is called and if any window has PRIVATE_FLAG_INTERCEPT_GLOBAL_DRAG_AND_DROP flag, a Null pointer crash due to null ClipData occurs.
7. There is no catch block to handle this exception at the caller(system server itself) and the device reboots.
}
Solution: {
1. When ClipData obtained in the drag operation is null and drag operation is in progress, do not notify DragState#dragStartedLocked() for any of windows to avoid this crash.
}
Google: 3446830
Change-Id: I2f8b9ce54b229254c4ac0c688099183818114093
Signed-off-by: Aditya Jadhav <[email protected]>
This situation may happen by mistake when calling the setParent method and passing a null value. Test: monkey test Flag: EXEMPT bugfix Bug: 388883786 Google: 3446630 Change-Id: I762d3aaaa7a4b2eac2784d1f578960c4348a5a9d
When opening and closing activities in Settings, a significant amount of
CPU time is spent looking up ArrayMap entries, as reported by simpleperf:
0.12% /system/framework/arm64/boot-framework.oat android.util.ArrayMap.binarySearchHashes
ThemedResourceCache is responsible for a significant portion of the time
spent in ArrayMap lookups:
0.08% 0.08% /system/framework/arm64/boot-framework.oat android.util.ArrayMap.binarySearchHashes
|
-- android.util.ArrayMap.binarySearchHashes
|
--50.00%-- android.util.ArrayMap.indexOf
|
|--36.71%-- android.util.ArrayMap.get
| |--0.87%-- [hit in function]
| |
| |--9.64%-- android.content.res.ThemedResourceCache.getThemedLocked
| | android.content.res.ThemedResourceCache.get
| | |
| | |--77.92%-- android.content.res.DrawableCache.getInstance
| | | android.content.res.ResourcesImpl.loadDrawable
| | | android.content.res.Resources.loadDrawable
| | | android.content.res.TypedArray.getDrawableForDensity
| | | android.content.res.Resources.getColor [DEDUPED]
| | | |
| | | |--62.94%-- android.view.View.<init>
| | | | |
| | | | |--64.58%-- android.view.ViewGroup.<init>
| | | | | android.widget.LinearLayout.<init>
| | | | | android.widget.LinearLayout.<init>
| | | | | art_quick_invoke_stub
| | | | | art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)
| | | | | art::InvokeConstructor(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::ObjPtr<art::mirror::Object>, _jobject*)
| | | | | art::Constructor_newInstance0(_JNIEnv*, _jobject*, _jobjectArray*)
| | | | | art_jni_trampoline
| | | | | java.lang.reflect.Constructor.newInstance
| | | | | android.view.LayoutInflater.createView
| | | | | com.android.internal.policy.PhoneLayoutInflater.onCreateView
| | | | | android.view.LayoutInflater.onCreateView
| | | | | android.view.LayoutInflater.onCreateView
| | | | | android.view.LayoutInflater.createViewFromTag
| | | | | android.view.LayoutInflater.inflate
| | | | | android.view.LayoutInflater.inflate
| | | | |
| | | | --35.42%-- android.widget.TextView.<init>
| | | | android.widget.Button.<init>
| | | | art_quick_invoke_stub
| | | | art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)
| | | | art::InvokeConstructor(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::ObjPtr<art::mirror::Object>, _jobject*)
| | | | art::Constructor_newInstance0(_JNIEnv*, _jobject*, _jobjectArray*)
| | | | art_jni_trampoline
| | | | java.lang.reflect.Constructor.newInstance
| | | | android.view.LayoutInflater.createView
| | | | com.android.internal.policy.PhoneLayoutInflater.onCreateView
| | | | android.view.LayoutInflater.onCreateView
| | | | android.view.LayoutInflater.onCreateView
| | | | android.view.LayoutInflater.createViewFromTag
| | | | android.view.LayoutInflater.rInflate
| | | | android.view.LayoutInflater.rInflate
| | | | android.view.LayoutInflater.rInflate
| | | | android.view.LayoutInflater.inflate
| | | | android.view.LayoutInflater.inflate
| | | | android.view.LayoutInflater.inflate
| | | |
| | | --37.06%-- com.android.internal.widget.ToolbarWidgetWrapper.<init>
| | |
| | --22.08%-- android.content.res.ConfigurationBoundResourceCache.get
| | android.content.res.ConfigurationBoundResourceCache.getInstance
| | android.content.res.ResourcesImpl.loadComplexColorFromName
| | android.content.res.ResourcesImpl.loadColorStateList
| | android.content.res.Resources.loadColorStateList
| | android.content.res.TypedArray.getColorStateList
| | android.widget.TextView.readTextAppearance
| | android.widget.TextView.setTextAppearance
| | android.widget.TextView.setTextAppearance
| | android.widget.Toolbar.setTitle
| | com.android.wifi.x.com.android.internal.util.StateMachine$SmHandler.handleMessage
| | android.view.SurfaceControl.copyFrom
Empirical testing reveals that mThemedEntries usually contains around 14
entries, at which HashMap is 35% faster than ArrayMap for lookups and
54% faster [1] for insertions. The increased memory usage should be
negligible at this size, so we can safely convert the map to a HashMap
in order to improve performance in this hotpath.
[1] https://docs.google.com/spreadsheets/d/136UJS2yVlZyPx30KDNgj4AWldkp9xbzIcWkLFj9RGgk/edit
Test: simpleperf record -a; verify that ThemedResourceCache no longer
appears under ArrayMap.binarySearchHashes
Change-Id: I39e1c4b03fe0e60f933f02e253d2d3c4a483146f
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/6195
Reviewed-by: Anay Wadhera <[email protected]>
Tested-by: Anay Wadhera <[email protected]>
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/7159
Reviewed-on: https://review.statixos.com/c/android_frameworks_base/+/8668
Reviewed-by: Sourajit Karmakar <[email protected]>
Tested-by: Sourajit Karmakar <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
* reduce memory usage overhead Signed-off-by: minaripenguin <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
Test: Manual test Bug:374925259 Change-Id: Ifbb20a003863b8e0f472c9fc6af69c419aa29253 Signed-off-by: yangjing24 <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
Summary: Some framework components do not check whether the system service being called is null or not causing "FATAL EXCEPTION" in zygote system process. Adding nullptr or NULL obj check before calling. Test: m flash the device verify the zygote is running stable and not hitting FATAL EXECEPTION. Google: 3349287 Change-Id: Icd504fb529716ff0870d0d911b1cd8b356bf9bb7 Signed-off-by: Abdelrahman Daim <[email protected]>
Bug: none Flag: EXEMPT minor optimization Change-Id: I987f4cb7d84af0561d75b494549c7bc2868e0d0f
The activities in the task may already be finishing. Then the task could be removed when performing the idle check. Test: monkey test Flag: EXEMPT bugfix Bug: 388883786 Google: 3446630 Change-Id: I762d3aaaa7a4b2eac2784d1f578960c4348a5a9d
Can be useful in some cases. Change-Id: I999337cc55e9675cedde35191a6438d90744e5aa Signed-off-by: LibXZR <[email protected]> Adapt to Android 13 Signed-off-by: someone5678 <[email protected]>
When AudioFlinger binder dies and AudioService receives onError/onAudioServerDied callback but AudioPolicy service is alive, we get INVALID_OPERATION error because mixes was already registered. This causes calling release on AudioPolicyProxy. Test: Manual Bug: 380092408 Google: 3370477 Change-Id: I4e5c6e3d3aace03f02f312fda26e5696ac090d04
Merged-In: I17017c9da0a55fb860a9ad9d4a547b1c818b7fac Google: 3439303 Change-Id: I9e323fba572ccf13b064c17999e0c47075375ad2
In the recent animation scene, we don't need to wait for the launcher to draw, we just need the wallpaper to finish drawing and start the animation. Bug: 422656135 Test:Three key navigation and gesture swipe up to recent to test for any issues. Change-Id: I9d9433434e334ee68cb5b2dd2cc182a584207c7f
Bug: 422656135 Test: Test with various foreground apps (fullscreen, heavy, custom animations) and return to the desktop Change-Id: Idce70630688de74a27550bf5829d8d3e0e713b5f
Root Cause: At the end of a scroll gesture, as the velocity drops, the per-frame distance approximation oscillates between 1 px and 0 px, resulting in visible jitter. Solution: During the scroll, if the computed distance for the next frame is 0 px, force it to 1 px to keep the animation continuous to eliminate jitter. Bug: 425738878 Test:scroll on the activity of app using ListView, observe whether exist jitter. Change-Id: I1dae1283f9cd084db841c5f807376268eedc75b5
When restoring setting after audioserver crash 1. The setHdmiSystemAudioSupported doesn't setForceUse with SAM because the setting value is equal to mHdmiSystemAudioSupported. 2. The SAD is stored in the AudioDescriptor, but AudioDescriptor isn't pass to native layer. Adjust logic to ensure that SAM and AudioDescriptor can set to native layer when restoring setting after the crash. Bug: 412816152 Test: manual Change-Id: I3a473dddfd4e69a4dbfe0905c2ba0aa849c8cfae
During user switch test, there is a probability that the UserExecutors under certain user is terminated while dispatchChangeNotifications need to execute, it throws RejectedExecutionException FutureAppSearchSessionImpl.put parames callback did not override the onSystemError method, resulting in a RuntimeException exception. Bug:441384820 Test: pressure test Change-Id: I372999b26227a32a8c29fb768cdbc04421e27429
Bug: 429041152 When any IOException is received during flush operation of ProtoOutputStream, a RuntimeException is re-throwed. Failing to catch this exception resulted in exit of system_server process. Signed-off-by: Trong Vu <[email protected]> Change-Id: If408334dfee39d9884f385ed34bf37d6d5104131
…ower key double-click On a Pixel phone, open com.google.android.calculator and repeatedly press the power key twice in a short period of time, the calculator app will be shown on the keyguard, then click the power key twice again, we will find the screen is dark, caused by KEYGUARD_UNOCCLUDE Transition timed out for display not ready Reproduce the Method: 1. Open com.google.android.calculator 2. Continue to click the power key twice in a short period of time 3. When the top app is calculator, click the power key twice again Test result: UI is dark when powered on Change-Id: If7461b1c5827a6dc132ef70af38a78f86c3fe7d6
… main thread time During the notification bar case fluency test in the system core UI scene, the SystemUIUi main thread experienced severe frame drops due to frequent execution of the following DateTimeView logic while updating the status bar time once a minute: android.view.ViewRootImpl$ViewRootHandler: android.widget.DateTimeView$ReceiverInfo$$ExternalSyntheticLambda0 Signed-off-by: Shuangxi Xiang <[email protected]> Change-Id: I888218897555d596b46b78f23a63d1df1750b3ca
Change-Id: I5406c6c5687eebf751ae20d035169ff42059f143 Signed-off-by: minaripenguin <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Abhay Singh Gill <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
Add proper exception handling and synchronization to prevent crashes when unlinking death recipients that were already unlinked due to binder death or previous cleanup calls. * Track death recipient link state to avoid double unlink attempts * Add synchronization between destroy() and binderDied() methods Log: 09-01 10:34:03.104 12243 12243 E AndroidRuntime: FATAL EXCEPTION: main 09-01 10:34:03.104 12243 12243 E AndroidRuntime: Process: com.google.android.as, PID: 12243 09-01 10:34:03.104 12243 12243 E AndroidRuntime: java.util.NoSuchElementException: Death link does not exist (NAME_NOT_FOUND) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.BinderProxy.unlinkToDeathNative(Native Method) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.BinderProxy.unlinkToDeath(BinderProxy.java:646) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService$CallbackWrapper.destroy(SmartspaceService.java:325) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService$$ExternalSyntheticLambda2.accept(D8$$SyntheticClass:0) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at java.util.ArrayList.forEach(ArrayList.java:1613) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService.doDestroy(SmartspaceService.java:253) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService.-$$Nest$mdoDestroy(Unknown Source:0) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService$1.$r8$lambda$NJ3IgkAOxkZC_JEnBs7ZefJs7y4(Unknown Source:0) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.service.smartspace.SmartspaceService$1$$ExternalSyntheticLambda5.accept(D8$$SyntheticClass:0) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at com.android.internal.util.function.pooled.PooledLambdaImpl.doInvoke(PooledLambdaImpl.java:281) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at com.android.internal.util.function.pooled.PooledLambdaImpl.invoke(PooledLambdaImpl.java:204) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at com.android.internal.util.function.pooled.OmniFunction.run(OmniFunction.java:87) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.Handler.handleCallback(Handler.java:995) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.Handler.dispatchMessage(Handler.java:103) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.Looper.loopOnce(Looper.java:248) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.os.Looper.loop(Looper.java:338) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at android.app.ActivityThread.main(ActivityThread.java:9137) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at java.lang.reflect.Method.invoke(Native Method) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:593) 09-01 10:34:03.104 12243 12243 E AndroidRuntime: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:940) Change-Id: If20bd44d5ff2620257ed7f4ae18d09b20b150246 Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: cjh1249131356 <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
Root Cause: The function convertAudioGainConfigToNative forgets to call ReleaseIntArrayElements to release memory after calling GetIntArrayElements. Bug: 444915885 Test: atest Co-authored-by: Zheng Xiaoying <[email protected]> Change-Id: Ifa323280d744cb82ae6ae648f04aa31000c5ba06
Avoids ANRs and excessive I/O by delaying the system APK summary scan, which was previously triggered inappropriately during the boot phase. The scan will now initiate 1 minute after boot if triggered within the initial 30 seconds. Test: test steps are: 1.Install 60 APKs; All Logs, Data filled to 95%; 2.Close watchdog, open Sysdump; 3.Repeated restart for a long time (120h) Bug: 414507692 Change-Id: I1d329484ac12d4763248bd9c650d15e8741aea5d
Language Settings crashing due to ConcurrentModificationException. The structure of the map used for supportedLocaleInfos is being changed while it's being read. One way to fix this is by creating a copy of map for iteration. bug: 420412904 Change-Id: Ideb02ac913f474edec5bb437574fb6da94344d0f
Change-Id: Ic19fe142be51fad4bbf7e29168c6e33c9ab1809b Signed-off-by: rmp22 <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
it's not always 3... Signed-off-by: Pranav Vashi <[email protected]>
* Not sure where this is failing for main thread check. * Let's remove assert check for dump function. Log: time: 1761829105393 msg: java.lang.IllegalStateException: should be called from the main thread. sMainLooper.threadName=main Thread.currentThread()=dump-thread stacktrace: java.lang.IllegalStateException: should be called from the main thread. sMainLooper.threadName=main Thread.currentThread()=dump-thread at com.android.systemui.util.Assert.isMainThread(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:60) at com.android.systemui.statusbar.notification.collection.NotifCollection.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:3) at com.android.systemui.dump.DumpHandler$Companion.dumpDumpable(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:21) at com.android.systemui.dump.DumpHandler.dumpCritical(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:31) at com.android.systemui.dump.DumpHandler.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:8) at com.android.systemui.SystemUIService.dump(go/retraceme a0ed5d08cbafd6ceda3025e7580143a234574b99d67372ec0a205b5910abeaab:19) at android.app.ActivityThread.handleDumpService(ActivityThread.java:5389) at android.app.ActivityThread.-$$Nest$mhandleDumpService(Unknown Source:0) at android.app.ActivityThread$ApplicationThread.lambda$dumpService$0(ActivityThread.java:1521) at android.app.ActivityThread$ApplicationThread.$r8$lambda$OeHpPo9a5q6Dn6gB6isOwWv_X-E(Unknown Source:0) at android.app.ActivityThread$ApplicationThread$$ExternalSyntheticLambda8.run(D8$$SyntheticClass:0) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1156) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:651) at java.lang.Thread.run(Thread.java:1119) Signed-off-by: Pranav Vashi <[email protected]>
Fixes: crdroidandroid/issue_tracker#822 Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Change-Id: Ic7ba1db1a0845242cecb55e6012bf56f4329a30d Signed-off-by: Ghosuto <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
This fixes "No service" displayed on internet tile. Based on upstream fix: https://cs.android.com/android/_/android/platform/frameworks/base/+/8bb53fdae8ed19c988e66abb02d940b3c17a7029 Change-Id: I3de9397c6816f4b61269d926bf39cd3bcafb0f2f Signed-off-by: Dmitrii <[email protected]> Signed-off-by: Pranav Vashi <[email protected]>
This reverts commit 8f994f4.
Fixes: crdroidandroid/issue_tracker#830 Signed-off-by: Pranav Vashi <[email protected]>
02-06 09:15:36.049 2082 2082 E AndroidRuntime: Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'com.android.providers.settings.SettingsState$Setting com.android.providers.settings.SettingsState.getSettingLocked(java.lang.String)' on a null object reference 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at com.android.providers.settings.SettingsProvider$SettingsRegistry$UpgradeController.onUpgradeLocked(SettingsProvider.java:4345) 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at com.android.providers.settings.SettingsProvider$SettingsRegistry$UpgradeController.upgradeIfNeededLocked(SettingsProvider.java:3957) 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at com.android.providers.settings.SettingsProvider$SettingsRegistry.migrateAllLegacySettingsIfNeededLocked(SettingsProvider.java:3592) 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at com.android.providers.settings.SettingsProvider$SettingsRegistry.-$$Nest$mmigrateAllLegacySettingsIfNeededLocked(SettingsProvider.java:0) 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at com.android.providers.settings.SettingsProvider.onCreate(SettingsProvider.java:414) 02-06 09:15:36.049 2082 2082 E AndroidRuntime: at android.content.ContentProvider.attachInfo(ContentProvider.java:2649) Signed-off-by: Pranav Vashi <[email protected]>
11-19 11:15:51.792 1830 8762 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.792 1830 8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.792 1830 8762 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.793 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.793 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.793 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.793 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.793 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.793 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.793 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.793 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.793 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.793 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.793 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.793 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.793 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.793 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.793 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.793 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.793 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.793 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.793 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.793 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.793 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.793 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.793 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.793 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.793 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.793 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.800 1830 3971 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.800 1830 3971 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.801 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.801 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.801 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.801 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.801 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.801 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.801 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.801 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.801 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.801 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.801 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.801 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.801 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.801 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.801 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.801 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.801 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.801 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.801 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.801 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.801 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.801 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.801 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.801 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.801 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.801 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.815 1830 1852 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.815 1830 1852 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.817 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.817 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.817 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.817 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.817 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.817 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.817 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.817 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.817 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.817 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.817 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.817 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.817 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.817 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.817 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.817 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.817 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.817 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.817 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.817 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.817 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.817 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.817 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.817 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.817 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.817 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.818 666 666 D lowmemorykiller: medium pressure event polling check 11-19 11:15:51.819 666 666 D lowmemorykiller: thrashing: 0% thrashing_limit: 30% 11-19 11:15:51.819 666 666 D lowmemorykiller: Not killing for medium pressure event polling check 11-19 11:15:51.823 1830 1852 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.823 1830 1852 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.823 1830 1852 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.824 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.824 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.824 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.824 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.824 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.824 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.824 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.824 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.824 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.824 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.824 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.824 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.824 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.824 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.824 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.824 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.824 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.824 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.824 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.824 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.824 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.824 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.824 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.824 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.824 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.824 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.831 1830 3971 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.831 1830 3971 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.832 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.832 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.832 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.832 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.832 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.832 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.832 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.832 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.832 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.832 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.832 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.832 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.832 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.832 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.832 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.832 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.832 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.832 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.832 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.832 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.832 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.832 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.832 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.832 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.832 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.832 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.841 1830 8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.841 1830 8762 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.843 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.843 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.843 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.843 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.843 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.843 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.843 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.843 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.843 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.843 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.843 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.843 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.843 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.843 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.843 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.843 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.843 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.843 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.843 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.843 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.843 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.843 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.843 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.843 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.843 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.843 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.857 1047 2100 D android.hardware.audio.service: ipc_resp_thread: opcode: 0xd, payload_size: 3876, resp_buf size: 3888 11-19 11:15:51.857 1047 2100 D android.hardware.audio.service: pktzr_resp_cb: opcode = 0xd size = 3876 token = 123 11-19 11:15:51.857 1047 2100 D android.hardware.audio.service: pktzr_resp_cb: token 123 matched 11-19 11:15:51.858 1047 5444 D android.hardware.audio.service: pktzr_send_cmd: opcode = 0xc, size = 24, token = 125 11-19 11:15:51.869 1830 8762 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.869 1830 8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.869 1830 8762 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.870 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] 11-19 11:15:51.870 3262 9258 W clgf : java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.870 3262 9258 W clgf : at android.os.Parcel.createExceptionOrNull(Parcel.java:3057) 11-19 11:15:51.870 3262 9258 W clgf : at android.os.Parcel.createException(Parcel.java:3041) 11-19 11:15:51.870 3262 9258 W clgf : at android.os.Parcel.readException(Parcel.java:3024) 11-19 11:15:51.870 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:190) 11-19 11:15:51.870 3262 9258 W clgf : at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:142) 11-19 11:15:51.870 3262 9258 W clgf : at android.content.ContentProviderProxy.call(ContentProviderNative.java:764) 11-19 11:15:51.870 3262 9258 W clgf : at android.provider.Settings$NameValueCache.putStringForUser(Settings.java:3176) 11-19 11:15:51.870 3262 9258 W clgf : at android.provider.Settings$Config.putString(Settings.java:19611) 11-19 11:15:51.870 3262 9258 W clgf : at com.android.internal.util.custom.DeviceConfigUtils.setDefaultProperties(DeviceConfigUtils.java:82) 11-19 11:15:51.870 3262 9258 W clgf : at android.provider.Settings$Config.setStrings(Settings.java:19632) 11-19 11:15:51.870 3262 9258 W clgf : at android.provider.DeviceConfig.setProperties(DeviceConfig.java:1225) 11-19 11:15:51.870 3262 9258 W clgf : at clgb.a(:com.google.android.gms@[email protected] (190400-583159081):46) 11-19 11:15:51.870 3262 9258 W clgf : at clgf.m(:com.google.android.gms@[email protected] (190400-583159081):66) 11-19 11:15:51.870 3262 9258 W clgf : at clgf.e(:com.google.android.gms@[email protected] (190400-583159081):32) 11-19 11:15:51.870 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.g(:com.google.android.gms@[email protected] (190400-583159081):76) 11-19 11:15:51.870 3262 9258 W clgf : at com.google.android.gms.platformconfigurator.PhenotypeConfigurationUpdateListener.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):205) 11-19 11:15:51.870 3262 9258 W clgf : at com.google.android.chimera.IntentOperation.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):2) 11-19 11:15:51.870 3262 9258 W clgf : at agla.onHandleIntent(:com.google.android.gms@[email protected] (190400-583159081):10) 11-19 11:15:51.870 3262 9258 W clgf : at nqe.run(:com.google.android.gms@[email protected] (190400-583159081):70) 11-19 11:15:51.870 3262 9258 W clgf : at nqd.run(:com.google.android.gms@[email protected] (190400-583159081):152) 11-19 11:15:51.870 3262 9258 W clgf : at dvwx.run(:com.google.android.gms@[email protected] (190400-583159081):13) 11-19 11:15:51.870 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 11-19 11:15:51.870 3262 9258 W clgf : at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644) 11-19 11:15:51.870 3262 9258 W clgf : at java.lang.Thread.run(Thread.java:1012) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: Writing exception to parcel 11-19 11:15:51.879 1830 8762 E DatabaseUtils: java.lang.SecurityException: Permission denial to mutate flag, must have root, WRITE_DEVICE_CONFIG, or WRITE_ALLOWLISTED_DEVICE_CONFIG 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.enforceDeviceConfigWritePermission(SettingsProvider.java:2376) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.mutateConfigSetting(SettingsProvider.java:1303) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.insertConfigSetting(SettingsProvider.java:1166) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at com.android.providers.settings.SettingsProvider.call(SettingsProvider.java:449) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at android.content.ContentProvider.call(ContentProvider.java:2679) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at android.content.ContentProvider$Transport.call(ContentProvider.java:628) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at android.content.ContentProviderNative.onTransact(ContentProviderNative.java:307) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at android.os.Binder.execTransactInternal(Binder.java:1339) 11-19 11:15:51.879 1830 8762 E DatabaseUtils: at android.os.Binder.execTransact(Binder.java:1275) 11-19 11:15:51.880 3262 9258 W clgf : setProperties failed with SecurityException [CONTEXT service_id=204 ] Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
* New translations cr_strings.xml (Indonesian) * New translations cr_strings.xml (Indonesian)
* New translations cr_strings.xml (Bulgarian) * New translations cr_strings.xml (Bulgarian) * New translations cr_strings.xml (Bulgarian)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.