2ca51820f038fe612bc39906b40825b537ff54e5 |
|
15-Jun-2017 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Use correct timestamps of events for logging." into oc-dev
|
c766db0a54679cd67884d7366cee8b6e8ecd447c |
|
12-Jun-2017 |
Sudheer Shanka <sudheersai@google.com> |
Use correct timestamps of events for logging. Currently when WM detects certain events, it will notify the logger of these events asynchronously and logger uses the timestamp at which it gets notified to log these events. It's possible that the delay between when the event actually occurs and when the logger gets notified could be large. So for better accuracy, WM should also pass on the event timestamp to the logger. Bug: 62375480 Test: Triggered sysui_multi_action event logs and verified that APP_TRANSITION_DELAY_MS is less than APP_TRANSITION_WINDOWS_DRAWN_DELAY_MS. Test: When the system is not busy, the timestamps we used to log earlier and timestamps we log with this change are almost same. Change-Id: I5f62654a6b7f179d821c0082b180246c8a569df1
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
f1285916c3ab259b216e5f3da3dba397c8e898b8 |
|
10-Jun-2017 |
Wale Ogunwale <ogunwale@google.com> |
Added 'dumpsys activity lastanr' Allows for dumping the activity state during the last anr. This will also be included in collected bug reports. Bug: 38121026 Test: Cause an anr to occur and run 'adb shell dumpsys activity lastanr' Change-Id: I1e4200f9e5cc16bfab98e5af31fc599cdd54cd11
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
983055231b999e450def3e3df377fb4e23420711 |
|
06-May-2017 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #37360626: Apps can schedule alarms (and other things) with temp whitelist There is now an IBinder "token" that must be specified when setting the whitelist duration for an Intent. To have the whitelist supplied, the caller to send a PendingIntent must pass in the same token. The PendingIntent and IntentSender classes now internally maintain this token to pass in when their send() is called. The big complexity for making this work is we now need to associate this whitelist token correctly with the actual PendingIntent objects that applications and other code is getting. To do this, we propagate the token in the Notification object, and have a new API on Parcel that allows us to make it available to PendingIntent when it is unmarshalled. And this allows to deal with PendingIntents appearing in nested bundles, as we can propagate that information from the original Parcel to the new Parcel that Bundle keeps to delay unmarshalling. Test: manual Change-Id: Idda00490ccfe2be37e4ab21354b9ab7528a52750
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
2b9aaedf6310694de31301659ce604ff195b32ee |
|
01-May-2017 |
Karthik Ravi Shankar <karthikrs@google.com> |
Rename CompatibilityDisplay to Vr2dDisplay CompatibilityDisplay used for displaying 2D activities in Vr world. This is confusing in more than one way. To clarify what it really means, rename it to Vr2dDisplay. Changes in this CL - - /s/CompatibilityDisplay/Vr2dDisplay - /s/Compatibility/Vr2d - in CompatibilityDisplay context. Bug: 37851944 Test: cts/hostsidetests/services/activityandwindowmanager/util/run-test CtsServicesHostTestCases android.server.cts.ActivityManagerDisplayTests passes on Marlin. Change-Id: I0a442302fa9d0f48bbd0c01a7766b94369e04386 Signed-off-by: Karthik Ravi Shankar <karthikrs@google.com>
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
99493dbc94989d4493ca6acb0db265a02f49f62e |
|
09-Mar-2017 |
Karthik Ravi Shankar <karthikrs@google.com> |
Launch 2D activities in VR mode When in VR mode, launch all activities into the virtual display ID as provided by the Compatibility display. This includes two cases - - New activity launches - Existing activity in the background. Testing Done: Tested with PlanarVirtualDisplay app and Settings, Calculator and GestureApp with different intent flags. Bug: 36071574 Bug: 36071445 Test: android.server.cts.ActivityManagerDisplayTests Test: #testVrActivityLaunch Test: #testVrActivityReLaunch Change-Id: Ic590a7cbd6f9b339dc83b22a8ffb1252219ef22e Signed-off-by: Karthik Ravi Shankar <karthikrs@google.com>
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
e736185ee90e0f19a7092542cadab4cf561a5703 |
|
07-Mar-2017 |
Sudheer Shanka <sudheersai@google.com> |
Update NPMS to notify AMS when network policy rules are updated. Bug: 27803922 Test: runtest -c com.android.server.am.ActivityManagerInternalTest frameworks-services runtest -c com.android.server.NetworkPolicyManagerServiceTest frameworks-services Change-Id: I357fd5c80b7e6d3e63df95397e328c52f233958b
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
3878ca3333da1bf5cbc83d33e5e8b3ce68c8c5e4 |
|
03-Feb-2017 |
Jorim Jaggi <jjaggi@google.com> |
Fix multi-dimen app transition delay tron event Make sure to log everything. Test: Open app, inspect log. Test: com.android.systemmetrics.functional.AppStartTests Bug: 33086172 Change-Id: I6fdfef625c09267dcf20724e853cf7471abc86c9
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
c9d9407e8ec10a56a4caa3c84122d1c6a1fedaab |
|
22-Feb-2017 |
Sudheer Shanka <sudheersai@google.com> |
Revert "Ensure network connectivity on app start." This reverts commit 27e693158398059d00ff20e60640cb105e255625. Change-Id: I4c41ce7c1839d3b91931bc8a8f117f32bf6cd381
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
27e693158398059d00ff20e60640cb105e255625 |
|
23-Jan-2017 |
Sudheer Shanka <sudheersai@google.com> |
Ensure network connectivity on app start. Bug: 27803922 Test: cts-tradefed run singleCommand cts-dev --module CtsHostsideNetworkTests Change-Id: Ifd7a52924cd6bbc809c9a3f92d52fe2df09b7fe2
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
d993a573d7fcf1a69d35528cae4dd96581c9aacd |
|
05-Feb-2017 |
Wale Ogunwale <ogunwale@google.com> |
Set oom adj for processes displaying app-overlays to PERCEPTIBLE_APP_ADJ For processes with a window of type TYPE_APPLICATION_OVERLAY adjust their oom importance to PERCEPTIBLE_APP_ADJ to reduce the chance of them getting killed by the low-memory-killer since they are displaying something that is perceptible to the user. Also z-order TYPE_DREAM windows above alerts windows. Bug: 33256752 Test: cts/.../run-test CtsAppTestCases android.app.cts.AlertWindowsTests Change-Id: I4c05a9fee6fad61399bf4d10c8647467cc596ca6
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
bab851c7c9dfe6f3d063a1009c4d57cfa2ff005c |
|
04-Feb-2017 |
Felipe Leme <felipeal@google.com> |
Refined session management so Save can be automatically called. This is yet another big refactoring: - AutoFillManager keeps track of its current AutoFillSession. - Views call AFM.startSession(View) when they can trigger autofill. (virtual views can call it as well). At this point, the manager sets an AutoFillSession, gets the activity token, and passes it to the service. - Subsequent calls to AFM.start() will be ignored since the session is set. - When the Activity is gone, it calls AFM.finishSession(). - Simlilarly, virtual views could call it as well. - Added getAutoFillValue() to View. - Removed AFM.updateAutoFillInput(childId): virtual views should now call startSession(childId) to start a session, and use the VirtualViewListener callbacks for updates. - Change AutoFillValue to use String (which is immutable) instead of CharSequence for text values. - Check if view is enabled before auto-filling. - Removed 'cmd autofill fill' since it would require the appCallback - Automatically dismiss the snack bar after 30s - Moved the "don't change autofill value when autofilling" Inception logic into the service side. - Etc... BUG: 34819567 BUG: 33269702 BUG: 31001899 Test: manual verification Test: CtsAutoFillServiceTestCases passes Change-Id: I5fad928d4d666701302049d142026a1efa7291cd
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
bd00fef41ce38d2c711bd4151997c1cd8964b712 |
|
25-Jan-2017 |
Felipe Leme <felipeal@google.com> |
Moar AutoFill Framework refactoring... * Encapsulated application-level auto-fill logic on AutoFillSession. Currently, Activity.java directly manages the IAutoFillCallback binder object used to auto-fill its views, but this logic need to be extended so Views can use it to draw the auto-fill bar. * Pass auto-fill id and boundaries to requests So AutoFillUI can display its affordance in the right places. * Uses a new auto-fill id on View (instead of reusing accessibility's). That allows moving the logic on whether a new request should be made or the existing UI moved to the service side. * Split service methods in 2, for shell cmd and app And applied the right permission check on both. * Removed CancelationSignal from onSaveRequest() Since it's not really needed. * Etc... ¯\_(ツ)_/¯ BUG: 34637800 BUG: 31001899 Test: CtsAutoFillServiceTestCases passes Test: manual verification Change-Id: Ibd0cb2cfff6d0f6bb6b697a423ed5e89df687b82
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
961405613c0570e360fecb05c7d72e61f68e4d46 |
|
21-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Updating picture-in-picture API."
|
85e35643ba245c2d2b96662989aa505f04204cd7 |
|
13-Jan-2017 |
Dianne Hackborn <hackbod@google.com> |
Improve behavior of bg check. There is a new APP_START_MODE_DELAYED_RIGID which means that things discovering something is not allowed to start should report a clear error back to the caller. This is how apps that opt in to bg check should behave, and will now be used if the app op mode is set to ERRORED. This (for now?) removes the code that allows services to be started if the request is coming from a foreground process. That behavior isn't in the current bg check spec, and probably not what we want as the standard platform model (since it makes knowing when a service can start even harder to determine). It was originally done for the experimental bg check work in N to see how much we could avoid breaking existing apps, so not relevant when apps need to explicitly opt in. Also report temporary whitelist changes to activity manager for it to lift background restrictions temporarily for apps. Being on the whitelist is now part of UidRecord, preventing a uid from going idle. Test: Initial CTS test added. Change-Id: I36fd906fa69de8b7ff360605ae17c088f182e172
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
c2baac059c42765351745f1e2d46b685fe889db7 |
|
11-Jan-2017 |
Winson Chung <winsonc@google.com> |
Updating picture-in-picture API. - Consolidating to enterPictureInPictureMode(), the new method will attempt to put the activity into picture-in-picture mode if the activity is visible or pausing in a state that would allow us to pip it. Also consolidate the setting of the PiP aspect ratio and actions into setPictureInPictureArgs(). - Fixing issue with onPause not completing when moving the paused activity between stacks while dispatching onPause Bug: 33692987 Test: android.server.cts.ActivityManagerPinnedStackTests Change-Id: I3af2365f31a9b95de4a92eae46b77108947b2a49
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
a29eb98d9fba99528f0809c448daf2ddae37de7e |
|
14-Dec-2016 |
Winson Chung <winsonc@google.com> |
Adding support for PIP actions. - Introduced generic RemoteAction to represents an action that can be made across processes with an icon and text description based on a Notification action. - Modified PinnedStackController to ensure that it notifies the listeners from the source of truth, this ensures that SysUI is in the right state if killed and re-registers itself. Test: Enable menu & minimize in SystemUI tuner. Test: android.server.cts.ActivityManagerPinnedStackTests Test: #testNumPipActions Change-Id: I5b5d0cf9de3f06b5687337d59cfb91e17355bdb1 Signed-off-by: Winson Chung <winsonc@google.com>
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
7ff418d9a9afb9ecf42f87fffd3e65477decb55e |
|
30-Nov-2016 |
Jeff Sharkey <jsharkey@android.com> |
Grant MMS Uri permissions as the calling UID. A recent security fix prevents the system UID from handing out Uri permission grants directly from itself. Instead, services need to issue grants as the original calling UID to ensure that the caller actually has access to the Uris. Test: builds, boots, send/recv MMS works in primary/secondary users Bug: 33231106 Change-Id: Ia9fe19843b52977c8a94ee5349b907beda1882fc
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
923e0b8811ae07659408624aeeede18bc8b1197c |
|
17-Nov-2016 |
Jeff Sharkey <jsharkey@android.com> |
Check provider access for content changes. For an app to either send or receive content change notifications, require that they have some level of access to the underlying provider. Without these checks, a malicious app could sniff sensitive user data from the notifications of otherwise private providers. Test: builds, boots, PoC app now fails Bug: 32555637 Change-Id: If2dcd45cb0a9f1fb3b93e39fc7b8ae9c34c2fdef
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
e69c93181f1f313dcedd07f677af1cea953fdf16 |
|
01-Nov-2016 |
Jorim Jaggi <jjaggi@google.com> |
The big Keyguard transition refactor (8/n) Don't force mKeyguardGoingAway, as this never recovers. Make sure to only show the dismissing Keyguard activtiy and recover the state when trusted state changes. Test: Make sure Keyguard is in a trusted state, start an activity with FLAG_DISMISS_KEYGUARD from FLAG_SHOW_WHEN_LOCKED activity and make sure there is no flicker. Bug: 32057734 Change-Id: I5d212f6f9d5430250b22c8370f45dc95756432d2
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
fc46e9b643881b7b2ab76854f3a0ac077e9def8d |
|
22-Oct-2016 |
Sudheer Shanka <sudheersai@google.com> |
Move IActivityManager to aidl. Bug: 30977067 Test: Existing tests are passing, dump commands still working. Change-Id: I9cf81c4d381ebce14a6c701e409cbb269f2ff1fb
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
fe762344f4475a3a336bb46aef2d59c1fabf32ab |
|
13-Oct-2016 |
Jorim Jaggi <jjaggi@google.com> |
The big keyguard transition refactor (1/n) The heart of this change are two things: 1) Instead of using the force hide mechanism to hide windows behind Keyguard, we actually make the activities invisible in activity manager. 2) When Keyguard is going away, we change the visibilities in activity manager and run an app transition. At the very core we move the responsibility of hiding activities to ActivityStack, which checks whether Keyguard is showing, and then hides all non-show-when-locked activities. For that, we need to check whether any window of an activity has SHOW_WHEN_LOCKED set. We introduce a callback from WM -> AM in case these Keyguard flags have changed. Furthermore, we decide whether to occlude Keyguard in KeyguardController, which just checks whether the top activity has SHOW_WHEN_LOCKED set. When this state changes, we prepare an occlude/unocclude app transition, and in PWM we just inform the Keyguard about the animation so SysUI can play along this animations in a mostly synchronized manner. Since we now use an app transition when unlocking the phone, we get lockscreen launch animations for free - window manager automatically waits until the activity is drawn, or directly executes the transition if there is nothing to animate. Thus, we can remove all the infrastructure around "waitingForActivityDrawn". The logic to show/hide non-app windows is moved to policy, and we add the ability to run animations on non-app windows when executing an app transition. Test: 1) runtest frameworks-services -c com.android.server.wm.AppTransitionTests 2) Manually test unlocking Keyguard: 2a) Without security 2b) With security 2c) With security but trusted 2d) Portrait while activity behind is in landscape 3) Test launching things from Keyguard 3a) Without security 3b) With security 3c) Launch camera without security 3d) Launch camera with security 3e) Launch camera with securtiy and trusted 3f) Launch voice affordance 4) Set no notifications on lockscreen, drag down, make sure you get the correct animation 5) Test clicking "emergency" on bouncer 5b) Test "Emergency info" on emergency dialer 5c) Test clicking edit button on emergency info, should show pattern on Keyguard Bug: 32057734 Change-Id: Icada03cca74d6a612c1f988845f4d4f601087558
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
33525d2f1a8116820f58fc90941cb53bcba54805 |
|
04-Aug-2016 |
Makoto Onuki <omakoto@google.com> |
ShortcutManager: Update foreground check. - When the cached UID state says a UID is in the background, check with AM and get the latest state, since the state might just have been changed. Bug 30640208 Change-Id: If448f6f21f290fa0fc13550d9c740f56aa8bfce0
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
440a1ea8e2204ecb171e0187318beb2f08f6012c |
|
20-Jul-2016 |
Makoto Onuki <omakoto@google.com> |
Support multiple intents in ShortcutInfo Also fix b/30230996. TODO: Support the sourceBounds argument to LauncherApps. startShortcut(). Bug 30218829 Bug 30230996 Change-Id: Ibb6c59d5b7c0a320c21d09436d016d0eac94644f
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
83f6d2da372de339dc563d6a7786be3facc52e76 |
|
11-Jul-2016 |
Makoto Onuki <omakoto@google.com> |
Throw ActivityNotFoundException when failed to launch shortcut Originally the code used IIntentSender, but I had to switch to calling startActivitiesInPackage() directly, because sendIntentSender() does not support returning errors. Bug 30035853 Change-Id: I5d7669c96a2f1805373c71aebf45b97ac1d01ff6
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
ea11db15bd0cfe6ecbc44dd80a988ddf0e8c1ce7 |
|
25-Jun-2016 |
Makoto Onuki <omakoto@google.com> |
Start shortcuts as if publisher apps did using PendingIntent Bug 29639471 Change-Id: I2aad115669b431cbea785ba92040b1958117ab47
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
6472501f2e7ba018d8aa43c61e55874d756cecb8 |
|
15-Jun-2016 |
Suprabh Shukla <suprabh@google.com> |
Resetting some settings on starting a new demo session Muting ringer and media volume and turning off the flashlight before starting a new session. Also, resetting the configuration of any new demo user to the configuration of user 0 on the device. Moved RetailDemoModeService and RetailDemoModeServiceInternal to more appropriate new packages Bug: 29519612 Change-Id: Ib65f89ce61afab2d2f1b2dd0c761f5d35a466181
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
a1b79bfd7a15006a93da933695359765e0fee495 |
|
24-May-2016 |
Felipe Leme <felipeal@google.com> |
Allow apps to bypass Power Save restrictions when launched from a Notification's PendingIntent. This scenario typically happens when the device is on Doze Mode and a notification action is triggered from a Wear device. In a nutshell, the workflow is: - ProcessRecord has a flag telling whether a process has "whitelist management" privileges. - When NotificationManager binds a new NotificationListenerService, it sets the BIND_ALLOW_WHITELIST_MANAGEMENT flag. - On bind(), ActiveService asserts that only system apps can set that flag. - On computeOomAdjLocked(), ActivityManagerService sets the ProcessRecord flag if necessary. - Upon creating a notification, NotificationManager calls AM to mark its PendingIntents as coming from a notification. - When PendingIntentRecord sends it to the target, it checks if it's from a notification and if so calls AM to do the temp whitelist. - On unbind(), ActiveService removes the ProcessRecord flag if necessary. Fixes: 28818704 Change-Id: I00d46036a2cbb73f7f733fd35bf0b743a02807a1
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
f8451b98150564b340207327d0951f44753338d1 |
|
01-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Kill foreground apps when turning off work While work apps will all be killed as we stop the profile user when turning off work, this can sometimes take a while. So let's kill the foreground apps as soon as work profile is being turned off to make the user experience nicer. Bug: 27631526 Change-Id: Icdd3799385a98ee531b0b4247e8ede78f6f10da8
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
853304c0b11921db142a3945ab66fae5f0cc7d8a |
|
18-Apr-2016 |
Tony Mak <tonymak@google.com> |
Show work challenge in if user in docked stack is locked Register docked stack listener in ActivityManagerService. If the docked stack is leaving minimized state, check whether the user of the docked stack is locked. If yes, show credential confirmation. Also, we now show work challenge in home task. And we now scan the entire top task to handle the case the work app is somewhere in the middle of the task. (eg: open personal camera in work app) Bug: 27565539 Bug: 28094505 Change-Id: Iaf0738f43ae916a535b17949ec0f322bbfb194dc
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
e8222e551f8abd2d82ca4f77ddb275e2e509751e |
|
09-Apr-2016 |
Amith Yamasani <yamasani@google.com> |
Multi-window assist callback Introducing a new callback in VoiceInteractionSession to provide assist data for additional activities in the foreground in a multiwindow setup. PIP, docked windows and free-form windows (top-most) will be queried for assist data and passed through the new API to the Voice Interaction service. Bug: 27718385 Change-Id: Ib4427c304611b75c2078dcb54f1f7e47ae7d9cfa
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
192086eb8aff3fb873a7e03ade0b81652aacf25f |
|
11-Mar-2016 |
Jorim Jaggi <jjaggi@google.com> |
Implement transition for docking task in recents #1 - When the docking transition is happening, defer updating the bounds of the home stack until the transition is done. This is to preserve the scrim which is drawn in the recents activity. - Use the PROLONG_AT_START infrastructure to hide the task in recents when starting the app transition. - When recents finally get resized at the end of the transition, reset it's draw state so we don't move the old surface around, and the new surface gets drawn at the new position, to avoid flickering. - Remove hack around not layouting docked divider if it's not visible, it's not needed anymore and resulted in a wrong initial position. - Fix animation selection for docked stack divider. - Make sure win.moved() always gets called. Bug: 27607141 Change-Id: I76c35f09461f044a90e2c88335008284b5839cc0
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
275561a74677f9d6c8f3f2cebc3cfea416ca586d |
|
23-Feb-2016 |
Jorim Jaggi <jjaggi@google.com> |
App transition delay tracking Add TRON logging for all kinds aspects when we execute an app transition. Bug: 27295491 Change-Id: Icb0cbdb92d4d5fbfedadd40a017a50eb217058aa
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
0af6fa7015cd9da08bf52c1efb13641d30fd6bd7 |
|
18-Jan-2016 |
Amith Yamasani <yamasani@google.com> |
Voice Interaction from within an Activity This allows an app to show a voice search button and invoke a voice interaction session for use within the activity. Once the activity exits, the session is stopped. Test application has a new activity that demonstrates it with the test voice interaction service. This initial version is functional enough for an integration test, with some more tests and improvements to come later. Bug: 22791070 Change-Id: Ib1e5bc8cae1fde40570c999b9cf4bb29efe4916d
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
515d40600e1f11c7cea3a2bfbbb49e7d86ff801f |
|
28-Sep-2015 |
Amith Yamasani <yamasani@google.com> |
Delay cleaning user tasks until user is removed Fixes #24301208 No recent apps shows when switching between users. Instead of cleaning up when stopping a user, we should remove tasks when removing a user, since recents tasks should be persisted across reboots. Reboots are similar to stopping and starting users. Change-Id: I9a250792077cca5f18ae1a10bc36f7b97e8ea867
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
b501330a1b6ef14ff512a5727f7a01bc423d6fbb |
|
18-Apr-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Disable multi-user background recording On user switch, kill existing processes of the background user with android.permission.RECORD_AUDIO permission. Home activity should not be killed to avoid an expensive restart of the home launcher, when the user switches back. Introduced DISALLOW_RECORD_AUDIO user restriction, which is enabled for the background user, and removed for the foreground user. Introduced a concept of system controlled user restriction, which can only be set by the system, rather than device administrator. Bug: 20346194 Change-Id: Ic942fd565e80d14424230dae612965a8e229c4ef
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
061ea99546fbba1da86094518992cf6b7a125278 |
|
18-Apr-2015 |
Jeff Brown <jeffbrown@google.com> |
Make activity manager sleep top activity when dreaming. Added the concept of a sleep token to represent a demand to sleep. We grab this token whenever a dream window is visible. This change also deletes a special condition in shouldSleepLocked() which would tend to keep activities running when the lock screen was shown unless they had previously been sleeping. I believe this condition is no longer necessary and the policy is much simpler without it. Let's see if anything breaks. NOTE: This can currently only be used within the system server process but it might make sense to move it to IActivityManager (guarded by DEVICE_POWER permission) so that keyguard can use it. If we added a callback on release to inform the client that the underlying activity has finished drawing then we could untangle a bunch of keyguard specific logic. Bug: 18866521 Change-Id: I84b2118f5b990a71a1647d1cee536ad3d99f3a24
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
fbe96706bb9754f9ea3f6345f32e058a45ad10b4 |
|
20-Nov-2014 |
Jeff Brown <jeffbrown@google.com> |
Support keeping activities resumed while dozing. If the lock screen is not shown, then let activities keep running while dozing. This is important to support ambient mode on watches since it allows the home app to keep running. To make this possible, we need to inform the activity manager about the exact wakefulness state, not just the overall boolean interactive state. Bug: 18284212 Change-Id: Ia35c99127ce51ffc178f3a2f51fca67d24061c71
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
810c052d9b117217152c2a609ccec056a2a61d1e |
|
25-Jul-2014 |
Primiano Tucci <primiano@google.com> |
Cherry pick Introduce startIsolatedProcess private API in ActivityManager DO NOT MERGE The new API spawns a isolated process, using a custom uid, entrypoint and abi. Such API is used by the WebViewFactory to spawn its unpriviledged but trusted process (hence the fixed uid) which rewrites the rerlo file on boot / when an update occurs. Since both the ActivityManager service and the WebViewUpdate service live in the SystemServer their calls be dispatched locally and no binder interface needs to be exposed for the new startIsolatedProcess API. Original BUG:16403706 Original Change-Id: I327b59735c12698595e0dbcc4da5d759c9103b0a Bug: 16723226 Change-Id: Iecb49888e11eec9d302d9712953fd498db5821af
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|
13014b5fe5967b3c7e232ffaf81581ed178e6df6 |
|
08-Apr-2014 |
Jeff Brown <jeffbrown@google.com> |
Move certain internal activity manager methods to new class. This is a little bit of refactoring in preparation for changing how the power manager notifies system components about changes in power state. Deleted the startRunning method since it is no longer useful. Bug: 13133142 Change-Id: I7f845c61ecc7ee890154ed0cbd90795de609b7ea
/frameworks/base/core/java/android/app/ActivityManagerInternal.java
|