{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":75639894,"defaultBranch":"lineage-21.0","name":"android_frameworks_av","ownerLogin":"LineageOS","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-12-05T15:41:27.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/24304779?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1725871349.0","currentOid":""},"activityList":{"items":[{"before":"34e3e39fec7fc83579cde07f9f0f780f5983ea59","after":"17fdb80d01ef17849c4d4e1100d05d29977117b2","ref":"refs/heads/lineage-20.0","pushedAt":"2024-09-13T15:10:31.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r21' into staging/lineage-20.0_android-security-13.0.0_r21\n\nAndroid security 13.0.0 release 21\n\n* tag 'android-security-13.0.0_r21':\n omx: check HDR10+ info param size\n\nChange-Id: I1c527bf62adfd507edf27b18d25012e2ce4fc00c","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r21' into staging/lineage-20.0_and…"}},{"before":null,"after":"1863cb0ea5a9e1340f11a435618ff863e017da29","ref":"refs/heads/lineage-22.0","pushedAt":"2024-09-09T08:42:29.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge cherrypicks of ['googleplex-android-review.googlesource.com/27847399'] into 24Q3-release.\n\nChange-Id: I33f8f9a3c29d8dd3c74564c2df1963bc72756070","shortMessageHtmlLink":"Merge cherrypicks of ['googleplex-android-review.googlesource.com/278…"}},{"before":"a2bd776597d8eff0437bd6bbcaca12ba8a0a5834","after":"34fa5d146a5fdba488711e34b7a899472185fc9f","ref":"refs/heads/lineage-21.0","pushedAt":"2024-09-07T22:11:41.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r67' into staging/lineage-21.0_merge-android-14.0.0_r67\n\nAndroid 14.0.0 release 67\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZteF1wAKCRDorT+BmrEO\n# eDpBAJ9ogh8GVbvQ2CIGqhRkYPOmSUFHlQCfYigTnasa1esLk6RQSt0CIK9hv5k=\n# =p5E5\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Wed Sep 4 00:55:35 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2593 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Wonsik Kim\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r67':\n omx: check HDR10+ info param size\n\nChange-Id: If0c7605338b861e0b0c352f6a59166d10ca45a4e","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r67' into staging/lineage-21.0_merge-androi…"}},{"before":"923916e8261b7211d1c8639ff401ecb2b46ea292","after":"e9b312c236408b1d33cb9209fb0686c7ae4171a1","ref":"refs/heads/lineage-19.1","pushedAt":"2024-08-24T17:05:51.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"StagefrightRecoder: Disabling B-frame support\n\nDisabling b-frame support from stagefright recorder in case of\naudio source as mic and video source is surface use case only\nbecause screen recorder with microphone doesn't play in sync\nif b-frame is enabled.\nIf the audio source selected is INTERNAL (i.e. device) or\nMIC_AND_INTERNAL with screen recorder then b frame is supported.\n\nBug: 288549440\nTest: manually check screen recording with audio from mic has audio/video in synch\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:af685c66bab17b71fe1624f76b5d55628f79e6fa)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:da3407f7688f35eb2dce79f1405feeb182241a3c)\nMerged-In: I4098655eb9687fb633085333bc140634441566e6\nChange-Id: I4098655eb9687fb633085333bc140634441566e6","shortMessageHtmlLink":"StagefrightRecoder: Disabling B-frame support"}},{"before":"214685e2de63df75def32de6356a4d2853f5d5b7","after":"34e3e39fec7fc83579cde07f9f0f780f5983ea59","ref":"refs/heads/lineage-20.0","pushedAt":"2024-08-12T11:56:36.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r20' into staging/lineage-20.0_android-security-13.0.0_r20\n\nAndroid Security 13.0.0 Release 20 (11933030)\n\n* tag 'android-security-13.0.0_r20':\n StagefrightRecoder: Disabling B-frame support\n libmediatranscoding: handle death recipient cookie ownership differently\n\nChange-Id: If5ed89e45a3fdb362bdbc1a9557887247d79753e","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r20' into staging/lineage-20.0_and…"}},{"before":"a25ba038b19ba3b7944689627c599f276426e411","after":"a2bd776597d8eff0437bd6bbcaca12ba8a0a5834","ref":"refs/heads/lineage-21.0","pushedAt":"2024-08-10T21:27:05.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r55' into staging/lineage-21.0_merge-android-14.0.0_r55\n\nAndroid 14.0.0 Release 55 (AP2A.240805.005)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZrKMGgAKCRDorT+BmrEO\n# eK2QAJ9a5tqcpP5+8UGNHYtvBelbQm3t/ACeIILuHRYPa3jgxupiwxdN9YfLKGY=\n# =l8gi\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Aug 6 21:48:26 2024 WEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Can't check signature: No public key\n\n# By Devin Moore (2) and Andrew Lewis (1)\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r55':\n Revert^2 \"StagefrightRecoder: Disabling B-frame support\"\n libmediatranscoding: handle death recipient cookie ownership differently\n Track DeathNotifier cookie lifetime\n\nChange-Id: I6b181ddc9ae79c9b4ccdd7e033bd45afd1a14817","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r55' into staging/lineage-21.0_merge-androi…"}},{"before":"0d0d2758906221dd5ddb25ff4377dfa287b5f575","after":"a25ba038b19ba3b7944689627c599f276426e411","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-06T05:20:50.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r53' into staging/lineage-21.0_merge-android-14.0.0_r53\n\nAndroid 14.0.0 release 53\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZoRX5AAKCRDorT+BmrEO\n# eNR7AJ9OYw98BR56xmj+/g+I2FaFXV7Y8wCeNzZgGC9fLTrIqN6wlj5Y2du0EKk=\n# =S3zm\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Jul 2 22:41:24 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2553 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Shunkai Yao\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r53':\n Use customized event flag for data FMQ not_empty to avoid conflict\n\nChange-Id: If03a78f631b1e020651f6c79d19e196bf8ddbd80","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r53' into staging/lineage-21.0_merge-androi…"}},{"before":"372a94d11a1fd9d90e8c9763d7d3774a0b015259","after":"0d0d2758906221dd5ddb25ff4377dfa287b5f575","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-01T10:43:13.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"codec2: a workaround to solve backward compatibility issue\n\nAs framework change depends on HAL change . In those platforms only\nhave framework change, the empty work couldn't be handled properly.\nThen the result C2_NOT_FOUND will be returned and framework will report\na fatal error to client. We have to avoid such dependency issue\n\nCRs-Fixed: 2916108\n\nChange-Id: I5270f5e2bd1922b84fb34364bb4cb8522ff389ec","shortMessageHtmlLink":"codec2: a workaround to solve backward compatibility issue"}},{"before":"7dc5885c46bf0f685e6ab10af5996e38403a541a","after":"372a94d11a1fd9d90e8c9763d7d3774a0b015259","ref":"refs/heads/lineage-21.0","pushedAt":"2024-06-22T01:41:51.000Z","pushType":"push","commitsCount":1227,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r50' into staging/lineage-21.0_merge-android-14.0.0_r50\n\nAndroid 14.0.0 Release 50 (AP2A.240605.024)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzpQAKCRDorT+BmrEO\n# eJLtAJ43wF6qlq+J5XXdLJ+yWK58/er2DACfacvUKEF8Ioc8D8q6EaNj1laJ59M=\n# =oxwW\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Jun 11 00:44:05 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2480 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Andy Hung (28) and others\n# Via Automerger Merge Worker (486) and others\n* tag 'android-14.0.0_r50': (357 commits)\n MPEG4Writer: Remove timestamp validation\n VTS: check ro.vendor.api_level instead of ro.board.(first_)api_level\n Revert \"Introduce AttributionAndPermissionUtils.\"\n Fix playbackHeadPosition after starting tracks with a startThresholdInFrames\n Add Java library to query state of VirtualCamera build flag.\n Fail if there's problem with tmp buffer during JPEG capture\n Only add the AIDL manifest decl when using unfrozen\n Remove Android.mk files which are not needed any more.\n Extend output format with downscalable resolutions\n AudioStreamOut: Align with AudioStreamIn\n Improve AudioMix registration/unregistration\n android.media.codec-aconfig-cc: Set double_loadable to true\n EffectBufferHalAidl: remove ashmem mapping\n AudioPolicyService: Make device effect init synchronous\n AudioSystem: Move AudioPolicyService fetch to ServiceHandler\n VtsHalMediaC2: start thread pool\n media.c2 client: fix # of queried param count\n Spatializer: replace parameters with AIDL type\n AudioSystem: Move AudioFlinger fetch to ServiceHandler\n audiosystem_tests: Fix false test failures\n ...\n\n Conflicts:\n\tmedia/codec2/sfplugin/CCodecBufferChannel.cpp\n\tservices/camera/libcameraservice/utils/SessionConfigurationUtils.h\n\nChange-Id: Icadd2c7d79ab43dc7e7a740d9afc01d21f16ce6e","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r50' into staging/lineage-21.0_merge-androi…"}},{"before":"2d75070ddb019a2c8fa084dd0a4af2f319395db0","after":"214685e2de63df75def32de6356a4d2853f5d5b7","ref":"refs/heads/lineage-20.0","pushedAt":"2024-05-15T12:32:37.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Reapply \"Audio policy: anonymize Bluetooth MAC addresses\"\n\nThis reverts commit 128b3524828ec8fdcc7fe06246077e3c20b1cb61.","shortMessageHtmlLink":"Reapply \"Audio policy: anonymize Bluetooth MAC addresses\""}},{"before":"c2809dba0db2bd052560e0d2a0b7c8e96132fc6a","after":"7dc5885c46bf0f685e6ab10af5996e38403a541a","ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-01T17:24:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"libaudiohal: only call getAudioPort if it is supported.\n\nThe getAudioPort API is supported since HAL version 3.0. Do not call\ngetAudioPort API if it is not supported.\n\nBug: 329548103\nTest: dumpsys audio policy with USB device connected\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:ce66fa6dabf2440ccc0e848ef94ecb2a391905b4)\nMerged-In: I6e107c9a394bffc30728041c21b31e148d1d9f20\nChange-Id: I6e107c9a394bffc30728041c21b31e148d1d9f20","shortMessageHtmlLink":"libaudiohal: only call getAudioPort if it is supported."}},{"before":"5f431141f604597ee2a164e0171123bc76efc691","after":"c2809dba0db2bd052560e0d2a0b7c8e96132fc6a","ref":"refs/heads/lineage-21.0","pushedAt":"2024-04-05T15:34:01.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r31' into staging/lineage-21.0_merge-android-14.0.0_r31\n\nAndroid 14.0.0 Release 31 (AP1A.240405.002.A1)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZgs/1gAKCRDorT+BmrEO\n# eDhFAJwIqIlCMu44pxc6BT/TBiDKpNaqfQCfZ/1nKrORdrUPUaBJ9CJFy/8GSOQ=\n# =GuOC\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Apr 2 02:14:30 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2404 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By malikakash\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r31':\n Fix VendorTagDescriptorCache::getTagType\n Fix VendorTagId to be metadata_vendor_id_t\n\nChange-Id: I2b9c6feccdb50679f9db42559c25175066fe81f3","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r31' into staging/lineage-21.0_merge-androi…"}},{"before":"c8123dc4725ef473b4d7e1e98bd78d556ee22798","after":"5f431141f604597ee2a164e0171123bc76efc691","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-27T01:06:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"libcameraservice: Use the correct vendor tag id type on filterParameters\n\nThis fixes an overflow caused by using the `int` type, thus breaking\nthe camera on cases where the actual vendor tag id is bigger than the\nmaximum value `int` can hold.\n\nTest: Open camera, make sure that preview shows correctly and that\n there are no vendor tag errors in logs.\nChange-Id: Ia00e9e3fcc737bfaf0a917f11690f15d686441ba\nSigned-off-by: danielml ","shortMessageHtmlLink":"libcameraservice: Use the correct vendor tag id type on filterParameters"}},{"before":"dc23cead33f0d3c199605787048baeaffcf97c3e","after":"c8123dc4725ef473b4d7e1e98bd78d556ee22798","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-21T08:03:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! Camera: Skip stream size check for whitelisted apps\n\nChange-Id: I29ae6e5d821163c2566e23ea83330bba065248d5","shortMessageHtmlLink":"fixup! Camera: Skip stream size check for whitelisted apps"}},{"before":"d0a2227536f3ff596e33610312701bd3a7d733ce","after":"dc23cead33f0d3c199605787048baeaffcf97c3e","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-20T19:34:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! Revert \"stagefright: remove Miracast sender code\"\n\nChange-Id: Ia6948e6c6d71f437fa118185a9df8bcd4ce47575","shortMessageHtmlLink":"fixup! Revert \"stagefright: remove Miracast sender code\""}},{"before":"0900dd0c2384e151588c4bea492f13ee516aebd7","after":"d0a2227536f3ff596e33610312701bd3a7d733ce","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-20T18:32:17.000Z","pushType":"push","commitsCount":9664,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r29' into staging/lineage-21.0_merge-android-14.0.0_r29\n\nAndroid 14.0.0 release 29\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZW4wAKCRDorT+BmrEO\n# eJuYAJ92dgKxEGffS2EOHy41mwZziOUGoQCeJB+MQmccRlDdNM0YxmgReFt7ZqU=\n# =ZOeF\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Mar 5 01:18:59 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2345 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Andy Hung (305) and others\n# Via Automerger Merge Worker (7353) and others\n* tag 'android-14.0.0_r29': (1138 commits)\n Revert \"StagefrightMetadataRetriever: check P010 support when computing bitdepth\"\n Add API for preparing to disconnect external device.\n libaudiohal@aidl: Fix handling of stream config suggestion\n libaudiohal@aidl: Remove non-working code for HAL PIDs retrieval\n Enable dav1d decoder as another av1 decoder\n Revert \"libaudiohal@aidl: Work around use of unsupported mix por...\"\n Revert \"libaudiohal@aidl: Remove non-working code for HAL PIDs r...\"\n Revert \"libaudiohal@aidl: Fix handling of stream config suggestion\"\n Revert \"Enable AIDL HAL support in the framework\"\n C2SoftDav1dDec: Replace memcpy with dav1d_data_wrap\n Support dumping from given position and migrate code\n C2SoftDav1dDec: Move libyuv calls to SimpleC2Component\n Support the dav1d decoder in a new codec2 component\n Free data queue before closing data file descriptor.\n Add API for preparing to disconnect external device.\n Support RGBA input buffers.\n Fix crash when there's unexpected non-YUV buffer input.\n 1. lambda param explicit capture by-ref 2. ExternalMetaItem field init order.\n Missing NULL Check\n libaudiohal@aidl: Work around use of unsupported mix port configurations\n ...\n\n Conflicts:\n\tmedia/libmediaplayerservice/Android.bp\n\tmedia/utils/ServiceUtilities.cpp\n\tservices/audiopolicy/service/AudioPolicyService.cpp\n\tservices/camera/libcameraservice/common/CameraDeviceBase.h\n\tservices/camera/libcameraservice/utils/SessionConfigurationUtils.cpp\n\tservices/camera/libcameraservice/utils/SessionConfigurationUtils.h\n\nChange-Id: Ic6cd1f6d1af062310322a19d452aac1712b40b05","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r29' into staging/lineage-21.0_merge-androi…"}},{"before":"b4337548f6b7d58e531c3ae2b68b225db2880006","after":"923916e8261b7211d1c8639ff401ecb2b46ea292","ref":"refs/heads/lineage-19.1","pushedAt":"2024-03-16T14:20:00.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Fix out of bounds read and write in onQueueFilled in outQueue\n\nBug: 276442130\nTest: POC in bug descriptions\n(cherry picked from https://partner-android-review.googlesource.com/q/commit:7aef41e59412e2f95bab5de7e33f5f04bb808643)\n(cherry picked from commit 8f4cfda9fc75f1e9ba3b6dee3fbffda4b6111d64)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:208e430bc6380fafafca8041b239f835263a9d47)\nMerged-In: Ic230d10048193a785f185dc6a7de6f455f9318c1\nChange-Id: Ic230d10048193a785f185dc6a7de6f455f9318c1","shortMessageHtmlLink":"Fix out of bounds read and write in onQueueFilled in outQueue"}},{"before":"2b3a690861c4c5bcac2809354f9b04241945db0f","after":"2d75070ddb019a2c8fa084dd0a4af2f319395db0","ref":"refs/heads/lineage-20.0","pushedAt":"2024-03-16T13:54:33.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r15' into staging/lineage-20.0_android-security-13.0.0_r15\n\nAndroid security 13.0.0 release 15\n\n* tag 'android-security-13.0.0_r15':\n Fix out of bounds read and write in onQueueFilled in outQueue\n SoftVideoDecodeOMXComponent: validate OMX params for dynamic HDR\n Validate OMX Params for VPx encoders\n\nChange-Id: I3255f112daf17a7a0c4cac6e5fa01c291df06bb4","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r15' into staging/lineage-20.0_and…"}},{"before":"62cbcebb382eb6422af0fecad40aa6b24af94433","after":"d2ebf6e8b5279140cdbd0c738a4dc11951995fc6","ref":"refs/heads/lineage-18.1","pushedAt":"2024-02-14T13:24:28.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-11.0.0_r76' into staging/lineage-18.1_android-security-11.0.0_r76\n\nAndroid Security 11.0.0 Release 76 (11228177)\n\n* tag 'android-security-11.0.0_r76':\n Update mtp packet buffer\n\nChange-Id: I4f3a09858555c2eb1d20f6c6fcc533430fc6cfcc","shortMessageHtmlLink":"Merge tag 'android-security-11.0.0_r76' into staging/lineage-18.1_and…"}},{"before":"1179041173d87618b998223297d6957ffa8756d3","after":"b4337548f6b7d58e531c3ae2b68b225db2880006","ref":"refs/heads/lineage-19.1","pushedAt":"2024-02-14T13:20:58.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Audio policy: anonymize Bluetooth MAC addresses\n\nMake sure APIs returning audio device descriptors from the native\naudioserver anonymize the Bluetooth MAC addresses because those are considered\nprivacy sensitive.\nOnly expose the full MAC address to system and apps with BLUETOOTH_CONNECT\npermission.\n\nAPIs modified: listAudioPorts, listAudioPatches, getAudioPort\nAPIs that can only be called from system server or only convey port IDs\nare not modified.\n\nBug: 285588444\nTest: atest AudioManagerTest\nTest: atest RoutingTest\nTest: atest AudioCommunicationDeviceTest\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:74aaeb8557ccebfb908770de9f5bac53c2204d16)\nMerged-In: Ia6bac184f5f39ed9d538f762ebb89bcceb44ae50\nChange-Id: Ia6bac184f5f39ed9d538f762ebb89bcceb44ae50","shortMessageHtmlLink":"Audio policy: anonymize Bluetooth MAC addresses"}},{"before":"2b3a690861c4c5bcac2809354f9b04241945db0f","after":null,"ref":"refs/heads/lineage-20","pushedAt":"2024-02-14T02:26:52.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"mikeNG","name":"Michael Bestas","path":"/mikeNG","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1216752?s=80&v=4"}},{"before":"c378d871e4008b3751dc6303e335c1f2758da477","after":"2b3a690861c4c5bcac2809354f9b04241945db0f","ref":"refs/heads/lineage-20.0","pushedAt":"2024-02-13T12:26:54.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_merge-android-security-13.0.0_r14\n\nAndroid Security 13.0.0 Release 14 (11228180)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcEegAAKCRDorT+BmrEO\n# eBwIAJ9IKy2ppGIvWaHbvyxKjt84Hqx/awCcDPffvVgZVQDazZEBF/SgBSs/1ww=\n# =mk4T\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 19:44:32 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2266 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Ashish Kumar Gupta (1) and Eric Laurent (1)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r14':\n Audio policy: anonymize Bluetooth MAC addresses\n Update mtp packet buffer\n\nChange-Id: Id06fb088f9876c2c0feaf9b10f6288917d115185","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_mer…"}},{"before":null,"after":"2b3a690861c4c5bcac2809354f9b04241945db0f","ref":"refs/heads/lineage-20","pushedAt":"2024-02-13T12:25:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_merge-android-security-13.0.0_r14\n\nAndroid Security 13.0.0 Release 14 (11228180)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcEegAAKCRDorT+BmrEO\n# eBwIAJ9IKy2ppGIvWaHbvyxKjt84Hqx/awCcDPffvVgZVQDazZEBF/SgBSs/1ww=\n# =mk4T\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 19:44:32 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2266 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Ashish Kumar Gupta (1) and Eric Laurent (1)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r14':\n Audio policy: anonymize Bluetooth MAC addresses\n Update mtp packet buffer\n\nChange-Id: Id06fb088f9876c2c0feaf9b10f6288917d115185","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_mer…"}},{"before":"b49787b4ae162bd50ae2e0e2b474d537a492dbc5","after":"0900dd0c2384e151588c4bea492f13ee516aebd7","ref":"refs/heads/lineage-21.0","pushedAt":"2024-02-07T15:47:52.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r25' into staging/lineage-21.0_merge-android-14.0.0_r25\n\nAndroid 14.0.0 Release 25 (UQ1A.240205.004)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcE4oQAKCRDorT+BmrEO\n# eFg0AJsFgzOsS8slsuDQLvElACdJL4vDYgCdG7aeIb1GmEVXOaRfqQaOU9S70YI=\n# =dj5t\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 21:36:01 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2240 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Ashish Kumar Gupta (1) and Eric Laurent (1)\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r25':\n Audio policy: anonymize Bluetooth MAC addresses\n Update mtp packet buffer\n\nChange-Id: I0a204a34ac69761a2a2b6048245d9657f97cc237","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r25' into staging/lineage-21.0_merge-androi…"}},{"before":"124550d190012e110e782c71bfc4641da90802e6","after":"b49787b4ae162bd50ae2e0e2b474d537a492dbc5","ref":"refs/heads/lineage-21.0","pushedAt":"2024-01-28T13:57:25.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"CCodec: Avoid OOB memory access in some cases\n\nDuring releaseBuffer, if the caller has not provided\npointer to c2buffer, then no need to generate compBuffer,\nif doesn't exist already.\n\nIf the raw color format is not recognized by frameworks,\nthen ImageCopy (inside asC2Buffer function) might end up\nresulting in out-of-bound memory access for few resolutions\n\nCRs-Fixed: 3341384\nChange-Id: I39b06a571e6244931c73ef99675f4d9e2dcf247e","shortMessageHtmlLink":"CCodec: Avoid OOB memory access in some cases"}},{"before":"e9fde8aac89ad42e284dbac51cef99185258cae9","after":"124550d190012e110e782c71bfc4641da90802e6","ref":"refs/heads/lineage-21.0","pushedAt":"2024-01-27T17:12:04.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Camera: Allow privileged camera apps to create raw streams\n\nChange-Id: I4e82027917e458e1472464e7317bb1968ff7ee2c","shortMessageHtmlLink":"Camera: Allow privileged camera apps to create raw streams"}},{"before":"ab8803b0db77f660abc77669acadbaa694faa372","after":"62cbcebb382eb6422af0fecad40aa6b24af94433","ref":"refs/heads/lineage-18.1","pushedAt":"2024-01-18T13:58:56.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-11.0.0_r75' into staging/lineage-18.1_android-security-11.0.0_r75\n\nAndroid security 11.0.0 release 75\n\n* tag 'android-security-11.0.0_r75':\n Fix convertYUV420Planar16ToY410 overflow issue for unsupported cropwidth.\n Codec2BufferUtils: Use cropped dimensions in RGB to YUV conversion\n\nChange-Id: I687dccc839c3d5c8aeb160bdf4020427ab78ce91","shortMessageHtmlLink":"Merge tag 'android-security-11.0.0_r75' into staging/lineage-18.1_and…"}},{"before":"3661ee9c70935aab0c9378e33fbdcefbbff7d11e","after":"1179041173d87618b998223297d6957ffa8756d3","ref":"refs/heads/lineage-19.1","pushedAt":"2024-01-18T13:55:41.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Fix convertYUV420Planar16ToY410 overflow issue for unsupported cropwidth.\n\nBug: 300476626\nTest: color_conversion_fuzzer\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:de2ad0fad97d6d97d1e01f0e8d8309536eb268b4)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:745ab99f7343bc236b88b9d63cd7b06ab192f9e9)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:aa8298ec8eb903e1e3dd915fa24f32e1aea1f76c)\nMerged-In: I8631426188af3c5f9b6c1ff6a0039254c252f733\nChange-Id: I8631426188af3c5f9b6c1ff6a0039254c252f733","shortMessageHtmlLink":"Fix convertYUV420Planar16ToY410 overflow issue for unsupported cropwi…"}},{"before":"20d1ac11b1909a6ca9051f67395d34a2abf0055c","after":"c378d871e4008b3751dc6303e335c1f2758da477","ref":"refs/heads/lineage-20.0","pushedAt":"2024-01-10T14:22:09.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r13' into staging/lineage-20.0_merge-android-security-13.0.0_r13\n\nAndroid security 13.0.0 release 13\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZZWxggAKCRDorT+BmrEO\n# eNjKAJ47sueVLwib9LG0/Cs25Zv6oE/VRQCfRgfDf/vUuhv01G8ZL1bTxJvQvqk=\n# =RXS6\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Wed Jan 3 21:12:02 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2237 signatures in the past\n# 2 years. Encrypted 4 messages in the past 24 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Harish Mahendrakar (1) and Songyue Han (1)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r13':\n Fix convertYUV420Planar16ToY410 overflow issue for unsupported cropwidth.\n Codec2BufferUtils: Use cropped dimensions in RGB to YUV conversion\n\nChange-Id: I51e3a7d8c3638d5299ad4e8258abfec7320cddce","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r13' into staging/lineage-20.0_mer…"}},{"before":"81c517c27c53b2ab10c5c8eb0b7054a6b66c87eb","after":"e9fde8aac89ad42e284dbac51cef99185258cae9","ref":"refs/heads/lineage-21.0","pushedAt":"2024-01-08T09:03:51.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r20' into staging/lineage-21.0_merge-android-14.0.0_r20\n\nAndroid 14.0.0 release 20\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZZXyGQAKCRDorT+BmrEO\n# eHNSAKCNn+XzXeTHyPpPz/cDSQAw4SojNQCfbWF06Z9zonviiRyPlhsk2ySDPjc=\n# =h8Mq\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Thu Jan 4 01:47:37 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2214 signatures in the past\n# 2 years. Encrypted 4 messages in the past 24 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Harish Mahendrakar (1) and others\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r20':\n Fix convertYUV420Planar16ToY410 overflow issue for unsupported cropwidth.\n Codec2BufferUtils: Use cropped dimensions in RGB to YUV conversion\n stagefright: rtsp: handle overflow in jitter calculation\n\nChange-Id: I74747221e29040e2caa802a876d1ea91fb04e05b","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r20' into staging/lineage-21.0_merge-androi…"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xM1QxNToxMDozMS4wMDAwMDBazwAAAAS1nu84","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xM1QxNToxMDozMS4wMDAwMDBazwAAAAS1nu84","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wMS0wOFQwOTowMzo1MS4wMDAwMDBazwAAAAPaHYUz"}},"title":"Activity · LineageOS/android_frameworks_av"}