{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":52890811,"defaultBranch":"cr-11.0","name":"android_frameworks_native","ownerLogin":"CarbonROM","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-03-01T16:12:46.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/9575752?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1707945765.0","currentOid":""},"activityList":{"items":[{"before":"f098a56955229dc9ac8f912029c36ac8ec291be0","after":"09914efeefc9d75cec3d264c83723826b55c5bb6","ref":"refs/heads/cr-11.0","pushedAt":"2024-02-14T21:24:58.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r14' into cr-11.0\n\nAndroid Security 13.0.0 Release 14 (11228180)\n\nChange-Id: I809dadb8c90c30ee7dddd720202d7ad03f4225c0","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r14' into cr-11.0"}},{"before":"ffc822bdfeccd53e94c279e437e1cbf883c4eee4","after":"b39851db6b14b877f5ac87920c0089f8f23d3fa6","ref":"refs/heads/cr-8.0","pushedAt":"2024-02-01T16:49:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Allow sensors list to be empty\n\nTest: atest VtsHalSensorManagerV1_0TargetTest\nBug: 278013275\nBug: 269014004\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:49600b10aa5675d4e7e985203d69f252ead13e45)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7057a9f08d98bfec8ffbabcf00f2885d3909c6c9)\nMerged-In: I091f57de9570b0ace3a8da76f16fe0e83f0aa624\nChange-Id: I091f57de9570b0ace3a8da76f16fe0e83f0aa624","shortMessageHtmlLink":"Allow sensors list to be empty"}},{"before":"bb1880f4944435a38099f32c830df0f96ccf1869","after":"f098a56955229dc9ac8f912029c36ac8ec291be0","ref":"refs/heads/cr-11.0","pushedAt":"2023-12-07T00:40:30.000Z","pushType":"push","commitsCount":444,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r12' into cr-11.0\n\nAndroid Security 13.0.0 Release 12 (10993242)\n\nChange-Id: Ifc73de97e0f812c719f9abe7281e3567a56843d9","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r12' into cr-11.0"}},{"before":"af63b8034b9aadc2d6bdfbdd2c3861ac845fd5e1","after":"bb1880f4944435a38099f32c830df0f96ccf1869","ref":"refs/heads/cr-11.0","pushedAt":"2023-09-30T20:36:42.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r75' into cr-11.0\n\nAndroid 13.0.0 release 75\n\nChange-Id: I9c134dcc013e241489da4b01182f5387724f590c","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r75' into cr-11.0"}},{"before":"108a29f75d582a9ad7f9011a945b49286d433fbb","after":"dc9cfa4ea8d558b156a8194f51b773721ee5721c","ref":"refs/heads/cr-9.0","pushedAt":"2023-09-17T02:36:45.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-11.0.0_r71' into cr-9.0\n\nAndroid security 11.0.0 release 71\n\nChange-Id: I2d1c9718e7572fdfa06ae0ed8807e69532699a57","shortMessageHtmlLink":"Merge tag 'android-security-11.0.0_r71' into cr-9.0"}},{"before":"c60aae349ff44a59d0d3ed6433848245fa4ce231","after":"af63b8034b9aadc2d6bdfbdd2c3861ac845fd5e1","ref":"refs/heads/cr-11.0","pushedAt":"2023-06-23T13:40:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"libgui: reset buffer count to max slots instead of returning BAD_VALUE.\n\nCRs-Fixed: 3013293\n\nChange-Id: Idfafcd6aa718054ff749bd5d1c7eb2630be0f109","shortMessageHtmlLink":"libgui: reset buffer count to max slots instead of returning BAD_VALUE."}},{"before":null,"after":"c60aae349ff44a59d0d3ed6433848245fa4ce231","ref":"refs/heads/cr-11.0_r43","pushedAt":"2023-06-23T13:00:08.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"libgui: reset buffer count to max slots instead of returning BAD_VALUE.\n\nCRs-Fixed: 3013293\n\nChange-Id: Idfafcd6aa718054ff749bd5d1c7eb2630be0f109","shortMessageHtmlLink":"libgui: reset buffer count to max slots instead of returning BAD_VALUE."}},{"before":"299c5bfdec47ee39f098a4cd304f4acbcf9cc163","after":"ffc822bdfeccd53e94c279e437e1cbf883c4eee4","ref":"refs/heads/cr-8.0","pushedAt":"2023-06-18T15:39:47.148Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Add removeInstanceForPackageMethod to SensorManager\n\nIn order to ensure that clients don't leak their sensor manager\ninstance that we currently store in a static map, they need to be able\nto remove their instance. Otherwise, this instance is never removed from\nthe list and will hang around until our SensorManage instance is\ndestroyed.\n\nBug: 269014004\nTest: Run ./libsensorserviceaidl_fuzzer\nChange-Id: I52185f74ae8d28b379440235ca6f03c5089081f5\n(cherry picked from commit 9532f7c682fdd4b1e6e553cd6f61fc0cf2555902)\nMerged-In: I52185f74ae8d28b379440235ca6f03c5089081f5\n(cherry picked from commit on googleplex-android-review.googlesource.com host: 4521fbf8095439a1c1681b5c709b306a5dc1d1e3)\nMerged-In: I52185f74ae8d28b379440235ca6f03c5089081f5","shortMessageHtmlLink":"Add removeInstanceForPackageMethod to SensorManager"}},{"before":"1ac61c346002d44b792baf49efc9b3514749ade6","after":"c60aae349ff44a59d0d3ed6433848245fa4ce231","ref":"refs/heads/cr-11.0","pushedAt":"2023-06-07T15:42:12.321Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"libgui: reset buffer count to max slots instead of returning BAD_VALUE.\n\nCRs-Fixed: 3013293\n\nChange-Id: Idfafcd6aa718054ff749bd5d1c7eb2630be0f109","shortMessageHtmlLink":"libgui: reset buffer count to max slots instead of returning BAD_VALUE."}},{"before":"b8368f8cc6c54d5ff207e0733da15856b7f9c4dc","after":"299c5bfdec47ee39f098a4cd304f4acbcf9cc163","ref":"refs/heads/cr-8.0","pushedAt":"2023-06-02T18:56:53.903Z","pushType":"push","commitsCount":1,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Mitigate the security vulnerability by sanitizing the transaction flags.\n\n- This is part of fix of commit\n Id9d9012d4ede9c8330f0ce1096bcb78e51b7c5df for backporting.\n- Part of commit Id9d9012d4ede9c8330f0ce1096bcb78e51b7c5df which\n sanitizes the transaction flags from DisplayState instead.\n- In rvc, we only have ACCESS_SURFACE_FLINGER permission check passed as\n `privileged` argument in SF::applyTransactionState. We can directly\n utilize it for sanitization in DiaplyState.\n- In rvc code base, SF::setTransactionState pass a const array of\n displayState objects and then call SF::applyTransactionState. To\n successfully sanitize the flags for each displayState object, we\n convert this const array into non-const one before calling\n SF::applyTransactionState.\n\nBug: 248031255\nTest: test using displaytoken app manually on the phone, test shell\nscreenrecord during using displaytoken; atest\nandroid.hardware.camera2.cts.FastBasicsTest\n\nChange-Id: Id9d9012d4ede9c8330f0ce1096bcb78e51b7c5df\nMerged-In: Id9d9012d4ede9c8330f0ce1096bcb78e51b7c5df\n(cherry picked from commit 03d4458ea0cb00c28f695d99aae5e4c6b15fc237)\nMerged-In: Id9d9012d4ede9c8330f0ce1096bcb78e51b7c5df","shortMessageHtmlLink":"Mitigate the security vulnerability by sanitizing the transaction flags."}},{"before":"948e041c0c2b394b8026f118b4e43b1ddb8ce757","after":"108a29f75d582a9ad7f9011a945b49286d433fbb","ref":"refs/heads/cr-9.0","pushedAt":"2023-05-13T02:12:45.344Z","pushType":"push","commitsCount":5,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-11.0.0_r67' into cr-9.0\n\nAndroid security 11.0.0 release 67\n\nChange-Id: Ie69b236c5c7123ca2732494e8037151cfa7aadde","shortMessageHtmlLink":"Merge tag 'android-security-11.0.0_r67' into cr-9.0"}},{"before":"7266561472a0af3443fe51c2ccaf7caf7ad0d7bf","after":"1ac61c346002d44b792baf49efc9b3514749ade6","ref":"refs/heads/cr-11.0","pushedAt":"2023-05-03T13:09:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"CompositionEngine: Request device composition for the Udfps touched layer\n\nThe FOD layers should be always composed by the device to set the\ncustom zpos bits to the kernel. By default all layers are set to\ndevice composition and the proprietary libsdmextension.so moves\nsome to client composition. Unfortunately that also affects the\nUdfps touched layer. After this commit the layer below the Udfps\ntouched layer is forced to be client composition. For unknown\nreasons libsdmextension will not change the Udfps touched layer\nto client composition anymore.\n\ntests:\n- Run 'adb shell dumpsys SurfaceFlinger' and ensure that the Udfps\n touched layer is composed by the device\n- Ensure that the Udfps touched layer correctly sets the zpos bits\n on the kernel while / after using WFD\n\nSigned-off-by: daniml3 \nSigned-off-by: Arian \nChange-Id: I8aeb98d18557ad4e971eaba74700ceb3058273ab","shortMessageHtmlLink":"CompositionEngine: Request device composition for the Udfps touched l…"}},{"before":"77089f40c1f1c9b539dc58c40850c19132023074","after":"7266561472a0af3443fe51c2ccaf7caf7ad0d7bf","ref":"refs/heads/cr-11.0","pushedAt":"2023-05-01T13:50:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"CompositionEngine: Request device composition for the Udfps touched layer\n\nThe FOD layers should be always composed by the device to set the\ncustom zpos bits to the kernel. By default all layers are set to\ndevice composition and the proprietary libsdmextension.so moves\nsome to client composition. Unfortunately that also affects the\nUdfps touched layer. After this commit the layer below the Udfps\ntouched layer is forced to be client composition. For unknown\nreasons libsdmextension will not change the Udfps touched layer\nto client composition anymore.\n\ntests:\n- Run 'adb shell dumpsys SurfaceFlinger' and ensure that the Udfps\n touched layer is composed by the device\n- Ensure that the Udfps touched layer correctly sets the zpos bits\n on the kernel while / after using WFD\n\nSigned-off-by: daniml3 \nSigned-off-by: Arian \nChange-Id: I8aeb98d18557ad4e971eaba74700ceb3058273ab","shortMessageHtmlLink":"CompositionEngine: Request device composition for the Udfps touched l…"}},{"before":null,"after":"77089f40c1f1c9b539dc58c40850c19132023074","ref":"refs/heads/cr-11.0_r30","pushedAt":"2023-05-01T00:28:31.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r30' into cr-11.0\n\nAndroid 13.0.0 Release 30 (TQ1A.230205.002)\n\nChange-Id: Icc96c2bb6de8a54578df0f36eb6f9222aa1b352e","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r30' into cr-11.0"}},{"before":"154f4ea9a420e1953d92c0ed176536273482ce26","after":"948e041c0c2b394b8026f118b4e43b1ddb8ce757","ref":"refs/heads/cr-9.0","pushedAt":"2023-04-30T15:54:00.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"CarbonGerritBot","name":"Roxxy","path":"/CarbonGerritBot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24492250?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-11.0.0_r66' into cr-9.0\n\nAndroid Security 11.0.0 Release 66 (9682389)\n\nChange-Id: I7573f9ffab24ca7ea64f3b0f0e98837ecae0e594","shortMessageHtmlLink":"Merge tag 'android-security-11.0.0_r66' into cr-9.0"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD-vuz-wA","startCursor":null,"endCursor":null}},"title":"Activity · CarbonROM/android_frameworks_native"}