Fixups + Churn

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-16 20:47:28 -04:00
parent 52fd08c2f1
commit 2e83c91a81
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
64 changed files with 260 additions and 309 deletions

View File

@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094 external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1 external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
external/chromium-webview ecd8b05d520fcdbc23530879bcda9ca8af7bf150 external/chromium-webview 78ac5933cd068e59e1758c70e705ce83a326d983
external/clang 751a76679b0fb5798ea6cab75906df07edcab315 external/clang 751a76679b0fb5798ea6cab75906df07edcab315
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c

View File

@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5 external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
external/chromium-webview ecd8b05d520fcdbc23530879bcda9ca8af7bf150 external/chromium-webview 78ac5933cd068e59e1758c70e705ce83a326d983
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072 external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072

View File

@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467 external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
external/chromium-webview ecd8b05d520fcdbc23530879bcda9ca8af7bf150 external/chromium-webview 78ac5933cd068e59e1758c70e705ce83a326d983
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9 external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4

View File

@ -1,4 +1,4 @@
From 036b28bd48fae9e16d8b1b2a8bb629f4221e41c2 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: William Loh <wloh@google.com> From: William Loh <wloh@google.com>
Date: Mon, 3 Jun 2024 12:56:47 -0700 Date: Mon, 3 Jun 2024 12:56:47 -0700
Subject: [PATCH] Fail parseUri if end is missing Subject: [PATCH] Fail parseUri if end is missing
@ -15,10 +15,10 @@ Change-Id: I5f619ced684ff505ce2b7408cd35dd3e9be89dea
1 file changed, 3 insertions(+) 1 file changed, 3 insertions(+)
diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java
index 66c2658f9f132..dbed1b1a8fd31 100644 index c0ccd33273e9..3367b56bc77b 100644
--- a/core/java/android/content/Intent.java --- a/core/java/android/content/Intent.java
+++ b/core/java/android/content/Intent.java +++ b/core/java/android/content/Intent.java
@@ -6277,6 +6277,9 @@ public static Intent parseUri(String uri, @UriFlags int flags) throws URISyntaxE @@ -5975,6 +5975,9 @@ public class Intent implements Parcelable, Cloneable {
int eq = uri.indexOf('=', i); int eq = uri.indexOf('=', i);
if (eq < 0) eq = i-1; if (eq < 0) eq = i-1;
int semi = uri.indexOf(';', i); int semi = uri.indexOf(';', i);

View File

@ -1,4 +1,4 @@
From b7877b7a39d68acb35c40d1df1b588f067cca800 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Almaz Mingaleev <mingaleev@google.com> From: Almaz Mingaleev <mingaleev@google.com>
Date: Wed, 10 Jul 2024 13:38:35 +0100 Date: Wed, 10 Jul 2024 13:38:35 +0100
Subject: [PATCH] Do not accept zip files with invalid headers. Subject: [PATCH] Do not accept zip files with invalid headers.
@ -30,10 +30,10 @@ Change-Id: I545cdd49ec3cc138331145f4716c8148662a478b
1 file changed, 11 insertions(+) 1 file changed, 11 insertions(+)
diff --git a/ojluni/src/main/native/zip_util.c b/ojluni/src/main/native/zip_util.c diff --git a/ojluni/src/main/native/zip_util.c b/ojluni/src/main/native/zip_util.c
index e2503e84c2e..1f38b1783f1 100644 index 79245807df9..e70dfb99f8b 100644
--- a/ojluni/src/main/native/zip_util.c --- a/ojluni/src/main/native/zip_util.c
+++ b/ojluni/src/main/native/zip_util.c +++ b/ojluni/src/main/native/zip_util.c
@@ -876,6 +876,17 @@ ZIP_Put_In_Cache0(const char *name, ZFILE zfd, char **pmsg, jlong lastModified, @@ -875,6 +875,17 @@ ZIP_Put_In_Cache0(const char *name, ZFILE zfd, char **pmsg, jlong lastModified,
zip->locsig = JNI_TRUE; zip->locsig = JNI_TRUE;
else else
zip->locsig = JNI_FALSE; zip->locsig = JNI_FALSE;

View File

@ -1,4 +1,4 @@
From c47fb676909e2e0896f08880dd542ea89040f791 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Alexander Grund <flamefire89@gmail.com> From: Alexander Grund <flamefire89@gmail.com>
Date: Tue, 27 Aug 2024 16:53:27 +0200 Date: Tue, 27 Aug 2024 16:53:27 +0200
Subject: [PATCH] Fix flag check in JAudioTrack.cpp Subject: [PATCH] Fix flag check in JAudioTrack.cpp
@ -12,7 +12,7 @@ Change-Id: Ifd2e98e7bb394c35a8a2f4ebde512046823da043
1 file changed, 4 insertions(+), 4 deletions(-) 1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/media/libmediaplayer2/JAudioTrack.cpp b/media/libmediaplayer2/JAudioTrack.cpp diff --git a/media/libmediaplayer2/JAudioTrack.cpp b/media/libmediaplayer2/JAudioTrack.cpp
index ac0cc5775ec..961d7e526e4 100644 index ac0cc5775e..961d7e526e 100644
--- a/media/libmediaplayer2/JAudioTrack.cpp --- a/media/libmediaplayer2/JAudioTrack.cpp
+++ b/media/libmediaplayer2/JAudioTrack.cpp +++ b/media/libmediaplayer2/JAudioTrack.cpp
@@ -615,26 +615,26 @@ jobject JAudioTrack::createVolumeShaperOperationObj( @@ -615,26 +615,26 @@ jobject JAudioTrack::createVolumeShaperOperationObj(

View File

@ -1,4 +1,4 @@
From f92b87e0fa6d86e076aa7138f6c0c0be16e5b901 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Kiran Ramachandra <kiranmr@google.com> From: Kiran Ramachandra <kiranmr@google.com>
Date: Wed, 5 Jun 2024 21:03:33 +0000 Date: Wed, 5 Jun 2024 21:03:33 +0000
Subject: [PATCH] DO NOT MERGE Ignore - Sanitized uri scheme by removing scheme Subject: [PATCH] DO NOT MERGE Ignore - Sanitized uri scheme by removing scheme
@ -19,10 +19,10 @@ Change-Id: I88b1550a5d8b3dc0f6286e28899884025d059645
2 files changed, 16 insertions(+), 1 deletion(-) 2 files changed, 16 insertions(+), 1 deletion(-)
diff --git a/core/java/android/net/Uri.java b/core/java/android/net/Uri.java diff --git a/core/java/android/net/Uri.java b/core/java/android/net/Uri.java
index af1c0e8e91788..d0fcc4240fd98 100644 index af1c0e8e9178..d0fcc4240fd9 100644
--- a/core/java/android/net/Uri.java --- a/core/java/android/net/Uri.java
+++ b/core/java/android/net/Uri.java +++ b/core/java/android/net/Uri.java
@@ -1365,7 +1365,11 @@ public Builder() {} @@ -1365,7 +1365,11 @@ public abstract class Uri implements Parcelable, Comparable<Uri> {
* @param scheme name or {@code null} if this is a relative Uri * @param scheme name or {@code null} if this is a relative Uri
*/ */
public Builder scheme(String scheme) { public Builder scheme(String scheme) {
@ -36,10 +36,10 @@ index af1c0e8e91788..d0fcc4240fd98 100644
} }
diff --git a/core/tests/coretests/src/android/net/UriTest.java b/core/tests/coretests/src/android/net/UriTest.java diff --git a/core/tests/coretests/src/android/net/UriTest.java b/core/tests/coretests/src/android/net/UriTest.java
index ea0347d67ad74..6c9fdd5a83a78 100644 index ea0347d67ad7..6c9fdd5a83a7 100644
--- a/core/tests/coretests/src/android/net/UriTest.java --- a/core/tests/coretests/src/android/net/UriTest.java
+++ b/core/tests/coretests/src/android/net/UriTest.java +++ b/core/tests/coretests/src/android/net/UriTest.java
@@ -18,6 +18,7 @@ @@ -18,6 +18,7 @@ package android.net;
import android.content.ContentUris; import android.content.ContentUris;
import android.os.Parcel; import android.os.Parcel;
@ -47,7 +47,7 @@ index ea0347d67ad74..6c9fdd5a83a78 100644
import android.test.suitebuilder.annotation.SmallTest; import android.test.suitebuilder.annotation.SmallTest;
import junit.framework.TestCase; import junit.framework.TestCase;
@@ -83,6 +84,16 @@ public void testBuildUponOpaqueStringUri() { @@ -83,6 +84,16 @@ public class UriTest extends TestCase {
assertNull(u.getHost()); assertNull(u.getHost());
} }

View File

@ -1,4 +1,4 @@
From a2fea355e79d8057e5910f52ef067642b1d46189 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Dmitry Dementyev <dementyev@google.com> From: Dmitry Dementyev <dementyev@google.com>
Date: Thu, 11 Jul 2024 12:39:22 -0700 Date: Thu, 11 Jul 2024 12:39:22 -0700
Subject: [PATCH] Update AccountManagerService checkKeyIntent. Subject: [PATCH] Update AccountManagerService checkKeyIntent.
@ -17,10 +17,10 @@ Change-Id: I8b23191d3d60036ca7ddf0ef7dcba6b38fb27b3c
1 file changed, 3 insertions(+) 1 file changed, 3 insertions(+)
diff --git a/services/core/java/com/android/server/accounts/AccountManagerService.java b/services/core/java/com/android/server/accounts/AccountManagerService.java diff --git a/services/core/java/com/android/server/accounts/AccountManagerService.java b/services/core/java/com/android/server/accounts/AccountManagerService.java
index 19e1a4c55120a..c5fff3652c283 100644 index 19e1a4c55120..c5fff3652c28 100644
--- a/services/core/java/com/android/server/accounts/AccountManagerService.java --- a/services/core/java/com/android/server/accounts/AccountManagerService.java
+++ b/services/core/java/com/android/server/accounts/AccountManagerService.java +++ b/services/core/java/com/android/server/accounts/AccountManagerService.java
@@ -4799,6 +4799,9 @@ protected boolean checkKeyIntent(int authUid, Bundle bundle) { @@ -4799,6 +4799,9 @@ public class AccountManagerService
if (resolveInfo == null) { if (resolveInfo == null) {
return false; return false;
} }

View File

@ -1,4 +1,4 @@
From 036b28bd48fae9e16d8b1b2a8bb629f4221e41c2 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: William Loh <wloh@google.com> From: William Loh <wloh@google.com>
Date: Mon, 3 Jun 2024 12:56:47 -0700 Date: Mon, 3 Jun 2024 12:56:47 -0700
Subject: [PATCH] Fail parseUri if end is missing Subject: [PATCH] Fail parseUri if end is missing
@ -15,10 +15,10 @@ Change-Id: I5f619ced684ff505ce2b7408cd35dd3e9be89dea
1 file changed, 3 insertions(+) 1 file changed, 3 insertions(+)
diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java
index 66c2658f9f132..dbed1b1a8fd31 100644 index 66c2658f9f13..dbed1b1a8fd3 100644
--- a/core/java/android/content/Intent.java --- a/core/java/android/content/Intent.java
+++ b/core/java/android/content/Intent.java +++ b/core/java/android/content/Intent.java
@@ -6277,6 +6277,9 @@ public static Intent parseUri(String uri, @UriFlags int flags) throws URISyntaxE @@ -6277,6 +6277,9 @@ public class Intent implements Parcelable, Cloneable {
int eq = uri.indexOf('=', i); int eq = uri.indexOf('=', i);
if (eq < 0) eq = i-1; if (eq < 0) eq = i-1;
int semi = uri.indexOf(';', i); int semi = uri.indexOf(';', i);

View File

@ -1,4 +1,4 @@
From b7877b7a39d68acb35c40d1df1b588f067cca800 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Almaz Mingaleev <mingaleev@google.com> From: Almaz Mingaleev <mingaleev@google.com>
Date: Wed, 10 Jul 2024 13:38:35 +0100 Date: Wed, 10 Jul 2024 13:38:35 +0100
Subject: [PATCH] Do not accept zip files with invalid headers. Subject: [PATCH] Do not accept zip files with invalid headers.

View File

@ -205,10 +205,10 @@ index 403e90403..0b792c974 100644
{"initNative", "()V", (void*)initNative}, {"initNative", "()V", (void*)initNative},
{"cleanupNative", "()V", (void*)cleanupNative}, {"cleanupNative", "()V", (void*)cleanupNative},
diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp
index 7838ff6ce..9b233c654 100644 index 60fffc2f3..a709c8479 100644
--- a/jni/com_android_bluetooth_hid_host.cpp --- a/jni/com_android_bluetooth_hid_host.cpp
+++ b/jni/com_android_bluetooth_hid_host.cpp +++ b/jni/com_android_bluetooth_hid_host.cpp
@@ -498,7 +498,7 @@ static jboolean setIdleTimeNative(JNIEnv* env, jobject object, @@ -500,7 +500,7 @@ static jboolean setIdleTimeNative(JNIEnv* env, jobject object,
return status == BT_STATUS_SUCCESS ? JNI_TRUE : JNI_FALSE; return status == BT_STATUS_SUCCESS ? JNI_TRUE : JNI_FALSE;
} }

View File

@ -1,7 +1,7 @@
From 6d050ad48cfcf668435f391733d28752061e62db Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:44:45 +0000 Date: Mon, 8 Apr 2024 19:44:45 +0000
Subject: [PATCH] [BACKPORT] Disallow unexpected incoming HID connections 2/2 Subject: [PATCH] Disallow unexpected incoming HID connections 2/2
HID profile accepted any new incoming HID connection. Even when the HID profile accepted any new incoming HID connection. Even when the
connection policy disabled HID connection, remote devices could initiate connection policy disabled HID connection, remote devices could initiate
@ -60,7 +60,7 @@ diff --git a/src/com/android/bluetooth/hid/HidHostService.java b/src/com/android
index 63f52060b..1113760f2 100644 index 63f52060b..1113760f2 100644
--- a/src/com/android/bluetooth/hid/HidHostService.java --- a/src/com/android/bluetooth/hid/HidHostService.java
+++ b/src/com/android/bluetooth/hid/HidHostService.java +++ b/src/com/android/bluetooth/hid/HidHostService.java
@@ -157,7 +157,10 @@ public void handleMessage(Message msg) { @@ -157,7 +157,10 @@ public class HidHostService extends ProfileService {
break; break;
case MESSAGE_DISCONNECT: { case MESSAGE_DISCONNECT: {
BluetoothDevice device = (BluetoothDevice) msg.obj; BluetoothDevice device = (BluetoothDevice) msg.obj;
@ -72,7 +72,7 @@ index 63f52060b..1113760f2 100644
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING);
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED);
break; break;
@@ -181,7 +184,10 @@ public void handleMessage(Message msg) { @@ -181,7 +184,10 @@ public class HidHostService extends ProfileService {
if (DBG) { if (DBG) {
Log.d(TAG, "Incoming HID connection rejected"); Log.d(TAG, "Incoming HID connection rejected");
} }
@ -84,7 +84,7 @@ index 63f52060b..1113760f2 100644
} else { } else {
broadcastConnectionState(device, convertHalState(halState)); broadcastConnectionState(device, convertHalState(halState));
} }
@@ -873,7 +879,7 @@ public void dump(StringBuilder sb) { @@ -873,7 +879,7 @@ public class HidHostService extends ProfileService {
private native boolean connectHidNative(byte[] btAddress); private native boolean connectHidNative(byte[] btAddress);

View File

@ -1,4 +1,4 @@
From 6fcac8928498d5184ba7e4bdc56315025a085510 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chaohui Wang <chaohuiw@google.com> From: Chaohui Wang <chaohuiw@google.com>
Date: Thu, 2 Nov 2023 11:43:00 +0800 Date: Thu, 2 Nov 2023 11:43:00 +0800
Subject: [PATCH] Limit wifi item edit content's max length to 500 Subject: [PATCH] Limit wifi item edit content's max length to 500

View File

@ -1,4 +1,4 @@
From 814483f2eee226ee461cea6685325b6f0b04748f Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Jason Chiu <chiujason@google.com> From: Jason Chiu <chiujason@google.com>
Date: Wed, 31 Jan 2024 16:29:01 +0800 Date: Wed, 31 Jan 2024 16:29:01 +0800
Subject: [PATCH] Replace getCallingActivity() with getLaunchedFromPackage() Subject: [PATCH] Replace getCallingActivity() with getLaunchedFromPackage()
@ -51,7 +51,7 @@ index 78c47edf046..7c88785b337 100644
import com.android.internal.annotations.VisibleForTesting; import com.android.internal.annotations.VisibleForTesting;
import com.android.settings.overlay.FeatureFactory; import com.android.settings.overlay.FeatureFactory;
import com.android.settings.search.indexing.IndexData; import com.android.settings.search.indexing.IndexData;
@@ -32,24 +33,21 @@ @@ -32,24 +33,21 @@ import java.util.Locale;
*/ */
public class SearchFeatureProviderImpl implements SearchFeatureProvider { public class SearchFeatureProviderImpl implements SearchFeatureProvider {
@ -87,7 +87,7 @@ diff --git a/src/com/android/settings/search/SearchResultTrampoline.java b/src/c
index 3bbe6bd58a7..70387b021d4 100644 index 3bbe6bd58a7..70387b021d4 100644
--- a/src/com/android/settings/search/SearchResultTrampoline.java --- a/src/com/android/settings/search/SearchResultTrampoline.java
+++ b/src/com/android/settings/search/SearchResultTrampoline.java +++ b/src/com/android/settings/search/SearchResultTrampoline.java
@@ -38,7 +38,7 @@ protected void onCreate(Bundle savedInstanceState) { @@ -38,7 +38,7 @@ public class SearchResultTrampoline extends Activity {
// First make sure caller has privilege to launch a search result page. // First make sure caller has privilege to launch a search result page.
FeatureFactory.getFactory(this) FeatureFactory.getFactory(this)
.getSearchFeatureProvider() .getSearchFeatureProvider()
@ -100,7 +100,7 @@ diff --git a/tests/robotests/src/com/android/settings/search/SearchFeatureProvid
index eeebdee96e3..7945c05a293 100644 index eeebdee96e3..7945c05a293 100644
--- a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java --- a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
+++ b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java +++ b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
@@ -21,7 +21,6 @@ @@ -21,7 +21,6 @@ import static com.google.common.truth.Truth.assertThat;
import static org.mockito.Mockito.spy; import static org.mockito.Mockito.spy;
import android.app.Activity; import android.app.Activity;
@ -108,7 +108,7 @@ index eeebdee96e3..7945c05a293 100644
import android.content.Intent; import android.content.Intent;
import android.widget.Toolbar; import android.widget.Toolbar;
@@ -70,21 +69,23 @@ public void verifyLaunchSearchResultPageCaller_nullCaller_shouldCrash() { @@ -70,21 +69,23 @@ public class SearchFeatureProviderImplTest {
@Test(expected = SecurityException.class) @Test(expected = SecurityException.class)
public void verifyLaunchSearchResultPageCaller_badCaller_shouldCrash() { public void verifyLaunchSearchResultPageCaller_badCaller_shouldCrash() {

View File

@ -1,4 +1,4 @@
From e689177d16d953c283522c777e470da1e873d15d Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Antol <cantol@google.com> From: Chris Antol <cantol@google.com>
Date: Tue, 4 Jun 2024 17:00:46 +0000 Date: Tue, 4 Jun 2024 17:00:46 +0000
Subject: [PATCH] Ignore fragment attr from ext authenticator resource Subject: [PATCH] Ignore fragment attr from ext authenticator resource
@ -19,7 +19,7 @@ diff --git a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
index 3914fac39b4..ce3d61d4dfa 100644 index 3914fac39b4..ce3d61d4dfa 100644
--- a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java --- a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
+++ b/src/com/android/settings/accounts/AccountTypePreferenceLoader.java +++ b/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
@@ -37,6 +37,11 @@ @@ -37,6 +37,11 @@ import android.support.v7.preference.PreferenceScreen;
import android.text.TextUtils; import android.text.TextUtils;
import android.util.Log; import android.util.Log;
@ -31,7 +31,7 @@ index 3914fac39b4..ce3d61d4dfa 100644
import com.android.settings.R; import com.android.settings.R;
import com.android.settings.core.SubSettingLauncher; import com.android.settings.core.SubSettingLauncher;
import com.android.settings.location.LocationSettings; import com.android.settings.location.LocationSettings;
@@ -44,6 +49,8 @@ @@ -44,6 +49,8 @@ import com.android.settings.utils.LocalClassLoaderContextThemeWrapper;
import com.android.settingslib.accounts.AuthenticatorHelper; import com.android.settingslib.accounts.AuthenticatorHelper;
import com.android.settingslib.core.instrumentation.Instrumentable; import com.android.settingslib.core.instrumentation.Instrumentable;
@ -40,7 +40,7 @@ index 3914fac39b4..ce3d61d4dfa 100644
/** /**
* Class to load the preference screen to be added to the settings page for the specific account * Class to load the preference screen to be added to the settings page for the specific account
* type as specified in the account-authenticator. * type as specified in the account-authenticator.
@@ -82,6 +89,7 @@ public PreferenceScreen addPreferencesForType(final String accountType, @@ -82,6 +89,7 @@ public class AccountTypePreferenceLoader {
try { try {
desc = mAuthenticatorHelper.getAccountTypeDescription(accountType); desc = mAuthenticatorHelper.getAccountTypeDescription(accountType);
if (desc != null && desc.accountPreferencesId != 0) { if (desc != null && desc.accountPreferencesId != 0) {
@ -48,7 +48,7 @@ index 3914fac39b4..ce3d61d4dfa 100644
// Load the context of the target package, then apply the // Load the context of the target package, then apply the
// base Settings theme (no references to local resources) // base Settings theme (no references to local resources)
// and create a context theme wrapper so that we get the // and create a context theme wrapper so that we get the
@@ -97,6 +105,12 @@ public PreferenceScreen addPreferencesForType(final String accountType, @@ -97,6 +105,12 @@ public class AccountTypePreferenceLoader {
themedCtx.getTheme().setTo(baseTheme); themedCtx.getTheme().setTo(baseTheme);
prefs = mFragment.getPreferenceManager().inflateFromResource(themedCtx, prefs = mFragment.getPreferenceManager().inflateFromResource(themedCtx,
desc.accountPreferencesId, parent); desc.accountPreferencesId, parent);
@ -61,7 +61,7 @@ index 3914fac39b4..ce3d61d4dfa 100644
} }
} catch (PackageManager.NameNotFoundException e) { } catch (PackageManager.NameNotFoundException e) {
Log.w(TAG, "Couldn't load preferences.xml file from " + desc.packageName); Log.w(TAG, "Couldn't load preferences.xml file from " + desc.packageName);
@@ -181,6 +195,48 @@ public boolean onPreferenceClick(Preference preference) { @@ -181,6 +195,48 @@ public class AccountTypePreferenceLoader {
} }
} }

View File

@ -1,4 +1,4 @@
From 4923eb8efebb69b7870a032bbea8b4b0c36382ad Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Grant Menke <grantmenke@google.com> From: Grant Menke <grantmenke@google.com>
Date: Thu, 25 Apr 2024 10:43:43 -0700 Date: Thu, 25 Apr 2024 10:43:43 -0700
Subject: [PATCH] DO NOT MERGE Unbind CS if connection is not created within 15 Subject: [PATCH] DO NOT MERGE Unbind CS if connection is not created within 15
@ -28,7 +28,7 @@ diff --git a/src/com/android/server/telecom/Call.java b/src/com/android/server/t
index bc20d1caf..f4ec11187 100644 index bc20d1caf..f4ec11187 100644
--- a/src/com/android/server/telecom/Call.java --- a/src/com/android/server/telecom/Call.java
+++ b/src/com/android/server/telecom/Call.java +++ b/src/com/android/server/telecom/Call.java
@@ -306,6 +306,17 @@ public void onContactPhotoQueryComplete(Uri handle, CallerInfo callerInfo) { @@ -306,6 +306,17 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
/** The state of the call. */ /** The state of the call. */
private int mState; private int mState;
@ -46,7 +46,7 @@ index bc20d1caf..f4ec11187 100644
/** The handle with which to establish this call. */ /** The handle with which to establish this call. */
private Uri mHandle; private Uri mHandle;
@@ -797,6 +808,19 @@ public ConnectionServiceFocusManager.ConnectionServiceFocus getConnectionService @@ -797,6 +808,19 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
return mConnectionService; return mConnectionService;
} }
@ -66,7 +66,7 @@ index bc20d1caf..f4ec11187 100644
@VisibleForTesting @VisibleForTesting
public int getState() { public int getState() {
return mState; return mState;
@@ -1638,6 +1662,7 @@ public void handleCreateConnectionSuccess( @@ -1638,6 +1662,7 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
CallIdMapper idMapper, CallIdMapper idMapper,
ParcelableConnection connection) { ParcelableConnection connection) {
Log.v(this, "handleCreateConnectionSuccessful %s", connection); Log.v(this, "handleCreateConnectionSuccessful %s", connection);
@ -78,7 +78,7 @@ diff --git a/src/com/android/server/telecom/ConnectionServiceWrapper.java b/src/
index 1b86842af..55ae0b6c8 100644 index 1b86842af..55ae0b6c8 100644
--- a/src/com/android/server/telecom/ConnectionServiceWrapper.java --- a/src/com/android/server/telecom/ConnectionServiceWrapper.java
+++ b/src/com/android/server/telecom/ConnectionServiceWrapper.java +++ b/src/com/android/server/telecom/ConnectionServiceWrapper.java
@@ -34,6 +34,7 @@ @@ -34,6 +34,7 @@ import android.telecom.ConnectionService;
import android.telecom.DisconnectCause; import android.telecom.DisconnectCause;
import android.telecom.GatewayInfo; import android.telecom.GatewayInfo;
import android.telecom.Log; import android.telecom.Log;
@ -86,7 +86,7 @@ index 1b86842af..55ae0b6c8 100644
import android.telecom.Logging.Session; import android.telecom.Logging.Session;
import android.telecom.ParcelableConference; import android.telecom.ParcelableConference;
import android.telecom.ParcelableConnection; import android.telecom.ParcelableConnection;
@@ -57,6 +58,11 @@ @@ -57,6 +58,11 @@ import java.util.List;
import java.util.Map; import java.util.Map;
import java.util.Set; import java.util.Set;
import java.util.concurrent.ConcurrentHashMap; import java.util.concurrent.ConcurrentHashMap;
@ -98,7 +98,7 @@ index 1b86842af..55ae0b6c8 100644
/** /**
* Wrapper for {@link IConnectionService}s, handles binding to {@link IConnectionService} and keeps * Wrapper for {@link IConnectionService}s, handles binding to {@link IConnectionService} and keeps
@@ -68,6 +74,12 @@ @@ -68,6 +74,12 @@ import java.util.concurrent.ConcurrentHashMap;
public class ConnectionServiceWrapper extends ServiceBinder implements public class ConnectionServiceWrapper extends ServiceBinder implements
ConnectionServiceFocusManager.ConnectionServiceFocus { ConnectionServiceFocusManager.ConnectionServiceFocus {
@ -111,7 +111,7 @@ index 1b86842af..55ae0b6c8 100644
private final class Adapter extends IConnectionServiceAdapter.Stub { private final class Adapter extends IConnectionServiceAdapter.Stub {
@Override @Override
@@ -79,6 +91,12 @@ public void handleCreateConnectionComplete(String callId, ConnectionRequest requ @@ -79,6 +91,12 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
try { try {
synchronized (mLock) { synchronized (mLock) {
logIncoming("handleCreateConnectionComplete %s", callId); logIncoming("handleCreateConnectionComplete %s", callId);
@ -124,7 +124,7 @@ index 1b86842af..55ae0b6c8 100644
// Check status hints image for cross user access // Check status hints image for cross user access
if (connection.getStatusHints() != null) { if (connection.getStatusHints() != null) {
Icon icon = connection.getStatusHints().getIcon(); Icon icon = connection.getStatusHints().getIcon();
@@ -1027,7 +1045,8 @@ public void onConnectionServiceFocusReleased(Session.Info sessionInfo) @@ -1027,7 +1045,8 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
* @param context The context. * @param context The context.
* @param userHandle The {@link UserHandle} to use when binding. * @param userHandle The {@link UserHandle} to use when binding.
*/ */
@ -134,7 +134,7 @@ index 1b86842af..55ae0b6c8 100644
ComponentName componentName, ComponentName componentName,
ConnectionServiceRepository connectionServiceRepository, ConnectionServiceRepository connectionServiceRepository,
PhoneAccountRegistrar phoneAccountRegistrar, PhoneAccountRegistrar phoneAccountRegistrar,
@@ -1129,6 +1148,26 @@ public void onSuccess() { @@ -1129,6 +1148,26 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
.setRttPipeToInCall(call.getCsToInCallRttPipeForCs()) .setRttPipeToInCall(call.getCsToInCallRttPipeForCs())
.build(); .build();
@ -161,7 +161,7 @@ index 1b86842af..55ae0b6c8 100644
try { try {
mServiceInterface.createConnection( mServiceInterface.createConnection(
call.getConnectionManagerPhoneAccount(), call.getConnectionManagerPhoneAccount(),
@@ -1414,7 +1453,8 @@ void stopDtmfTone(Call call) { @@ -1414,7 +1453,8 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
} }
} }
@ -171,7 +171,7 @@ index 1b86842af..55ae0b6c8 100644
if (mCallIdMapper.getCallId(call) == null) { if (mCallIdMapper.getCallId(call) == null) {
mCallIdMapper.addCall(call); mCallIdMapper.addCall(call);
} }
@@ -1778,4 +1818,9 @@ private void setRemoteServices( @@ -1778,4 +1818,9 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
private void noRemoteServices(RemoteServiceCallback callback) { private void noRemoteServices(RemoteServiceCallback callback) {
setRemoteServices(callback, Collections.EMPTY_LIST, Collections.EMPTY_LIST); setRemoteServices(callback, Collections.EMPTY_LIST, Collections.EMPTY_LIST);
} }
@ -185,7 +185,7 @@ diff --git a/src/com/android/server/telecom/LogUtils.java b/src/com/android/serv
index 02a3b7785..66efb5c92 100644 index 02a3b7785..66efb5c92 100644
--- a/src/com/android/server/telecom/LogUtils.java --- a/src/com/android/server/telecom/LogUtils.java
+++ b/src/com/android/server/telecom/LogUtils.java +++ b/src/com/android/server/telecom/LogUtils.java
@@ -86,6 +86,7 @@ public final static class Events { @@ -86,6 +86,7 @@ public class LogUtils {
public static final String STOP_CALL_WAITING_TONE = "STOP_CALL_WAITING_TONE"; public static final String STOP_CALL_WAITING_TONE = "STOP_CALL_WAITING_TONE";
public static final String START_CONNECTION = "START_CONNECTION"; public static final String START_CONNECTION = "START_CONNECTION";
public static final String CREATE_CONNECTION_FAILED = "CREATE_CONNECTION_FAILED"; public static final String CREATE_CONNECTION_FAILED = "CREATE_CONNECTION_FAILED";
@ -197,7 +197,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/BasicCallTests.java b/te
index 190604a75..810c01aa3 100644 index 190604a75..810c01aa3 100644
--- a/tests/src/com/android/server/telecom/tests/BasicCallTests.java --- a/tests/src/com/android/server/telecom/tests/BasicCallTests.java
+++ b/tests/src/com/android/server/telecom/tests/BasicCallTests.java +++ b/tests/src/com/android/server/telecom/tests/BasicCallTests.java
@@ -927,6 +927,7 @@ public void testOutgoingCallSelectPhoneAccountVideo() throws Exception { @@ -927,6 +927,7 @@ public class BasicCallTests extends TelecomSystemTest {
call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle()); call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle());
assert(call.isVideoCallingSupported()); assert(call.isVideoCallingSupported());
assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState());
@ -205,7 +205,7 @@ index 190604a75..810c01aa3 100644
} }
/** /**
@@ -950,6 +951,7 @@ public void testOutgoingCallSelectPhoneAccountNoVideo() throws Exception { @@ -950,6 +951,7 @@ public class BasicCallTests extends TelecomSystemTest {
call.setTargetPhoneAccount(mPhoneAccountA2.getAccountHandle()); call.setTargetPhoneAccount(mPhoneAccountA2.getAccountHandle());
assert(!call.isVideoCallingSupported()); assert(!call.isVideoCallingSupported());
assertEquals(VideoProfile.STATE_AUDIO_ONLY, call.getVideoState()); assertEquals(VideoProfile.STATE_AUDIO_ONLY, call.getVideoState());
@ -217,7 +217,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java b/
index ed2f6b19b..abc300555 100644 index ed2f6b19b..abc300555 100644
--- a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java --- a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java
+++ b/tests/src/com/android/server/telecom/tests/CallsManagerTest.java +++ b/tests/src/com/android/server/telecom/tests/CallsManagerTest.java
@@ -31,6 +31,7 @@ @@ -31,6 +31,7 @@ import static org.mockito.Mockito.when;
import android.content.ComponentName; import android.content.ComponentName;
import android.net.Uri; import android.net.Uri;
@ -225,7 +225,7 @@ index ed2f6b19b..abc300555 100644
import android.os.SystemClock; import android.os.SystemClock;
import android.telecom.Connection; import android.telecom.Connection;
import android.telecom.PhoneAccount; import android.telecom.PhoneAccount;
@@ -44,11 +45,13 @@ @@ -44,11 +45,13 @@ import com.android.server.telecom.AsyncRingtonePlayer;
import com.android.server.telecom.Call; import com.android.server.telecom.Call;
import com.android.server.telecom.CallAudioManager; import com.android.server.telecom.CallAudioManager;
import com.android.server.telecom.CallState; import com.android.server.telecom.CallState;
@ -247,7 +247,7 @@ index ed2f6b19b..abc300555 100644
private CallsManager mCallsManager; private CallsManager mCallsManager;
@@ -190,8 +194,22 @@ public void setUp() throws Exception { @@ -190,8 +194,22 @@ public class CallsManagerTest extends TelecomTestCase {
eq(SIM_1_HANDLE), any())).thenReturn(SIM_1_ACCOUNT); eq(SIM_1_HANDLE), any())).thenReturn(SIM_1_ACCOUNT);
when(mPhoneAccountRegistrar.getPhoneAccount( when(mPhoneAccountRegistrar.getPhoneAccount(
eq(SIM_2_HANDLE), any())).thenReturn(SIM_2_ACCOUNT); eq(SIM_2_HANDLE), any())).thenReturn(SIM_2_ACCOUNT);
@ -270,7 +270,7 @@ index ed2f6b19b..abc300555 100644
@MediumTest @MediumTest
@Test @Test
public void testConstructPossiblePhoneAccounts() throws Exception { public void testConstructPossiblePhoneAccounts() throws Exception {
@@ -684,6 +702,33 @@ public void testSetActiveCallWhenOngoingCallCanBeHeld() { @@ -684,6 +702,33 @@ public class CallsManagerTest extends TelecomTestCase {
assertEquals(CallState.ACTIVE, newCall.getState()); assertEquals(CallState.ACTIVE, newCall.getState());
} }
@ -304,7 +304,7 @@ index ed2f6b19b..abc300555 100644
private Call addSpyCallWithConnectionService(ConnectionServiceWrapper connSvr) { private Call addSpyCallWithConnectionService(ConnectionServiceWrapper connSvr) {
Call call = addSpyCall(); Call call = addSpyCall();
doReturn(connSvr).when(call).getConnectionService(); doReturn(connSvr).when(call).getConnectionService();
@@ -739,4 +784,19 @@ private void setupMsimAccounts() { @@ -739,4 +784,19 @@ public class CallsManagerTest extends TelecomTestCase {
when(mPhoneAccountRegistrar.getSimPhoneAccountsOfCurrentUser()).thenReturn( when(mPhoneAccountRegistrar.getSimPhoneAccountsOfCurrentUser()).thenReturn(
new ArrayList<>(Arrays.asList(SIM_1_HANDLE, SIM_2_HANDLE))); new ArrayList<>(Arrays.asList(SIM_1_HANDLE, SIM_2_HANDLE)));
} }
@ -328,7 +328,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.
index 01d312b98..86918a064 100644 index 01d312b98..86918a064 100644
--- a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java --- a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java
+++ b/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java +++ b/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java
@@ -499,6 +499,14 @@ public void addConnectionService( @@ -499,6 +499,14 @@ public class ComponentContextFixture implements TestFixture<Context> {
mServiceInfoByComponentName.put(componentName, serviceInfo); mServiceInfoByComponentName.put(componentName, serviceInfo);
} }
@ -343,7 +343,7 @@ index 01d312b98..86918a064 100644
public void addInCallService( public void addInCallService(
ComponentName componentName, ComponentName componentName,
IInCallService service) IInCallService service)
@@ -541,6 +549,12 @@ private void addService(String action, ComponentName name, IInterface service) { @@ -541,6 +549,12 @@ public class ComponentContextFixture implements TestFixture<Context> {
mComponentNameByService.put(service, name); mComponentNameByService.put(service, name);
} }

View File

@ -1,4 +1,4 @@
From cae2930774ada0de113a04086e2d10009e6774e3 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Sun, 14 Mar 2021 09:52:19 -0700 Date: Sun, 14 Mar 2021 09:52:19 -0700
Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text
@ -16,7 +16,7 @@ Change-Id: Iab6a4f33a3e498c33f4870abc5abd59e073d03f2
1 file changed, 20 insertions(+), 1 deletion(-) 1 file changed, 20 insertions(+), 1 deletion(-)
diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h
index 2364544824e..5c1ad45108b 100644 index 236454482..5c1ad4510 100644
--- a/btif/include/btif_hh.h --- a/btif/include/btif_hh.h
+++ b/btif/include/btif_hh.h +++ b/btif/include/btif_hh.h
@@ -45,7 +45,7 @@ @@ -45,7 +45,7 @@

View File

@ -1,7 +1,7 @@
From d2c71969119d6c4bee9c9da387af449827448d03 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:42:21 +0000 Date: Mon, 8 Apr 2024 19:42:21 +0000
Subject: [PATCH] [BACKPORT] Disallow unexpected incoming HID connections 1/2 Subject: [PATCH] Disallow unexpected incoming HID connections 1/2
HID profile accepted any new incoming HID connection. Even when the HID profile accepted any new incoming HID connection. Even when the
connection policy disabled HID connection, remote devices could initiate connection policy disabled HID connection, remote devices could initiate
@ -27,7 +27,7 @@ Change-Id: I6e9db983e752dd498625078c13b736cd4c668806
5 files changed, 160 insertions(+), 8 deletions(-) 5 files changed, 160 insertions(+), 8 deletions(-)
diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h
index 5c1ad45108b..8c9ead46283 100644 index 5c1ad4510..8c9ead462 100644
--- a/btif/include/btif_hh.h --- a/btif/include/btif_hh.h
+++ b/btif/include/btif_hh.h +++ b/btif/include/btif_hh.h
@@ -94,6 +94,7 @@ typedef struct { @@ -94,6 +94,7 @@ typedef struct {
@ -49,7 +49,7 @@ index 5c1ad45108b..8c9ead46283 100644
extern void btif_hh_disconnect(RawAddress* bd_addr); extern void btif_hh_disconnect(RawAddress* bd_addr);
extern void btif_hh_setreport(btif_hh_device_t* p_dev, extern void btif_hh_setreport(btif_hh_device_t* p_dev,
diff --git a/btif/include/btif_storage.h b/btif/include/btif_storage.h diff --git a/btif/include/btif_storage.h b/btif/include/btif_storage.h
index 07d29c81a7e..365f714d2d6 100644 index 07d29c81a..365f714d2 100644
--- a/btif/include/btif_storage.h --- a/btif/include/btif_storage.h
+++ b/btif/include/btif_storage.h +++ b/btif/include/btif_storage.h
@@ -152,6 +152,29 @@ bt_status_t btif_storage_remove_bonded_device(const RawAddress* remote_bd_addr); @@ -152,6 +152,29 @@ bt_status_t btif_storage_remove_bonded_device(const RawAddress* remote_bd_addr);
@ -83,7 +83,7 @@ index 07d29c81a7e..365f714d2d6 100644
* *
* Function btif_storage_add_hid_device_info * Function btif_storage_add_hid_device_info
diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc
index b6441e1cce0..ea6559d34f2 100644 index b6441e1cc..ea6559d34 100644
--- a/btif/src/btif_hh.cc --- a/btif/src/btif_hh.cc
+++ b/btif/src/btif_hh.cc +++ b/btif/src/btif_hh.cc
@@ -338,6 +338,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) { @@ -338,6 +338,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) {
@ -261,7 +261,7 @@ index b6441e1cce0..ea6559d34f2 100644
osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list); osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list);
diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc
index ef2e191ebce..f768845dddf 100644 index ef2e191eb..f768845dd 100644
--- a/btif/src/btif_storage.cc --- a/btif/src/btif_storage.cc
+++ b/btif/src/btif_storage.cc +++ b/btif/src/btif_storage.cc
@@ -85,6 +85,8 @@ using bluetooth::Uuid; @@ -85,6 +85,8 @@ using bluetooth::Uuid;
@ -347,7 +347,7 @@ index ef2e191ebce..f768845dddf 100644
return BT_STATUS_SUCCESS; return BT_STATUS_SUCCESS;
} }
diff --git a/include/hardware/bt_hh.h b/include/hardware/bt_hh.h diff --git a/include/hardware/bt_hh.h b/include/hardware/bt_hh.h
index b87b129bb12..923c6279216 100644 index b87b129bb..923c62792 100644
--- a/include/hardware/bt_hh.h --- a/include/hardware/bt_hh.h
+++ b/include/hardware/bt_hh.h +++ b/include/hardware/bt_hh.h
@@ -154,7 +154,7 @@ typedef struct { @@ -154,7 +154,7 @@ typedef struct {

View File

@ -1,4 +1,4 @@
From a9760e6a3e5a55ed5e67881bca5d3242ee5fe2ad Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Wonsik Kim <wonsik@google.com> From: Wonsik Kim <wonsik@google.com>
Date: Fri, 28 Jun 2024 00:33:51 +0000 Date: Fri, 28 Jun 2024 00:33:51 +0000
Subject: [PATCH] omx: check HDR10+ info param size Subject: [PATCH] omx: check HDR10+ info param size
@ -15,7 +15,7 @@ Change-Id: I72523e1de61e5f947174272b732e170e1c2964df
1 file changed, 7 insertions(+) 1 file changed, 7 insertions(+)
diff --git a/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp b/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp diff --git a/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp b/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp
index 418302389d1..4ab5d106096 100644 index 418302389d..4ab5d10609 100644
--- a/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp --- a/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp
+++ b/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp +++ b/media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp
@@ -619,6 +619,13 @@ OMX_ERRORTYPE SoftVideoDecoderOMXComponent::getConfig( @@ -619,6 +619,13 @@ OMX_ERRORTYPE SoftVideoDecoderOMXComponent::getConfig(

View File

@ -1,4 +1,4 @@
From 337e31b00dc055d99911ec527f79183c2e881033 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Kiran Ramachandra <kiranmr@google.com> From: Kiran Ramachandra <kiranmr@google.com>
Date: Wed, 5 Jun 2024 21:03:33 +0000 Date: Wed, 5 Jun 2024 21:03:33 +0000
Subject: [PATCH] DO NOT MERGE Ignore - Sanitized uri scheme by removing scheme Subject: [PATCH] DO NOT MERGE Ignore - Sanitized uri scheme by removing scheme
@ -19,10 +19,10 @@ Change-Id: I88b1550a5d8b3dc0f6286e28899884025d059645
2 files changed, 16 insertions(+), 1 deletion(-) 2 files changed, 16 insertions(+), 1 deletion(-)
diff --git a/core/java/android/net/Uri.java b/core/java/android/net/Uri.java diff --git a/core/java/android/net/Uri.java b/core/java/android/net/Uri.java
index 33acef7f95060..3f3501d1dbca5 100644 index 33acef7f9506..3f3501d1dbca 100644
--- a/core/java/android/net/Uri.java --- a/core/java/android/net/Uri.java
+++ b/core/java/android/net/Uri.java +++ b/core/java/android/net/Uri.java
@@ -1380,7 +1380,11 @@ public Builder() {} @@ -1380,7 +1380,11 @@ public abstract class Uri implements Parcelable, Comparable<Uri> {
* @param scheme name or {@code null} if this is a relative Uri * @param scheme name or {@code null} if this is a relative Uri
*/ */
public Builder scheme(String scheme) { public Builder scheme(String scheme) {
@ -36,10 +36,10 @@ index 33acef7f95060..3f3501d1dbca5 100644
} }
diff --git a/core/tests/coretests/src/android/net/UriTest.java b/core/tests/coretests/src/android/net/UriTest.java diff --git a/core/tests/coretests/src/android/net/UriTest.java b/core/tests/coretests/src/android/net/UriTest.java
index 670aefd21d360..17a37831afdb1 100644 index 670aefd21d36..17a37831afdb 100644
--- a/core/tests/coretests/src/android/net/UriTest.java --- a/core/tests/coretests/src/android/net/UriTest.java
+++ b/core/tests/coretests/src/android/net/UriTest.java +++ b/core/tests/coretests/src/android/net/UriTest.java
@@ -18,6 +18,7 @@ @@ -18,6 +18,7 @@ package android.net;
import android.content.ContentUris; import android.content.ContentUris;
import android.os.Parcel; import android.os.Parcel;
@ -47,7 +47,7 @@ index 670aefd21d360..17a37831afdb1 100644
import androidx.test.filters.SmallTest; import androidx.test.filters.SmallTest;
@@ -88,6 +89,16 @@ public void testBuildUponOpaqueStringUri() { @@ -88,6 +89,16 @@ public class UriTest extends TestCase {
assertNull(u.getHost()); assertNull(u.getHost());
} }

View File

@ -1,4 +1,4 @@
From b0aee0b8b81d776e7c3234f7b340a856d138e4c4 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Dmitry Dementyev <dementyev@google.com> From: Dmitry Dementyev <dementyev@google.com>
Date: Thu, 11 Jul 2024 12:39:22 -0700 Date: Thu, 11 Jul 2024 12:39:22 -0700
Subject: [PATCH] Update AccountManagerService checkKeyIntent. Subject: [PATCH] Update AccountManagerService checkKeyIntent.
@ -17,10 +17,10 @@ Change-Id: I8b23191d3d60036ca7ddf0ef7dcba6b38fb27b3c
1 file changed, 3 insertions(+) 1 file changed, 3 insertions(+)
diff --git a/services/core/java/com/android/server/accounts/AccountManagerService.java b/services/core/java/com/android/server/accounts/AccountManagerService.java diff --git a/services/core/java/com/android/server/accounts/AccountManagerService.java b/services/core/java/com/android/server/accounts/AccountManagerService.java
index 37a68d3eec76c..fb79904a5b3a8 100644 index bf577735d037..e8c8b32884e9 100644
--- a/services/core/java/com/android/server/accounts/AccountManagerService.java --- a/services/core/java/com/android/server/accounts/AccountManagerService.java
+++ b/services/core/java/com/android/server/accounts/AccountManagerService.java +++ b/services/core/java/com/android/server/accounts/AccountManagerService.java
@@ -4812,6 +4812,9 @@ protected boolean checkKeyIntent(int authUid, Bundle bundle) { @@ -4822,6 +4822,9 @@ public class AccountManagerService
if (resolveInfo == null) { if (resolveInfo == null) {
return false; return false;
} }

View File

@ -1,4 +1,4 @@
From f31bdd9c6658dfb932eea857f17cc2d21124031e Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: William Loh <wloh@google.com> From: William Loh <wloh@google.com>
Date: Mon, 3 Jun 2024 12:56:47 -0700 Date: Mon, 3 Jun 2024 12:56:47 -0700
Subject: [PATCH] Fail parseUri if end is missing Subject: [PATCH] Fail parseUri if end is missing
@ -15,10 +15,10 @@ Change-Id: I5f619ced684ff505ce2b7408cd35dd3e9be89dea
1 file changed, 3 insertions(+) 1 file changed, 3 insertions(+)
diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java diff --git a/core/java/android/content/Intent.java b/core/java/android/content/Intent.java
index 24d59a0826c85..4ea29407f352f 100644 index 72e0fa615b09..0685466bfa74 100644
--- a/core/java/android/content/Intent.java --- a/core/java/android/content/Intent.java
+++ b/core/java/android/content/Intent.java +++ b/core/java/android/content/Intent.java
@@ -7053,6 +7053,9 @@ public static Intent parseUri(String uri, @UriFlags int flags) throws URISyntaxE @@ -6708,6 +6708,9 @@ public class Intent implements Parcelable, Cloneable {
int eq = uri.indexOf('=', i); int eq = uri.indexOf('=', i);
if (eq < 0) eq = i-1; if (eq < 0) eq = i-1;
int semi = uri.indexOf(';', i); int semi = uri.indexOf(';', i);

View File

@ -1,39 +0,0 @@
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Mark Renouf <mrenouf@google.com>
Date: Thu, 20 Jun 2024 16:37:42 -0400
Subject: [PATCH] Prevent Sharing when FRP enforcement is in effect
ADB command to trigger sharing:
```
adb shell 'am start -a android.intent.action.CHOOSER --eu android.intent.extra.INTENT "intent:#Intent;action=android.intent.action.SEND;type=text/plain;S.android.intent.extra.TEXT=Shared%20text;end"'
```
Bug: 327645387
Test: manual; trigger FRP; attempt to open share sheet using adb
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:5080af26387a18d5638d5a42eadfb8d4d700518c)
Merged-In: I1db78ab74babe71b516f601be35cf476b5e43271
Change-Id: I1db78ab74babe71b516f601be35cf476b5e43271
---
core/java/com/android/internal/app/ChooserActivity.java | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/core/java/com/android/internal/app/ChooserActivity.java b/core/java/com/android/internal/app/ChooserActivity.java
index 2e17dce90240..300e1053cc16 100644
--- a/core/java/com/android/internal/app/ChooserActivity.java
+++ b/core/java/com/android/internal/app/ChooserActivity.java
@@ -525,6 +525,14 @@ public class ChooserActivity extends ResolverActivity {
@Override
protected void onCreate(Bundle savedInstanceState) {
+ if (Settings.Secure.getIntForUser(getContentResolver(),
+ Settings.Secure.SECURE_FRP_MODE, 0,
+ getUserId()) == 1) {
+ Log.e(TAG, "Sharing disabled due to active FRP lock.");
+ super.onCreate(savedInstanceState);
+ finish();
+ return;
+ }
final long intentReceivedTime = System.currentTimeMillis();
// This is the only place this value is being set. Effectively final.
mIsAppPredictorComponentAvailable = isAppPredictionServiceAvailable();

View File

@ -1,8 +1,8 @@
From 5fe06ebbd23db602bb46ba51a7e40711d7823be6 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Sumedh Sen <sumedhsen@google.com> From: Sumedh Sen <sumedhsen@google.com>
Date: Wed, 17 Jul 2024 01:00:55 +0000 Date: Wed, 17 Jul 2024 01:00:55 +0000
Subject: [PATCH] [RESTRICT AUTOMERGE] Check whether installerPackageName Subject: [PATCH] Check whether installerPackageName contains only valid
contains only valid characters characters
Bug: 341256391 Bug: 341256391
Bug: 307532206 Bug: 307532206
@ -15,10 +15,10 @@ Change-Id: I74a172c617d6f5b13f0708092156b657b73b5891
1 file changed, 6 insertions(+), 1 deletion(-) 1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/services/core/java/com/android/server/pm/PackageInstallerService.java b/services/core/java/com/android/server/pm/PackageInstallerService.java diff --git a/services/core/java/com/android/server/pm/PackageInstallerService.java b/services/core/java/com/android/server/pm/PackageInstallerService.java
index 7e67021e3b847..ab8cc4c8d6697 100644 index 8715b183d142..6c77a9575dcb 100644
--- a/services/core/java/com/android/server/pm/PackageInstallerService.java --- a/services/core/java/com/android/server/pm/PackageInstallerService.java
+++ b/services/core/java/com/android/server/pm/PackageInstallerService.java +++ b/services/core/java/com/android/server/pm/PackageInstallerService.java
@@ -580,12 +580,17 @@ private int createSessionInternal(SessionParams params, String installerPackageN @@ -549,12 +549,17 @@ public class PackageInstallerService extends IPackageInstaller.Stub implements
params.appLabel = TextUtils.trimToSize(params.appLabel, params.appLabel = TextUtils.trimToSize(params.appLabel,
PackageItemInfo.MAX_SAFE_LABEL_LENGTH); PackageItemInfo.MAX_SAFE_LABEL_LENGTH);

View File

@ -1,4 +1,4 @@
From 1e0f995b0b68d811d4225e73426c4c6350a506ad Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Almaz Mingaleev <mingaleev@google.com> From: Almaz Mingaleev <mingaleev@google.com>
Date: Wed, 10 Jul 2024 13:38:35 +0100 Date: Wed, 10 Jul 2024 13:38:35 +0100
Subject: [PATCH] Do not accept zip files with invalid headers. Subject: [PATCH] Do not accept zip files with invalid headers.
@ -30,7 +30,7 @@ Change-Id: I545cdd49ec3cc138331145f4716c8148662a478b
1 file changed, 11 insertions(+) 1 file changed, 11 insertions(+)
diff --git a/ojluni/src/main/native/zip_util.c b/ojluni/src/main/native/zip_util.c diff --git a/ojluni/src/main/native/zip_util.c b/ojluni/src/main/native/zip_util.c
index aa9c5cede9e..16951a78ede 100644 index 6c02d2bc73b..475be3afd9d 100644
--- a/ojluni/src/main/native/zip_util.c --- a/ojluni/src/main/native/zip_util.c
+++ b/ojluni/src/main/native/zip_util.c +++ b/ojluni/src/main/native/zip_util.c
@@ -878,6 +878,17 @@ ZIP_Put_In_Cache0(const char *name, ZFILE zfd, char **pmsg, jlong lastModified, @@ -878,6 +878,17 @@ ZIP_Put_In_Cache0(const char *name, ZFILE zfd, char **pmsg, jlong lastModified,

View File

@ -177,10 +177,10 @@ index 403e90403..0b792c974 100644
{"initNative", "()V", (void*)initNative}, {"initNative", "()V", (void*)initNative},
{"cleanupNative", "()V", (void*)cleanupNative}, {"cleanupNative", "()V", (void*)cleanupNative},
diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp
index 7838ff6ce..9b233c654 100644 index 60fffc2f3..a709c8479 100644
--- a/jni/com_android_bluetooth_hid_host.cpp --- a/jni/com_android_bluetooth_hid_host.cpp
+++ b/jni/com_android_bluetooth_hid_host.cpp +++ b/jni/com_android_bluetooth_hid_host.cpp
@@ -498,7 +498,7 @@ static jboolean setIdleTimeNative(JNIEnv* env, jobject object, @@ -500,7 +500,7 @@ static jboolean setIdleTimeNative(JNIEnv* env, jobject object,
return status == BT_STATUS_SUCCESS ? JNI_TRUE : JNI_FALSE; return status == BT_STATUS_SUCCESS ? JNI_TRUE : JNI_FALSE;
} }

View File

@ -1,8 +1,7 @@
From 6799e4b038c33ce3fd175749ebdea69379a5489f Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:44:45 +0000 Date: Mon, 8 Apr 2024 19:44:45 +0000
Subject: [PATCH] RESTRICT AUTOMERGE Disallow unexpected incoming HID Subject: [PATCH] Disallow unexpected incoming HID connections 2/2
connections 2/2
HID profile accepted any new incoming HID connection. Even when the HID profile accepted any new incoming HID connection. Even when the
connection policy disabled HID connection, remote devices could initiate connection policy disabled HID connection, remote devices could initiate
@ -25,10 +24,10 @@ Change-Id: I1d7e886b1045d026f96c8274aca86dc499f87777
2 files changed, 10 insertions(+), 5 deletions(-) 2 files changed, 10 insertions(+), 5 deletions(-)
diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp diff --git a/jni/com_android_bluetooth_hid_host.cpp b/jni/com_android_bluetooth_hid_host.cpp
index cab5e3361..22c7dcfe8 100644 index 7838ff6ce..60fffc2f3 100644
--- a/jni/com_android_bluetooth_hid_host.cpp --- a/jni/com_android_bluetooth_hid_host.cpp
+++ b/jni/com_android_bluetooth_hid_host.cpp +++ b/jni/com_android_bluetooth_hid_host.cpp
@@ -284,7 +284,8 @@ static jboolean connectHidNative(JNIEnv* env, jobject object, @@ -276,7 +276,8 @@ static jboolean connectHidNative(JNIEnv* env, jobject object,
} }
static jboolean disconnectHidNative(JNIEnv* env, jobject object, static jboolean disconnectHidNative(JNIEnv* env, jobject object,
@ -38,7 +37,7 @@ index cab5e3361..22c7dcfe8 100644
jbyte* addr; jbyte* addr;
jboolean ret = JNI_TRUE; jboolean ret = JNI_TRUE;
if (!sBluetoothHidInterface) return JNI_FALSE; if (!sBluetoothHidInterface) return JNI_FALSE;
@@ -295,7 +296,8 @@ static jboolean disconnectHidNative(JNIEnv* env, jobject object, @@ -287,7 +288,8 @@ static jboolean disconnectHidNative(JNIEnv* env, jobject object,
return JNI_FALSE; return JNI_FALSE;
} }
@ -48,7 +47,7 @@ index cab5e3361..22c7dcfe8 100644
if (status != BT_STATUS_SUCCESS) { if (status != BT_STATUS_SUCCESS) {
ALOGE("Failed disconnect hid channel, status: %d", status); ALOGE("Failed disconnect hid channel, status: %d", status);
ret = JNI_FALSE; ret = JNI_FALSE;
@@ -511,7 +513,7 @@ static JNINativeMethod sMethods[] = { @@ -503,7 +505,7 @@ static JNINativeMethod sMethods[] = {
{"initializeNative", "()V", (void*)initializeNative}, {"initializeNative", "()V", (void*)initializeNative},
{"cleanupNative", "()V", (void*)cleanupNative}, {"cleanupNative", "()V", (void*)cleanupNative},
{"connectHidNative", "([B)Z", (void*)connectHidNative}, {"connectHidNative", "([B)Z", (void*)connectHidNative},
@ -58,22 +57,22 @@ index cab5e3361..22c7dcfe8 100644
{"virtualUnPlugNative", "([B)Z", (void*)virtualUnPlugNative}, {"virtualUnPlugNative", "([B)Z", (void*)virtualUnPlugNative},
{"setProtocolModeNative", "([BB)Z", (void*)setProtocolModeNative}, {"setProtocolModeNative", "([BB)Z", (void*)setProtocolModeNative},
diff --git a/src/com/android/bluetooth/hid/HidHostService.java b/src/com/android/bluetooth/hid/HidHostService.java diff --git a/src/com/android/bluetooth/hid/HidHostService.java b/src/com/android/bluetooth/hid/HidHostService.java
index 10d414d46..ed35c2908 100644 index c378f8e89..fea167148 100644
--- a/src/com/android/bluetooth/hid/HidHostService.java --- a/src/com/android/bluetooth/hid/HidHostService.java
+++ b/src/com/android/bluetooth/hid/HidHostService.java +++ b/src/com/android/bluetooth/hid/HidHostService.java
@@ -161,7 +161,10 @@ public void handleMessage(Message msg) { @@ -157,7 +157,10 @@ public class HidHostService extends ProfileService {
break; break;
case MESSAGE_DISCONNECT: { case MESSAGE_DISCONNECT: {
BluetoothDevice device = (BluetoothDevice) msg.obj; BluetoothDevice device = (BluetoothDevice) msg.obj;
- if (!disconnectHidNative(Utils.getByteAddress(device))) { - if (!disconnectHidNative(Utils.getByteAddress(device))) {
+ int connectionPolicy = getConnectionPolicy(device); + int connectionPolicy = getPriority(device);
+ boolean reconnectAllowed = + boolean reconnectAllowed =
+ connectionPolicy == BluetoothProfile.CONNECTION_POLICY_ALLOWED; + connectionPolicy == BluetoothProfile.PRIORITY_ON;
+ if (!disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed)) { + if (!disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed)) {
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING);
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED);
break; break;
@@ -934,7 +937,7 @@ public void dump(StringBuilder sb) { @@ -871,7 +874,7 @@ public class HidHostService extends ProfileService {
private native boolean connectHidNative(byte[] btAddress); private native boolean connectHidNative(byte[] btAddress);

View File

@ -1,4 +1,4 @@
From c766d2a2d50d579c4b711d1cacd2677e0afcf1a4 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chaohui Wang <chaohuiw@google.com> From: Chaohui Wang <chaohuiw@google.com>
Date: Thu, 2 Nov 2023 11:43:00 +0800 Date: Thu, 2 Nov 2023 11:43:00 +0800
Subject: [PATCH] Limit wifi item edit content's max length to 500 Subject: [PATCH] Limit wifi item edit content's max length to 500

View File

@ -1,4 +1,4 @@
From e8fcd9986114b673068e77ad14202edc2b6aaaf5 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Jason Chiu <chiujason@google.com> From: Jason Chiu <chiujason@google.com>
Date: Wed, 31 Jan 2024 16:29:01 +0800 Date: Wed, 31 Jan 2024 16:29:01 +0800
Subject: [PATCH] Replace getCallingActivity() with getLaunchedFromPackage() Subject: [PATCH] Replace getCallingActivity() with getLaunchedFromPackage()
@ -54,7 +54,7 @@ index 63bf420c027..3a62ddfb67e 100644
import com.android.settingslib.search.SearchIndexableResources; import com.android.settingslib.search.SearchIndexableResources;
import com.android.settingslib.search.SearchIndexableResourcesMobile; import com.android.settingslib.search.SearchIndexableResourcesMobile;
@@ -32,26 +33,23 @@ @@ -32,26 +33,23 @@ import com.android.settingslib.search.SearchIndexableResourcesMobile;
*/ */
public class SearchFeatureProviderImpl implements SearchFeatureProvider { public class SearchFeatureProviderImpl implements SearchFeatureProvider {
@ -90,7 +90,7 @@ index 63bf420c027..3a62ddfb67e 100644
} }
@Override @Override
@@ -69,7 +67,7 @@ public Intent buildSearchIntent(Context context, int pageId) { @@ -69,7 +67,7 @@ public class SearchFeatureProviderImpl implements SearchFeatureProvider {
.putExtra(Intent.EXTRA_REFERRER, buildReferrer(context, pageId)); .putExtra(Intent.EXTRA_REFERRER, buildReferrer(context, pageId));
} }
@ -103,7 +103,7 @@ diff --git a/src/com/android/settings/search/SearchResultTrampoline.java b/src/c
index 3bbe6bd58a7..3a14e874eae 100644 index 3bbe6bd58a7..3a14e874eae 100644
--- a/src/com/android/settings/search/SearchResultTrampoline.java --- a/src/com/android/settings/search/SearchResultTrampoline.java
+++ b/src/com/android/settings/search/SearchResultTrampoline.java +++ b/src/com/android/settings/search/SearchResultTrampoline.java
@@ -19,8 +19,10 @@ @@ -19,8 +19,10 @@ package com.android.settings.search;
import static com.android.settings.SettingsActivity.EXTRA_SHOW_FRAGMENT_ARGUMENTS; import static com.android.settings.SettingsActivity.EXTRA_SHOW_FRAGMENT_ARGUMENTS;
import android.app.Activity; import android.app.Activity;
@ -137,7 +137,7 @@ diff --git a/tests/robotests/src/com/android/settings/search/SearchFeatureProvid
index 444a8137889..ebd935d3406 100644 index 444a8137889..ebd935d3406 100644
--- a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java --- a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
+++ b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java +++ b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
@@ -21,7 +21,6 @@ @@ -21,7 +21,6 @@ import static com.google.common.truth.Truth.assertThat;
import android.app.Activity; import android.app.Activity;
import android.app.settings.SettingsEnums; import android.app.settings.SettingsEnums;
@ -145,7 +145,7 @@ index 444a8137889..ebd935d3406 100644
import android.content.Intent; import android.content.Intent;
import android.content.pm.ActivityInfo; import android.content.pm.ActivityInfo;
import android.content.pm.ResolveInfo; import android.content.pm.ResolveInfo;
@@ -126,20 +125,22 @@ public void verifyLaunchSearchResultPageCaller_nullCaller_shouldCrash() { @@ -126,20 +125,22 @@ public class SearchFeatureProviderImplTest {
@Test(expected = SecurityException.class) @Test(expected = SecurityException.class)
public void verifyLaunchSearchResultPageCaller_badCaller_shouldCrash() { public void verifyLaunchSearchResultPageCaller_badCaller_shouldCrash() {

View File

@ -1,4 +1,4 @@
From 4e81f642c6aba3a4344d5973436655b94bb9f0d6 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Antol <cantol@google.com> From: Chris Antol <cantol@google.com>
Date: Tue, 4 Jun 2024 17:00:46 +0000 Date: Tue, 4 Jun 2024 17:00:46 +0000
Subject: [PATCH] Ignore fragment attr from ext authenticator resource Subject: [PATCH] Ignore fragment attr from ext authenticator resource
@ -19,7 +19,7 @@ diff --git a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
index c639d1df2eb..84386a38f08 100644 index c639d1df2eb..84386a38f08 100644
--- a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java --- a/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
+++ b/src/com/android/settings/accounts/AccountTypePreferenceLoader.java +++ b/src/com/android/settings/accounts/AccountTypePreferenceLoader.java
@@ -32,6 +32,10 @@ @@ -32,6 +32,10 @@ import android.os.UserHandle;
import android.text.TextUtils; import android.text.TextUtils;
import android.util.Log; import android.util.Log;
@ -30,7 +30,7 @@ index c639d1df2eb..84386a38f08 100644
import androidx.preference.Preference; import androidx.preference.Preference;
import androidx.preference.Preference.OnPreferenceClickListener; import androidx.preference.Preference.OnPreferenceClickListener;
import androidx.preference.PreferenceFragmentCompat; import androidx.preference.PreferenceFragmentCompat;
@@ -45,6 +49,8 @@ @@ -45,6 +49,8 @@ import com.android.settings.utils.LocalClassLoaderContextThemeWrapper;
import com.android.settingslib.accounts.AuthenticatorHelper; import com.android.settingslib.accounts.AuthenticatorHelper;
import com.android.settingslib.core.instrumentation.Instrumentable; import com.android.settingslib.core.instrumentation.Instrumentable;
@ -39,7 +39,7 @@ index c639d1df2eb..84386a38f08 100644
/** /**
* Class to load the preference screen to be added to the settings page for the specific account * Class to load the preference screen to be added to the settings page for the specific account
* type as specified in the account-authenticator. * type as specified in the account-authenticator.
@@ -83,6 +89,7 @@ public PreferenceScreen addPreferencesForType(final String accountType, @@ -83,6 +89,7 @@ public class AccountTypePreferenceLoader {
try { try {
desc = mAuthenticatorHelper.getAccountTypeDescription(accountType); desc = mAuthenticatorHelper.getAccountTypeDescription(accountType);
if (desc != null && desc.accountPreferencesId != 0) { if (desc != null && desc.accountPreferencesId != 0) {
@ -47,7 +47,7 @@ index c639d1df2eb..84386a38f08 100644
// Load the context of the target package, then apply the // Load the context of the target package, then apply the
// base Settings theme (no references to local resources) // base Settings theme (no references to local resources)
// and create a context theme wrapper so that we get the // and create a context theme wrapper so that we get the
@@ -98,6 +105,12 @@ public PreferenceScreen addPreferencesForType(final String accountType, @@ -98,6 +105,12 @@ public class AccountTypePreferenceLoader {
themedCtx.getTheme().setTo(baseTheme); themedCtx.getTheme().setTo(baseTheme);
prefs = mFragment.getPreferenceManager().inflateFromResource(themedCtx, prefs = mFragment.getPreferenceManager().inflateFromResource(themedCtx,
desc.accountPreferencesId, parent); desc.accountPreferencesId, parent);
@ -60,7 +60,7 @@ index c639d1df2eb..84386a38f08 100644
} }
} catch (PackageManager.NameNotFoundException e) { } catch (PackageManager.NameNotFoundException e) {
Log.w(TAG, "Couldn't load preferences.xml file from " + desc.packageName); Log.w(TAG, "Couldn't load preferences.xml file from " + desc.packageName);
@@ -182,6 +195,48 @@ public boolean onPreferenceClick(Preference preference) { @@ -182,6 +195,48 @@ public class AccountTypePreferenceLoader {
} }
} }

View File

@ -1,4 +1,4 @@
From 31469a42bf69d10b697f74989e2516a3bcece609 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Antol <cantol@google.com> From: Chris Antol <cantol@google.com>
Date: Mon, 25 Mar 2024 23:49:35 +0000 Date: Mon, 25 Mar 2024 23:49:35 +0000
Subject: [PATCH] RESTRICT AUTOMERGE Restrict Settings Homepage prior to Subject: [PATCH] RESTRICT AUTOMERGE Restrict Settings Homepage prior to
@ -20,7 +20,7 @@ diff --git a/src/com/android/settings/homepage/SettingsHomepageActivity.java b/s
index 5e6c54bb7c2..784c6a2ec9c 100644 index 5e6c54bb7c2..784c6a2ec9c 100644
--- a/src/com/android/settings/homepage/SettingsHomepageActivity.java --- a/src/com/android/settings/homepage/SettingsHomepageActivity.java
+++ b/src/com/android/settings/homepage/SettingsHomepageActivity.java +++ b/src/com/android/settings/homepage/SettingsHomepageActivity.java
@@ -20,6 +20,7 @@ @@ -20,6 +20,7 @@ import android.animation.LayoutTransition;
import android.app.ActivityManager; import android.app.ActivityManager;
import android.app.settings.SettingsEnums; import android.app.settings.SettingsEnums;
import android.os.Bundle; import android.os.Bundle;
@ -28,7 +28,7 @@ index 5e6c54bb7c2..784c6a2ec9c 100644
import android.view.View; import android.view.View;
import android.widget.FrameLayout; import android.widget.FrameLayout;
import android.widget.ImageView; import android.widget.ImageView;
@@ -39,10 +40,22 @@ @@ -39,10 +40,22 @@ import com.android.settings.overlay.FeatureFactory;
public class SettingsHomepageActivity extends FragmentActivity { public class SettingsHomepageActivity extends FragmentActivity {

View File

@ -1,4 +1,4 @@
From da6ee7b698b7d4c4cbe56c70027904268b72d0f1 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Yiling Chuang <emilychuang@google.com> From: Yiling Chuang <emilychuang@google.com>
Date: Mon, 8 Jul 2024 03:09:50 +0000 Date: Mon, 8 Jul 2024 03:09:50 +0000
Subject: [PATCH] RESTRICT AUTOMERGE FRP bypass defense in App battery usage Subject: [PATCH] RESTRICT AUTOMERGE FRP bypass defense in App battery usage
@ -24,7 +24,7 @@ diff --git a/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetail.java b/
index e8d5f3330f2..d17642053e7 100644 index e8d5f3330f2..d17642053e7 100644
--- a/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetail.java --- a/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetail.java
+++ b/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetail.java +++ b/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetail.java
@@ -210,6 +210,11 @@ public void onResume() { @@ -210,6 +210,11 @@ public class AdvancedPowerUsageDetail extends DashboardFragment implements
initPreference(); initPreference();
} }
@ -40,7 +40,7 @@ diff --git a/tests/robotests/src/com/android/settings/fuelgauge/AdvancedPowerUsa
index 8eeac8d26b0..37fa511beeb 100644 index 8eeac8d26b0..37fa511beeb 100644
--- a/tests/robotests/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetailTest.java --- a/tests/robotests/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetailTest.java
+++ b/tests/robotests/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetailTest.java +++ b/tests/robotests/src/com/android/settings/fuelgauge/AdvancedPowerUsageDetailTest.java
@@ -395,4 +395,9 @@ public void testInitPreference_hasCorrectSummary() { @@ -395,4 +395,9 @@ public class AdvancedPowerUsageDetailTest {
assertThat(mForegroundPreference.getSummary().toString()).isEqualTo("Used for 0 min"); assertThat(mForegroundPreference.getSummary().toString()).isEqualTo("Used for 0 min");
assertThat(mBackgroundPreference.getSummary().toString()).isEqualTo("Active for 0 min"); assertThat(mBackgroundPreference.getSummary().toString()).isEqualTo("Active for 0 min");
} }

View File

@ -1,4 +1,4 @@
From 5aa0eae41483c8994e1771ace987c258a52f3bfc Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Grant Menke <grantmenke@google.com> From: Grant Menke <grantmenke@google.com>
Date: Thu, 25 Apr 2024 10:43:43 -0700 Date: Thu, 25 Apr 2024 10:43:43 -0700
Subject: [PATCH] DO NOT MERGE Unbind CS if connection is not created within 15 Subject: [PATCH] DO NOT MERGE Unbind CS if connection is not created within 15
@ -49,7 +49,7 @@ diff --git a/src/com/android/server/telecom/Call.java b/src/com/android/server/t
index ecc635997..699c9ffee 100644 index ecc635997..699c9ffee 100644
--- a/src/com/android/server/telecom/Call.java --- a/src/com/android/server/telecom/Call.java
+++ b/src/com/android/server/telecom/Call.java +++ b/src/com/android/server/telecom/Call.java
@@ -313,6 +313,17 @@ public void onContactPhotoQueryComplete(Uri handle, CallerInfo callerInfo) { @@ -313,6 +313,17 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
/** The state of the call. */ /** The state of the call. */
private int mState; private int mState;
@ -67,7 +67,7 @@ index ecc635997..699c9ffee 100644
/** The handle with which to establish this call. */ /** The handle with which to establish this call. */
private Uri mHandle; private Uri mHandle;
@@ -816,6 +827,19 @@ public ConnectionServiceFocusManager.ConnectionServiceFocus getConnectionService @@ -816,6 +827,19 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
return mConnectionService; return mConnectionService;
} }
@ -87,7 +87,7 @@ index ecc635997..699c9ffee 100644
@VisibleForTesting @VisibleForTesting
public int getState() { public int getState() {
return mState; return mState;
@@ -1739,6 +1763,7 @@ public void handleCreateConnectionSuccess( @@ -1739,6 +1763,7 @@ public class Call implements CreateConnectionResponse, EventManager.Loggable,
CallIdMapper idMapper, CallIdMapper idMapper,
ParcelableConnection connection) { ParcelableConnection connection) {
Log.v(this, "handleCreateConnectionSuccessful %s", connection); Log.v(this, "handleCreateConnectionSuccessful %s", connection);
@ -99,7 +99,7 @@ diff --git a/src/com/android/server/telecom/ConnectionServiceWrapper.java b/src/
index bd5e37f89..a69d725fd 100644 index bd5e37f89..a69d725fd 100644
--- a/src/com/android/server/telecom/ConnectionServiceWrapper.java --- a/src/com/android/server/telecom/ConnectionServiceWrapper.java
+++ b/src/com/android/server/telecom/ConnectionServiceWrapper.java +++ b/src/com/android/server/telecom/ConnectionServiceWrapper.java
@@ -37,6 +37,7 @@ @@ -37,6 +37,7 @@ import android.telecom.ConnectionService;
import android.telecom.DisconnectCause; import android.telecom.DisconnectCause;
import android.telecom.GatewayInfo; import android.telecom.GatewayInfo;
import android.telecom.Log; import android.telecom.Log;
@ -107,7 +107,7 @@ index bd5e37f89..a69d725fd 100644
import android.telecom.Logging.Session; import android.telecom.Logging.Session;
import android.telecom.ParcelableConference; import android.telecom.ParcelableConference;
import android.telecom.ParcelableConnection; import android.telecom.ParcelableConnection;
@@ -60,6 +61,11 @@ @@ -60,6 +61,11 @@ import java.util.List;
import java.util.Map; import java.util.Map;
import java.util.Set; import java.util.Set;
import java.util.concurrent.ConcurrentHashMap; import java.util.concurrent.ConcurrentHashMap;
@ -119,7 +119,7 @@ index bd5e37f89..a69d725fd 100644
/** /**
* Wrapper for {@link IConnectionService}s, handles binding to {@link IConnectionService} and keeps * Wrapper for {@link IConnectionService}s, handles binding to {@link IConnectionService} and keeps
@@ -71,6 +77,11 @@ @@ -71,6 +77,11 @@ import java.util.concurrent.ConcurrentHashMap;
public class ConnectionServiceWrapper extends ServiceBinder implements public class ConnectionServiceWrapper extends ServiceBinder implements
ConnectionServiceFocusManager.ConnectionServiceFocus { ConnectionServiceFocusManager.ConnectionServiceFocus {
@ -131,7 +131,7 @@ index bd5e37f89..a69d725fd 100644
private final class Adapter extends IConnectionServiceAdapter.Stub { private final class Adapter extends IConnectionServiceAdapter.Stub {
@Override @Override
@@ -82,6 +93,12 @@ public void handleCreateConnectionComplete(String callId, ConnectionRequest requ @@ -82,6 +93,12 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
try { try {
synchronized (mLock) { synchronized (mLock) {
logIncoming("handleCreateConnectionComplete %s", callId); logIncoming("handleCreateConnectionComplete %s", callId);
@ -144,7 +144,7 @@ index bd5e37f89..a69d725fd 100644
// Check status hints image for cross user access // Check status hints image for cross user access
if (connection.getStatusHints() != null) { if (connection.getStatusHints() != null) {
Icon icon = connection.getStatusHints().getIcon(); Icon icon = connection.getStatusHints().getIcon();
@@ -1126,7 +1143,8 @@ public void setConferenceState(String callId, boolean isConference, @@ -1126,7 +1143,8 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
* @param context The context. * @param context The context.
* @param userHandle The {@link UserHandle} to use when binding. * @param userHandle The {@link UserHandle} to use when binding.
*/ */
@ -154,7 +154,7 @@ index bd5e37f89..a69d725fd 100644
ComponentName componentName, ComponentName componentName,
ConnectionServiceRepository connectionServiceRepository, ConnectionServiceRepository connectionServiceRepository,
PhoneAccountRegistrar phoneAccountRegistrar, PhoneAccountRegistrar phoneAccountRegistrar,
@@ -1229,6 +1247,26 @@ public void onSuccess() { @@ -1229,6 +1247,26 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
.setRttPipeToInCall(call.getCsToInCallRttPipeForCs()) .setRttPipeToInCall(call.getCsToInCallRttPipeForCs())
.build(); .build();
@ -181,7 +181,7 @@ index bd5e37f89..a69d725fd 100644
try { try {
mServiceInterface.createConnection( mServiceInterface.createConnection(
call.getConnectionManagerPhoneAccount(), call.getConnectionManagerPhoneAccount(),
@@ -1514,7 +1552,8 @@ void stopDtmfTone(Call call) { @@ -1514,7 +1552,8 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
} }
} }
@ -191,7 +191,7 @@ index bd5e37f89..a69d725fd 100644
if (mCallIdMapper.getCallId(call) == null) { if (mCallIdMapper.getCallId(call) == null) {
mCallIdMapper.addCall(call); mCallIdMapper.addCall(call);
} }
@@ -1909,4 +1948,9 @@ public String toString() { @@ -1909,4 +1948,9 @@ public class ConnectionServiceWrapper extends ServiceBinder implements
sb.append("]"); sb.append("]");
return sb.toString(); return sb.toString();
} }
@ -205,7 +205,7 @@ diff --git a/src/com/android/server/telecom/LogUtils.java b/src/com/android/serv
index 760d24e10..37afdb8f6 100644 index 760d24e10..37afdb8f6 100644
--- a/src/com/android/server/telecom/LogUtils.java --- a/src/com/android/server/telecom/LogUtils.java
+++ b/src/com/android/server/telecom/LogUtils.java +++ b/src/com/android/server/telecom/LogUtils.java
@@ -87,6 +87,7 @@ public final static class Events { @@ -87,6 +87,7 @@ public class LogUtils {
public static final String STOP_CALL_WAITING_TONE = "STOP_CALL_WAITING_TONE"; public static final String STOP_CALL_WAITING_TONE = "STOP_CALL_WAITING_TONE";
public static final String START_CONNECTION = "START_CONNECTION"; public static final String START_CONNECTION = "START_CONNECTION";
public static final String CREATE_CONNECTION_FAILED = "CREATE_CONNECTION_FAILED"; public static final String CREATE_CONNECTION_FAILED = "CREATE_CONNECTION_FAILED";
@ -217,7 +217,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/BasicCallTests.java b/te
index 7889d0487..46aa758b8 100644 index 7889d0487..46aa758b8 100644
--- a/tests/src/com/android/server/telecom/tests/BasicCallTests.java --- a/tests/src/com/android/server/telecom/tests/BasicCallTests.java
+++ b/tests/src/com/android/server/telecom/tests/BasicCallTests.java +++ b/tests/src/com/android/server/telecom/tests/BasicCallTests.java
@@ -939,6 +939,7 @@ public void testOutgoingCallSelectPhoneAccountVideo() throws Exception { @@ -939,6 +939,7 @@ public class BasicCallTests extends TelecomSystemTest {
call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle()); call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle());
assert(call.isVideoCallingSupportedByPhoneAccount()); assert(call.isVideoCallingSupportedByPhoneAccount());
assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState());
@ -225,7 +225,7 @@ index 7889d0487..46aa758b8 100644
} }
/** /**
@@ -962,6 +963,7 @@ public void testOutgoingCallSelectPhoneAccountNoVideo() throws Exception { @@ -962,6 +963,7 @@ public class BasicCallTests extends TelecomSystemTest {
call.setTargetPhoneAccount(mPhoneAccountA2.getAccountHandle()); call.setTargetPhoneAccount(mPhoneAccountA2.getAccountHandle());
assert(!call.isVideoCallingSupportedByPhoneAccount()); assert(!call.isVideoCallingSupportedByPhoneAccount());
assertEquals(VideoProfile.STATE_AUDIO_ONLY, call.getVideoState()); assertEquals(VideoProfile.STATE_AUDIO_ONLY, call.getVideoState());
@ -237,7 +237,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java b/
index 7adc99aa3..6e9515008 100644 index 7adc99aa3..6e9515008 100644
--- a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java --- a/tests/src/com/android/server/telecom/tests/CallsManagerTest.java
+++ b/tests/src/com/android/server/telecom/tests/CallsManagerTest.java +++ b/tests/src/com/android/server/telecom/tests/CallsManagerTest.java
@@ -36,10 +36,12 @@ @@ -36,10 +36,12 @@ import static org.mockito.Mockito.timeout;
import static org.mockito.Mockito.times; import static org.mockito.Mockito.times;
import static org.mockito.Mockito.verify; import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when; import static org.mockito.Mockito.when;
@ -250,7 +250,7 @@ index 7adc99aa3..6e9515008 100644
import android.os.Process; import android.os.Process;
import android.os.SystemClock; import android.os.SystemClock;
import android.os.UserHandle; import android.os.UserHandle;
@@ -55,6 +57,7 @@ @@ -55,6 +57,7 @@ import android.telephony.TelephonyManager;
import android.test.suitebuilder.annotation.MediumTest; import android.test.suitebuilder.annotation.MediumTest;
import android.test.suitebuilder.annotation.SmallTest; import android.test.suitebuilder.annotation.SmallTest;
@ -258,7 +258,7 @@ index 7adc99aa3..6e9515008 100644
import com.android.internal.telephony.CallerInfo; import com.android.internal.telephony.CallerInfo;
import com.android.server.telecom.AsyncRingtonePlayer; import com.android.server.telecom.AsyncRingtonePlayer;
import com.android.server.telecom.Call; import com.android.server.telecom.Call;
@@ -68,6 +71,7 @@ @@ -68,6 +71,7 @@ import com.android.server.telecom.ClockProxy;
import com.android.server.telecom.ConnectionServiceFocusManager; import com.android.server.telecom.ConnectionServiceFocusManager;
import com.android.server.telecom.ConnectionServiceFocusManager.ConnectionServiceFocusManagerFactory; import com.android.server.telecom.ConnectionServiceFocusManager.ConnectionServiceFocusManagerFactory;
import com.android.server.telecom.ConnectionServiceWrapper; import com.android.server.telecom.ConnectionServiceWrapper;
@ -266,7 +266,7 @@ index 7adc99aa3..6e9515008 100644
import com.android.server.telecom.DefaultDialerCache; import com.android.server.telecom.DefaultDialerCache;
import com.android.server.telecom.EmergencyCallHelper; import com.android.server.telecom.EmergencyCallHelper;
import com.android.server.telecom.HeadsetMediaButton; import com.android.server.telecom.HeadsetMediaButton;
@@ -90,6 +94,7 @@ @@ -90,6 +94,7 @@ import com.android.server.telecom.WiredHeadsetManager;
import com.android.server.telecom.bluetooth.BluetoothRouteManager; import com.android.server.telecom.bluetooth.BluetoothRouteManager;
import com.android.server.telecom.bluetooth.BluetoothStateReceiver; import com.android.server.telecom.bluetooth.BluetoothStateReceiver;
@ -282,7 +282,7 @@ index 7adc99aa3..6e9515008 100644
private CallsManager mCallsManager; private CallsManager mCallsManager;
@@ -240,6 +246,20 @@ public void setUp() throws Exception { @@ -240,6 +246,20 @@ public class CallsManagerTest extends TelecomTestCase {
eq(SIM_1_HANDLE), any())).thenReturn(SIM_1_ACCOUNT); eq(SIM_1_HANDLE), any())).thenReturn(SIM_1_ACCOUNT);
when(mPhoneAccountRegistrar.getPhoneAccount( when(mPhoneAccountRegistrar.getPhoneAccount(
eq(SIM_2_HANDLE), any())).thenReturn(SIM_2_ACCOUNT); eq(SIM_2_HANDLE), any())).thenReturn(SIM_2_ACCOUNT);
@ -303,7 +303,7 @@ index 7adc99aa3..6e9515008 100644
} }
@MediumTest @MediumTest
@@ -1111,6 +1131,32 @@ public void testCrossUserCallRedirectionEndEarlyForIncapablePhoneAccount() { @@ -1111,6 +1131,32 @@ public class CallsManagerTest extends TelecomTestCase {
assertTrue(argumentCaptor.getValue().contains("Unavailable phoneAccountHandle")); assertTrue(argumentCaptor.getValue().contains("Unavailable phoneAccountHandle"));
} }
@ -336,7 +336,7 @@ index 7adc99aa3..6e9515008 100644
private Call addSpyCall() { private Call addSpyCall() {
return addSpyCall(SIM_2_HANDLE, CallState.ACTIVE); return addSpyCall(SIM_2_HANDLE, CallState.ACTIVE);
} }
@@ -1189,4 +1235,19 @@ private void setupMsimAccounts() { @@ -1189,4 +1235,19 @@ public class CallsManagerTest extends TelecomTestCase {
when(mPhoneAccountRegistrar.getSimPhoneAccountsOfCurrentUser()).thenReturn( when(mPhoneAccountRegistrar.getSimPhoneAccountsOfCurrentUser()).thenReturn(
new ArrayList<>(Arrays.asList(SIM_1_HANDLE, SIM_2_HANDLE))); new ArrayList<>(Arrays.asList(SIM_1_HANDLE, SIM_2_HANDLE)));
} }
@ -360,7 +360,7 @@ diff --git a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.
index e6e8ba122..675913aa0 100644 index e6e8ba122..675913aa0 100644
--- a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java --- a/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java
+++ b/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java +++ b/tests/src/com/android/server/telecom/tests/ComponentContextFixture.java
@@ -549,6 +549,14 @@ public void addConnectionService( @@ -549,6 +549,14 @@ public class ComponentContextFixture implements TestFixture<Context> {
mServiceInfoByComponentName.put(componentName, serviceInfo); mServiceInfoByComponentName.put(componentName, serviceInfo);
} }
@ -375,7 +375,7 @@ index e6e8ba122..675913aa0 100644
public void addInCallService( public void addInCallService(
ComponentName componentName, ComponentName componentName,
IInCallService service) IInCallService service)
@@ -599,6 +607,12 @@ private void addService(String action, ComponentName name, IInterface service) { @@ -599,6 +607,12 @@ public class ComponentContextFixture implements TestFixture<Context> {
mComponentNameByService.put(service, name); mComponentNameByService.put(service, name);
} }

View File

@ -1,4 +1,4 @@
From b1f14158f389b0522a2eda4212344440dace65de Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Pranav Madapurmath <pmadapurmath@google.com> From: Pranav Madapurmath <pmadapurmath@google.com>
Date: Tue, 11 Jun 2024 15:51:39 +0000 Date: Tue, 11 Jun 2024 15:51:39 +0000
Subject: [PATCH] Unbind CallScreeningService when timeout reached. Subject: [PATCH] Unbind CallScreeningService when timeout reached.
@ -30,7 +30,7 @@ diff --git a/src/com/android/server/telecom/CallScreeningServiceHelper.java b/sr
index 89778e43a..5582a7da4 100644 index 89778e43a..5582a7da4 100644
--- a/src/com/android/server/telecom/CallScreeningServiceHelper.java --- a/src/com/android/server/telecom/CallScreeningServiceHelper.java
+++ b/src/com/android/server/telecom/CallScreeningServiceHelper.java +++ b/src/com/android/server/telecom/CallScreeningServiceHelper.java
@@ -185,6 +185,10 @@ public void onNullBinding(ComponentName name) { @@ -185,6 +185,10 @@ public class CallScreeningServiceHelper {
Log.w(TAG, "Cancelling call id process due to timeout"); Log.w(TAG, "Cancelling call id process due to timeout");
} }
mFuture.complete(null); mFuture.complete(null);

View File

@ -1,4 +1,4 @@
From f9f366e1227c0a46b54b959cd97851ca0b654501 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Tue, 11 Aug 2020 12:39:26 -0700 Date: Tue, 11 Aug 2020 12:39:26 -0700
Subject: [PATCH] Clean up BTM_SEC_MODE Subject: [PATCH] Clean up BTM_SEC_MODE
@ -16,7 +16,7 @@ Change-Id: Ib567b050a3cd38e0f77f1b875476ad84c3e949fa
2 files changed, 4 insertions(+), 29 deletions(-) 2 files changed, 4 insertions(+), 29 deletions(-)
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index 72dc9a2ed4b..8a194f08d59 100644 index 72dc9a2ed..8a194f08d 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -591,7 +591,6 @@ static bool btm_sec_set_security_level(CONNECTION_TYPE conn_type, @@ -591,7 +591,6 @@ static bool btm_sec_set_security_level(CONNECTION_TYPE conn_type,
@ -126,7 +126,7 @@ index 72dc9a2ed4b..8a194f08d59 100644
HCI_SSP_HOST_SUPPORTED(p_acl_cb->peer_lmp_feature_pages[1])) { HCI_SSP_HOST_SUPPORTED(p_acl_cb->peer_lmp_feature_pages[1])) {
p_dev_rec->sm4 = BTM_SM4_TRUE; p_dev_rec->sm4 = BTM_SM4_TRUE;
diff --git a/stack/include/btm_api_types.h b/stack/include/btm_api_types.h diff --git a/stack/include/btm_api_types.h b/stack/include/btm_api_types.h
index 0d3d7d4b689..21c97d53f29 100644 index 0d3d7d4b6..21c97d53f 100644
--- a/stack/include/btm_api_types.h --- a/stack/include/btm_api_types.h
+++ b/stack/include/btm_api_types.h +++ b/stack/include/btm_api_types.h
@@ -1038,12 +1038,8 @@ typedef void(tBTM_ESCO_CBACK)(tBTM_ESCO_EVT event, tBTM_ESCO_EVT_DATA* p_data); @@ -1038,12 +1038,8 @@ typedef void(tBTM_ESCO_CBACK)(tBTM_ESCO_EVT event, tBTM_ESCO_EVT_DATA* p_data);

View File

@ -1,4 +1,4 @@
From 144792df6991b7e9b462b657f93d05fa45ca4d43 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Mon, 7 Sep 2020 09:37:31 -0700 Date: Mon, 7 Sep 2020 09:37:31 -0700
Subject: [PATCH] Add getters to Subject: [PATCH] Add getters to
@ -17,7 +17,7 @@ Change-Id: Ia024a6977d606714f7edc58ded09f82a95703324
1 file changed, 60 insertions(+) 1 file changed, 60 insertions(+)
diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h
index a0460b1c0eb..e7450a5746d 100644 index a0460b1c0..e7450a574 100644
--- a/stack/btm/btm_int_types.h --- a/stack/btm/btm_int_types.h
+++ b/stack/btm/btm_int_types.h +++ b/stack/btm/btm_int_types.h
@@ -516,6 +516,37 @@ typedef struct { @@ -516,6 +516,37 @@ typedef struct {

View File

@ -1,4 +1,4 @@
From e81da50d737fe764f9dc7852185d72a576a230ec Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Thu, 14 Jan 2021 14:04:09 -0800 Date: Thu, 14 Jan 2021 14:04:09 -0800
Subject: [PATCH] Add APIs stack/btm/security_device_record:: Subject: [PATCH] Add APIs stack/btm/security_device_record::
@ -17,7 +17,7 @@ Change-Id: I820541c1f2fc86202710b7ef1bb5756ca9427851
1 file changed, 4 insertions(+) 1 file changed, 4 insertions(+)
diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h
index e7450a5746..a5bd894abd 100644 index e7450a574..a5bd894ab 100644
--- a/stack/btm/btm_int_types.h --- a/stack/btm/btm_int_types.h
+++ b/stack/btm/btm_int_types.h +++ b/stack/btm/btm_int_types.h
@@ -475,6 +475,10 @@ typedef struct { @@ -475,6 +475,10 @@ typedef struct {

View File

@ -1,4 +1,4 @@
From 0690014ef4e8b810871c91372d61fd59f2f2f60e Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Fri, 1 Jan 2021 19:11:49 -0800 Date: Fri, 1 Jan 2021 19:11:49 -0800
Subject: [PATCH] Add tACL_CONN::SupportsSecureConnections Subject: [PATCH] Add tACL_CONN::SupportsSecureConnections
@ -15,7 +15,7 @@ Change-Id: I4ede2886aa5d90bfab8fccea5edaed70ad1514e7
1 file changed, 12 insertions(+) 1 file changed, 12 insertions(+)
diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h diff --git a/stack/btm/btm_int_types.h b/stack/btm/btm_int_types.h
index a5bd894abd..3ca1182d54 100644 index a5bd894ab..3ca1182d5 100644
--- a/stack/btm/btm_int_types.h --- a/stack/btm/btm_int_types.h
+++ b/stack/btm/btm_int_types.h +++ b/stack/btm/btm_int_types.h
@@ -578,7 +578,19 @@ typedef struct { @@ -578,7 +578,19 @@ typedef struct {

View File

@ -1,4 +1,4 @@
From 9aa51330f13f42da60f0641b7ece6818690151d4 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Fri, 1 Jan 2021 19:12:36 -0800 Date: Fri, 1 Jan 2021 19:12:36 -0800
Subject: [PATCH] Use tACL_CONN::SupportsSecureConnections Subject: [PATCH] Use tACL_CONN::SupportsSecureConnections
@ -15,7 +15,7 @@ Change-Id: I7bfe087dcc28cfaeb492db1e1a6ec276e1e29ce2
1 file changed, 9 insertions(+), 13 deletions(-) 1 file changed, 9 insertions(+), 13 deletions(-)
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index 8a194f08d5..bd11381abb 100644 index 8a194f08d..bd11381ab 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -1727,7 +1727,7 @@ bool BTM_PeerSupportsSecureConnections(const RawAddress& bd_addr) { @@ -1727,7 +1727,7 @@ bool BTM_PeerSupportsSecureConnections(const RawAddress& bd_addr) {

View File

@ -1,4 +1,4 @@
From 060dad70cc532963ab0ff727aa8aebf8f8424beb Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Tue, 20 Oct 2020 18:48:52 -0700 Date: Tue, 20 Oct 2020 18:48:52 -0700
Subject: [PATCH] Refactor btm_sec_set_peer_sec_caps Subject: [PATCH] Refactor btm_sec_set_peer_sec_caps
@ -16,7 +16,7 @@ Change-Id: I7cb1bae627c731106ab3a93442acb8f6bb2018fa
3 files changed, 17 insertions(+), 7 deletions(-) 3 files changed, 17 insertions(+), 7 deletions(-)
diff --git a/stack/btm/btm_acl.cc b/stack/btm/btm_acl.cc diff --git a/stack/btm/btm_acl.cc b/stack/btm/btm_acl.cc
index 55772e69883..4717a95d7b2 100644 index 55772e698..4717a95d7 100644
--- a/stack/btm/btm_acl.cc --- a/stack/btm/btm_acl.cc
+++ b/stack/btm/btm_acl.cc +++ b/stack/btm/btm_acl.cc
@@ -261,7 +261,13 @@ void btm_acl_created(const RawAddress& bda, DEV_CLASS dc, BD_NAME bdn, @@ -261,7 +261,13 @@ void btm_acl_created(const RawAddress& bda, DEV_CLASS dc, BD_NAME bdn,
@ -49,7 +49,7 @@ index 55772e69883..4717a95d7b2 100644
BTM_TRACE_API("%s: pend:%d", __func__, req_pend); BTM_TRACE_API("%s: pend:%d", __func__, req_pend);
if (req_pend) { if (req_pend) {
diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h
index 05180db5eed..3ecca642245 100644 index 05180db5e..3ecca6422 100644
--- a/stack/btm/btm_int.h --- a/stack/btm/btm_int.h
+++ b/stack/btm/btm_int.h +++ b/stack/btm/btm_int.h
@@ -258,7 +258,7 @@ extern void btm_sec_pin_code_request(const RawAddress& p_bda); @@ -258,7 +258,7 @@ extern void btm_sec_pin_code_request(const RawAddress& p_bda);
@ -62,7 +62,7 @@ index 05180db5eed..3ecca642245 100644
extern void btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC* p_dev_rec); extern void btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC* p_dev_rec);
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index bd11381abb2..150ab7daf6b 100644 index bd11381ab..150ab7daf 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -5770,14 +5770,13 @@ static bool btm_sec_queue_encrypt_request(const RawAddress& bd_addr, @@ -5770,14 +5770,13 @@ static bool btm_sec_queue_encrypt_request(const RawAddress& bd_addr,

View File

@ -1,4 +1,4 @@
From b13614438f7619007dd09a0805bbaf21db27c8b1 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Thu, 29 Oct 2020 20:29:14 -0700 Date: Thu, 29 Oct 2020 20:29:14 -0700
Subject: [PATCH] Use btm_sec_set_peer_sec_caps to store features Subject: [PATCH] Use btm_sec_set_peer_sec_caps to store features
@ -14,7 +14,7 @@ Change-Id: If9aba469bceb3d45ccd566dba0ec9c445f2a8102
3 files changed, 12 insertions(+), 10 deletions(-) 3 files changed, 12 insertions(+), 10 deletions(-)
diff --git a/stack/btm/btm_acl.cc b/stack/btm/btm_acl.cc diff --git a/stack/btm/btm_acl.cc b/stack/btm/btm_acl.cc
index 4717a95d7b..14390482e2 100644 index 4717a95d7..14390482e 100644
--- a/stack/btm/btm_acl.cc --- a/stack/btm/btm_acl.cc
+++ b/stack/btm/btm_acl.cc +++ b/stack/btm/btm_acl.cc
@@ -260,13 +260,12 @@ void btm_acl_created(const RawAddress& bda, DEV_CLASS dc, BD_NAME bdn, @@ -260,13 +260,12 @@ void btm_acl_created(const RawAddress& bda, DEV_CLASS dc, BD_NAME bdn,
@ -50,7 +50,7 @@ index 4717a95d7b..14390482e2 100644
BTM_TRACE_API("%s: pend:%d", __func__, req_pend); BTM_TRACE_API("%s: pend:%d", __func__, req_pend);
if (req_pend) { if (req_pend) {
diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h
index 3ecca64224..b5205aa43f 100644 index 3ecca6422..b5205aa43 100644
--- a/stack/btm/btm_int.h --- a/stack/btm/btm_int.h
+++ b/stack/btm/btm_int.h +++ b/stack/btm/btm_int.h
@@ -258,8 +258,8 @@ extern void btm_sec_pin_code_request(const RawAddress& p_bda); @@ -258,8 +258,8 @@ extern void btm_sec_pin_code_request(const RawAddress& p_bda);
@ -65,7 +65,7 @@ index 3ecca64224..b5205aa43f 100644
extern void btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC* p_dev_rec); extern void btm_sec_clear_ble_keys(tBTM_SEC_DEV_REC* p_dev_rec);
extern bool btm_sec_is_a_bonded_dev(const RawAddress& bda); extern bool btm_sec_is_a_bonded_dev(const RawAddress& bda);
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index 150ab7daf6..dcf01745d6 100644 index 150ab7daf..dcf01745d 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -5770,8 +5770,12 @@ static bool btm_sec_queue_encrypt_request(const RawAddress& bd_addr, @@ -5770,8 +5770,12 @@ static bool btm_sec_queue_encrypt_request(const RawAddress& bd_addr,

View File

@ -1,4 +1,4 @@
From 0b49d63202e63201a10b1eb2d1e3943b73a8a7b5 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Sat, 25 May 2024 00:28:41 +0000 Date: Sat, 25 May 2024 00:28:41 +0000
Subject: [PATCH] Add support for checking security downgrade Subject: [PATCH] Add support for checking security downgrade
@ -35,7 +35,7 @@ Change-Id: I8810c1bf9b3d3af1108cf621e2c51537e429c0f3
5 files changed, 152 insertions(+), 1 deletion(-) 5 files changed, 152 insertions(+), 1 deletion(-)
diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc
index 2427493cd5b..200ea2c4e42 100644 index 2427493cd..200ea2c4e 100644
--- a/btif/src/btif_storage.cc --- a/btif/src/btif_storage.cc
+++ b/btif/src/btif_storage.cc +++ b/btif/src/btif_storage.cc
@@ -84,7 +84,10 @@ using bluetooth::Uuid; @@ -84,7 +84,10 @@ using bluetooth::Uuid;
@ -92,7 +92,7 @@ index 2427493cd5b..200ea2c4e42 100644
default: default:
BTIF_TRACE_ERROR("Unknow prop type:%d", prop->type); BTIF_TRACE_ERROR("Unknow prop type:%d", prop->type);
diff --git a/include/hardware/bluetooth.h b/include/hardware/bluetooth.h diff --git a/include/hardware/bluetooth.h b/include/hardware/bluetooth.h
index cd070a7fb28..7de2bbe7a18 100644 index cd070a7fb..7de2bbe7a 100644
--- a/include/hardware/bluetooth.h --- a/include/hardware/bluetooth.h
+++ b/include/hardware/bluetooth.h +++ b/include/hardware/bluetooth.h
@@ -262,6 +262,20 @@ typedef enum { @@ -262,6 +262,20 @@ typedef enum {
@ -117,7 +117,7 @@ index cd070a7fb28..7de2bbe7a18 100644
} bt_property_type_t; } bt_property_type_t;
diff --git a/service/logging_helpers.cc b/service/logging_helpers.cc diff --git a/service/logging_helpers.cc b/service/logging_helpers.cc
index 70f8720c6d8..17ebe952056 100644 index 70f8720c6..17ebe9520 100644
--- a/service/logging_helpers.cc --- a/service/logging_helpers.cc
+++ b/service/logging_helpers.cc +++ b/service/logging_helpers.cc
@@ -117,6 +117,8 @@ const char* BtPropertyText(const bt_property_type_t prop) { @@ -117,6 +117,8 @@ const char* BtPropertyText(const bt_property_type_t prop) {
@ -130,7 +130,7 @@ index 70f8720c6d8..17ebe952056 100644
return "Invalid property"; return "Invalid property";
} }
diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h diff --git a/stack/btm/btm_int.h b/stack/btm/btm_int.h
index b5205aa43fc..971a02faa20 100644 index b5205aa43..971a02faa 100644
--- a/stack/btm/btm_int.h --- a/stack/btm/btm_int.h
+++ b/stack/btm/btm_int.h +++ b/stack/btm/btm_int.h
@@ -238,6 +238,8 @@ extern void btm_sec_abort_access_req(const RawAddress& bd_addr); @@ -238,6 +238,8 @@ extern void btm_sec_abort_access_req(const RawAddress& bd_addr);
@ -151,7 +151,7 @@ index b5205aa43fc..971a02faa20 100644
uint8_t res, bool is_le_trasnport); uint8_t res, bool is_le_trasnport);
extern void btm_sec_set_peer_sec_caps(uint16_t hci_handle, bool ssp_supported, extern void btm_sec_set_peer_sec_caps(uint16_t hci_handle, bool ssp_supported,
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index dcf01745d6c..835a5d7c5bf 100644 index dcf01745d..835a5d7c5 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -220,6 +220,109 @@ static bool btm_serv_trusted(tBTM_SEC_DEV_REC* p_dev_rec, @@ -220,6 +220,109 @@ static bool btm_serv_trusted(tBTM_SEC_DEV_REC* p_dev_rec,

View File

@ -1,4 +1,4 @@
From 53a4eb2e74169493aad8f4ea49ab1dc086a3513d Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Fri, 31 May 2024 21:46:17 +0000 Date: Fri, 31 May 2024 21:46:17 +0000
Subject: [PATCH] Disallow connect with Secure Connections downgrade Subject: [PATCH] Disallow connect with Secure Connections downgrade
@ -25,7 +25,7 @@ Change-Id: I7b9dd1a18f1c04df88aabe89d4790fef9112da7e
1 file changed, 16 insertions(+) 1 file changed, 16 insertions(+)
diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc diff --git a/stack/btm/btm_sec.cc b/stack/btm/btm_sec.cc
index 835a5d7c5b..d5d698c274 100644 index 835a5d7c5..d5d698c27 100644
--- a/stack/btm/btm_sec.cc --- a/stack/btm/btm_sec.cc
+++ b/stack/btm/btm_sec.cc +++ b/stack/btm/btm_sec.cc
@@ -4751,6 +4751,13 @@ void btm_sec_link_key_notification(const RawAddress& p_bda, @@ -4751,6 +4751,13 @@ void btm_sec_link_key_notification(const RawAddress& p_bda,

View File

@ -1,4 +1,4 @@
From ee89e827180526082add19d08c480b72e9324e2d Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Fri, 31 May 2024 21:50:12 +0000 Date: Fri, 31 May 2024 21:50:12 +0000
Subject: [PATCH] Disallow connect with key length downgrade Subject: [PATCH] Disallow connect with key length downgrade
@ -31,7 +31,7 @@ Change-Id: I5b931ddb4876b529ed0c2e1138c02382291216ab
1 file changed, 11 insertions(+) 1 file changed, 11 insertions(+)
diff --git a/stack/btu/btu_hcif.cc b/stack/btu/btu_hcif.cc diff --git a/stack/btu/btu_hcif.cc b/stack/btu/btu_hcif.cc
index 7bf385ea3d..615d3c6899 100644 index 7bf385ea3..615d3c689 100644
--- a/stack/btu/btu_hcif.cc --- a/stack/btu/btu_hcif.cc
+++ b/stack/btu/btu_hcif.cc +++ b/stack/btu/btu_hcif.cc
@@ -1171,6 +1171,17 @@ static void read_encryption_key_size_complete_after_encryption_change(uint8_t st @@ -1171,6 +1171,17 @@ static void read_encryption_key_size_complete_after_encryption_change(uint8_t st

View File

@ -1,4 +1,4 @@
From 935b7a26fa502de27c0cd3c97a05381319e8f22c Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Sun, 14 Mar 2021 09:52:19 -0700 Date: Sun, 14 Mar 2021 09:52:19 -0700
Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text
@ -16,7 +16,7 @@ Change-Id: Iab6a4f33a3e498c33f4870abc5abd59e073d03f2
1 file changed, 20 insertions(+), 1 deletion(-) 1 file changed, 20 insertions(+), 1 deletion(-)
diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h
index b71d347c1a7..f33598d2f19 100644 index b71d347c1..f33598d2f 100644
--- a/btif/include/btif_hh.h --- a/btif/include/btif_hh.h
+++ b/btif/include/btif_hh.h +++ b/btif/include/btif_hh.h
@@ -46,7 +46,7 @@ @@ -46,7 +46,7 @@

View File

@ -1,7 +1,7 @@
From 1017cfa02f11db8d077d5d7a32dd46da7c8b050b Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:42:21 +0000 Date: Mon, 8 Apr 2024 19:42:21 +0000
Subject: [PATCH] [BACKPORT] Disallow unexpected incoming HID connections 1/2 Subject: [PATCH] Disallow unexpected incoming HID connections 1/2
HID profile accepted any new incoming HID connection. Even when the HID profile accepted any new incoming HID connection. Even when the
connection policy disabled HID connection, remote devices could initiate connection policy disabled HID connection, remote devices could initiate
@ -21,13 +21,13 @@ Change-Id: I6e9db983e752dd498625078c13b736cd4c668806
--- ---
btif/include/btif_hh.h | 4 +- btif/include/btif_hh.h | 4 +-
btif/include/btif_storage.h | 23 ++++++++++ btif/include/btif_storage.h | 23 ++++++++++
btif/src/btif_hh.cc | 87 ++++++++++++++++++++++++++++++++++--- btif/src/btif_hh.cc | 86 ++++++++++++++++++++++++++++++++++---
btif/src/btif_storage.cc | 53 +++++++++++++++++++++- btif/src/btif_storage.cc | 53 ++++++++++++++++++++++-
include/hardware/bt_hh.h | 2 +- include/hardware/bt_hh.h | 2 +-
5 files changed, 161 insertions(+), 8 deletions(-) 5 files changed, 160 insertions(+), 8 deletions(-)
diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h diff --git a/btif/include/btif_hh.h b/btif/include/btif_hh.h
index f33598d2f19..f93341d89f1 100644 index f33598d2f..f93341d89 100644
--- a/btif/include/btif_hh.h --- a/btif/include/btif_hh.h
+++ b/btif/include/btif_hh.h +++ b/btif/include/btif_hh.h
@@ -97,6 +97,7 @@ typedef struct { @@ -97,6 +97,7 @@ typedef struct {
@ -49,7 +49,7 @@ index f33598d2f19..f93341d89f1 100644
extern void btif_hh_disconnect(RawAddress* bd_addr); extern void btif_hh_disconnect(RawAddress* bd_addr);
extern void btif_hh_setreport(btif_hh_device_t* p_dev, extern void btif_hh_setreport(btif_hh_device_t* p_dev,
diff --git a/btif/include/btif_storage.h b/btif/include/btif_storage.h diff --git a/btif/include/btif_storage.h b/btif/include/btif_storage.h
index 1c1163d1428..362ffdc21bb 100644 index 1c1163d14..362ffdc21 100644
--- a/btif/include/btif_storage.h --- a/btif/include/btif_storage.h
+++ b/btif/include/btif_storage.h +++ b/btif/include/btif_storage.h
@@ -178,6 +178,29 @@ bt_status_t btif_storage_remove_bonded_device(const RawAddress* remote_bd_addr); @@ -178,6 +178,29 @@ bt_status_t btif_storage_remove_bonded_device(const RawAddress* remote_bd_addr);
@ -83,18 +83,10 @@ index 1c1163d1428..362ffdc21bb 100644
* *
* Function btif_storage_add_hid_device_info * Function btif_storage_add_hid_device_info
diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc
index 97479e040ba..25fb151d260 100644 index 5c57ee80c..b29b6773e 100644
--- a/btif/src/btif_hh.cc --- a/btif/src/btif_hh.cc
+++ b/btif/src/btif_hh.cc +++ b/btif/src/btif_hh.cc
@@ -42,6 +42,7 @@ @@ -338,6 +338,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) {
#include "btif_storage.h"
#include "btif_util.h"
#include "l2c_api.h"
+#include "main/shim/dumpsys.h"
#include "osi/include/log.h"
#include "osi/include/osi.h"
@@ -334,6 +335,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) {
return NULL; return NULL;
} }
@ -119,7 +111,7 @@ index 97479e040ba..25fb151d260 100644
/******************************************************************************* /*******************************************************************************
* *
* Function btif_hh_find_dev_by_bda * Function btif_hh_find_dev_by_bda
@@ -419,7 +438,8 @@ void btif_hh_start_vup_timer(const RawAddress* bd_addr) { @@ -423,7 +441,8 @@ void btif_hh_start_vup_timer(const RawAddress* bd_addr) {
* *
* Returns true if add successfully, otherwise false. * Returns true if add successfully, otherwise false.
******************************************************************************/ ******************************************************************************/
@ -129,7 +121,7 @@ index 97479e040ba..25fb151d260 100644
int i; int i;
for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) { for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
if (btif_hh_cb.added_devices[i].bd_addr == bda) { if (btif_hh_cb.added_devices[i].bd_addr == bda) {
@@ -433,6 +453,7 @@ bool btif_hh_add_added_dev(const RawAddress& bda, tBTA_HH_ATTR_MASK attr_mask) { @@ -437,6 +456,7 @@ bool btif_hh_add_added_dev(const RawAddress& bda, tBTA_HH_ATTR_MASK attr_mask) {
btif_hh_cb.added_devices[i].bd_addr = bda; btif_hh_cb.added_devices[i].bd_addr = bda;
btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE; btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
btif_hh_cb.added_devices[i].attr_mask = attr_mask; btif_hh_cb.added_devices[i].attr_mask = attr_mask;
@ -137,7 +129,7 @@ index 97479e040ba..25fb151d260 100644
return true; return true;
} }
} }
@@ -712,6 +733,23 @@ void btif_hh_getreport(btif_hh_device_t* p_dev, bthh_report_type_t r_type, @@ -715,6 +735,23 @@ void btif_hh_getreport(btif_hh_device_t* p_dev, bthh_report_type_t r_type,
* *
****************************************************************************/ ****************************************************************************/
@ -146,11 +138,11 @@ index 97479e040ba..25fb151d260 100644
+ * outgoing connection was requested */ + * outgoing connection was requested */
+ btif_hh_added_device_t* added_dev = btif_hh_find_added_dev(bda); + btif_hh_added_device_t* added_dev = btif_hh_find_added_dev(bda);
+ if (added_dev != nullptr && added_dev->reconnect_allowed) { + if (added_dev != nullptr && added_dev->reconnect_allowed) {
+ LOG_VERBOSE(LOG_TAG, "Connection allowed %s", PRIVATE_ADDRESS(bda)); + LOG_VERBOSE(LOG_TAG, "Connection allowed %s", bda.ToString().c_str());
+ return true; + return true;
+ } else if (btif_hh_cb.pending_conn_address == bda) { + } else if (btif_hh_cb.pending_conn_address == bda) {
+ LOG_VERBOSE(LOG_TAG, "Device connection was pending for: %s, status: %s", + LOG_VERBOSE(LOG_TAG, "Device connection was pending for: %s, status: %s",
+ PRIVATE_ADDRESS(bda), + bda.ToString().c_str(),
+ btif_hh_status_text(btif_hh_cb.status).c_str()); + btif_hh_status_text(btif_hh_cb.status).c_str());
+ return true; + return true;
+ } + }
@ -161,7 +153,7 @@ index 97479e040ba..25fb151d260 100644
/******************************************************************************* /*******************************************************************************
* *
* Function btif_hh_upstreams_evt * Function btif_hh_upstreams_evt
@@ -770,9 +808,26 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -773,9 +810,26 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
p_data->status); p_data->status);
break; break;
@ -172,7 +164,7 @@ index 97479e040ba..25fb151d260 100644
+ +
+ if (!btif_hh_connection_allowed(p_data->conn.bda)) { + if (!btif_hh_connection_allowed(p_data->conn.bda)) {
+ LOG_WARN(LOG_TAG, "Reject Incoming HID Connection, device: %s", + LOG_WARN(LOG_TAG, "Reject Incoming HID Connection, device: %s",
+ PRIVATE_ADDRESS(p_data->conn.bda)); + p_data->conn.bda.ToString().c_str());
+ btif_hh_device_t* p_dev = + btif_hh_device_t* p_dev =
+ btif_hh_find_connected_dev_by_handle(p_data->conn.handle); + btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
+ if (p_dev != nullptr) { + if (p_dev != nullptr) {
@ -189,7 +181,7 @@ index 97479e040ba..25fb151d260 100644
btif_hh_cb.pending_conn_address = RawAddress::kEmpty; btif_hh_cb.pending_conn_address = RawAddress::kEmpty;
if (p_data->conn.status == BTA_HH_OK) { if (p_data->conn.status == BTA_HH_OK) {
p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
@@ -831,6 +886,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -834,6 +888,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
btif_hh_cb.status = (BTIF_HH_STATUS)BTIF_HH_DEV_DISCONNECTED; btif_hh_cb.status = (BTIF_HH_STATUS)BTIF_HH_DEV_DISCONNECTED;
} }
break; break;
@ -197,7 +189,7 @@ index 97479e040ba..25fb151d260 100644
case BTA_HH_CLOSE_EVT: case BTA_HH_CLOSE_EVT:
BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d", BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
@@ -983,7 +1039,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -986,7 +1041,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
p_data->dscp_info.version, p_data->dscp_info.version,
p_data->dscp_info.ctry_code, len, p_data->dscp_info.ctry_code, len,
p_data->dscp_info.descriptor.dsc_list); p_data->dscp_info.descriptor.dsc_list);
@ -206,7 +198,7 @@ index 97479e040ba..25fb151d260 100644
tBTA_HH_DEV_DSCP_INFO dscp_info; tBTA_HH_DEV_DSCP_INFO dscp_info;
bt_status_t ret; bt_status_t ret;
btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info); btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
@@ -999,6 +1055,8 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -1002,6 +1057,8 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
p_data->dscp_info.ssr_min_tout, len, p_data->dscp_info.ssr_min_tout, len,
p_data->dscp_info.descriptor.dsc_list); p_data->dscp_info.descriptor.dsc_list);
@ -215,7 +207,7 @@ index 97479e040ba..25fb151d260 100644
ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret); ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device"); BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device");
@@ -1280,6 +1338,13 @@ static bt_status_t init(bthh_callbacks_t* callbacks) { @@ -1283,6 +1340,13 @@ static bt_status_t init(bthh_callbacks_t* callbacks) {
******************************************************************************/ ******************************************************************************/
static bt_status_t connect(RawAddress* bd_addr) { static bt_status_t connect(RawAddress* bd_addr) {
if (btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) { if (btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) {
@ -229,7 +221,7 @@ index 97479e040ba..25fb151d260 100644
btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT, btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
(char*)bd_addr, sizeof(RawAddress), NULL); (char*)bd_addr, sizeof(RawAddress), NULL);
return BT_STATUS_SUCCESS; return BT_STATUS_SUCCESS;
@@ -1296,7 +1361,7 @@ static bt_status_t connect(RawAddress* bd_addr) { @@ -1299,7 +1363,7 @@ static bt_status_t connect(RawAddress* bd_addr) {
* Returns bt_status_t * Returns bt_status_t
* *
******************************************************************************/ ******************************************************************************/
@ -238,14 +230,14 @@ index 97479e040ba..25fb151d260 100644
CHECK_BTHH_INIT(); CHECK_BTHH_INIT();
BTIF_TRACE_EVENT("BTHH: %s", __func__); BTIF_TRACE_EVENT("BTHH: %s", __func__);
btif_hh_device_t* p_dev; btif_hh_device_t* p_dev;
@@ -1306,6 +1371,17 @@ static bt_status_t disconnect(RawAddress* bd_addr) { @@ -1309,6 +1373,17 @@ static bt_status_t disconnect(RawAddress* bd_addr) {
btif_hh_cb.status); btif_hh_cb.status);
return BT_STATUS_FAIL; return BT_STATUS_FAIL;
} }
+ +
+ if (!reconnect_allowed) { + if (!reconnect_allowed) {
+ LOG_INFO(LOG_TAG, "Incoming reconnections disabled for device %s", + LOG_INFO(LOG_TAG, "Incoming reconnections disabled for device %s",
+ PRIVATE_ADDRESS((*bd_addr))); + bd_addr->ToString().c_str());
+ btif_hh_added_device_t* added_dev = btif_hh_find_added_dev(*bd_addr); + btif_hh_added_device_t* added_dev = btif_hh_find_added_dev(*bd_addr);
+ if (added_dev != nullptr && added_dev->reconnect_allowed) { + if (added_dev != nullptr && added_dev->reconnect_allowed) {
+ added_dev->reconnect_allowed = false; + added_dev->reconnect_allowed = false;
@ -256,7 +248,7 @@ index 97479e040ba..25fb151d260 100644
p_dev = btif_hh_find_connected_dev_by_bda(*bd_addr); p_dev = btif_hh_find_connected_dev_by_bda(*bd_addr);
if (p_dev != NULL) { if (p_dev != NULL) {
return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT, return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
@@ -1437,9 +1513,10 @@ static bt_status_t set_info(RawAddress* bd_addr, bthh_hid_info_t hid_info) { @@ -1440,9 +1515,10 @@ static bt_status_t set_info(RawAddress* bd_addr, bthh_hid_info_t hid_info) {
(uint8_t*)osi_malloc(dscp_info.descriptor.dl_len); (uint8_t*)osi_malloc(dscp_info.descriptor.dl_len);
memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len); memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
@ -269,19 +261,19 @@ index 97479e040ba..25fb151d260 100644
osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list); osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list);
diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc
index 95e4ef07150..8077ae55547 100644 index 200ea2c4e..ecbf2b50a 100644
--- a/btif/src/btif_storage.cc --- a/btif/src/btif_storage.cc
+++ b/btif/src/btif_storage.cc +++ b/btif/src/btif_storage.cc
@@ -83,6 +83,8 @@ using bluetooth::Uuid; @@ -89,6 +89,8 @@ using bluetooth::Uuid;
#define BTIF_STORAGE_KEY_LOCAL_IO_CAPS_BLE "LocalIOCapsBLE" #define BTIF_STORAGE_KEY_SECURE_CONNECTIONS_SUPPORTED \
#define BTIF_STORAGE_KEY_ADAPTER_DISC_TIMEOUT "DiscoveryTimeout" "SecureConnectionsSupported"
+#define BTIF_STORAGE_KEY_HID_RECONNECT_ALLOWED "HidReConnectAllowed" +#define BTIF_STORAGE_KEY_HID_RECONNECT_ALLOWED "HidReConnectAllowed"
+ +
/* This is a local property to add a device found */ /* This is a local property to add a device found */
#define BT_PROPERTY_REMOTE_DEVICE_TIMESTAMP 0xFF #define BT_PROPERTY_REMOTE_DEVICE_TIMESTAMP 0xFF
@@ -1323,6 +1325,50 @@ bt_status_t btif_storage_get_remote_addr_type(const RawAddress* remote_bd_addr, @@ -1353,6 +1355,50 @@ bt_status_t btif_storage_get_remote_addr_type(const RawAddress* remote_bd_addr,
btif_config_get_int(remote_bd_addr->ToString(), "AddrType", addr_type); btif_config_get_int(remote_bd_addr->ToString(), "AddrType", addr_type);
return ret ? BT_STATUS_SUCCESS : BT_STATUS_FAIL; return ret ? BT_STATUS_SUCCESS : BT_STATUS_FAIL;
} }
@ -332,7 +324,7 @@ index 95e4ef07150..8077ae55547 100644
/******************************************************************************* /*******************************************************************************
* *
* Function btif_storage_add_hid_device_info * Function btif_storage_add_hid_device_info
@@ -1425,8 +1471,12 @@ bt_status_t btif_storage_load_bonded_hid_info(void) { @@ -1455,8 +1501,12 @@ bt_status_t btif_storage_load_bonded_hid_info(void) {
RawAddress bd_addr; RawAddress bd_addr;
RawAddress::FromString(name, bd_addr); RawAddress::FromString(name, bd_addr);
@ -346,7 +338,7 @@ index 95e4ef07150..8077ae55547 100644
BTA_HhAddDev(bd_addr, attr_mask, sub_class, app_id, dscp_info); BTA_HhAddDev(bd_addr, attr_mask, sub_class, app_id, dscp_info);
} }
} }
@@ -1458,6 +1508,7 @@ bt_status_t btif_storage_remove_hid_info(RawAddress* remote_bd_addr) { @@ -1488,6 +1538,7 @@ bt_status_t btif_storage_remove_hid_info(RawAddress* remote_bd_addr) {
btif_config_remove(bdstr, "HidSSRMaxLatency"); btif_config_remove(bdstr, "HidSSRMaxLatency");
btif_config_remove(bdstr, "HidSSRMinTimeout"); btif_config_remove(bdstr, "HidSSRMinTimeout");
btif_config_remove(bdstr, "HidDescriptor"); btif_config_remove(bdstr, "HidDescriptor");
@ -355,7 +347,7 @@ index 95e4ef07150..8077ae55547 100644
return BT_STATUS_SUCCESS; return BT_STATUS_SUCCESS;
} }
diff --git a/include/hardware/bt_hh.h b/include/hardware/bt_hh.h diff --git a/include/hardware/bt_hh.h b/include/hardware/bt_hh.h
index b87b129bb12..923c6279216 100644 index b87b129bb..923c62792 100644
--- a/include/hardware/bt_hh.h --- a/include/hardware/bt_hh.h
+++ b/include/hardware/bt_hh.h +++ b/include/hardware/bt_hh.h
@@ -154,7 +154,7 @@ typedef struct { @@ -154,7 +154,7 @@ typedef struct {

View File

@ -1,4 +1,4 @@
From 0b906b1eef2156110bb753272fe133c096eb371b Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:44:45 +0000 Date: Mon, 8 Apr 2024 19:44:45 +0000
Subject: [PATCH] RESTRICT AUTOMERGE Disallow unexpected incoming HID Subject: [PATCH] RESTRICT AUTOMERGE Disallow unexpected incoming HID
@ -59,34 +59,34 @@ index b8f4d6530..e4c885b3e 100644
{"virtualUnPlugNative", "([B)Z", (void*)virtualUnPlugNative}, {"virtualUnPlugNative", "([B)Z", (void*)virtualUnPlugNative},
{"setProtocolModeNative", "([BB)Z", (void*)setProtocolModeNative}, {"setProtocolModeNative", "([BB)Z", (void*)setProtocolModeNative},
diff --git a/src/com/android/bluetooth/hid/HidHostService.java b/src/com/android/bluetooth/hid/HidHostService.java diff --git a/src/com/android/bluetooth/hid/HidHostService.java b/src/com/android/bluetooth/hid/HidHostService.java
index 4687bd6a1..0258f1fdd 100644 index bbde61948..a830d07e1 100644
--- a/src/com/android/bluetooth/hid/HidHostService.java --- a/src/com/android/bluetooth/hid/HidHostService.java
+++ b/src/com/android/bluetooth/hid/HidHostService.java +++ b/src/com/android/bluetooth/hid/HidHostService.java
@@ -167,7 +167,10 @@ public void handleMessage(Message msg) { @@ -156,7 +156,10 @@ public class HidHostService extends ProfileService {
break; break;
case MESSAGE_DISCONNECT: { case MESSAGE_DISCONNECT: {
BluetoothDevice device = (BluetoothDevice) msg.obj; BluetoothDevice device = (BluetoothDevice) msg.obj;
- if (!disconnectHidNative(Utils.getByteAddress(device))) { - if (!disconnectHidNative(Utils.getByteAddress(device))) {
+ int connectionPolicy = getConnectionPolicy(device); + int connectionPolicy = getPriority(device);
+ boolean reconnectAllowed = + boolean reconnectAllowed =
+ connectionPolicy == BluetoothProfile.CONNECTION_POLICY_ALLOWED; + connectionPolicy == BluetoothProfile.PRIORITY_ON;
+ if (!disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed)) { + if (!disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed)) {
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTING);
broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED); broadcastConnectionState(device, BluetoothProfile.STATE_DISCONNECTED);
break; break;
@@ -192,7 +195,10 @@ public void handleMessage(Message msg) { @@ -181,7 +184,10 @@ public class HidHostService extends ProfileService {
Log.d(TAG, "Incoming HID connection rejected"); Log.d(TAG, "Incoming HID connection rejected");
} }
if (disconnectRemote(device)) { if (disconnectRemote(device)) {
- disconnectHidNative(Utils.getByteAddress(device)); - disconnectHidNative(Utils.getByteAddress(device));
+ int connectionPolicy = getConnectionPolicy(device); + int connectionPolicy = getPriority(device);
+ boolean reconnectAllowed = + boolean reconnectAllowed =
+ connectionPolicy == BluetoothProfile.CONNECTION_POLICY_ALLOWED; + connectionPolicy == BluetoothProfile.PRIORITY_ON;
+ disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed); + disconnectHidNative(Utils.getByteAddress(device), reconnectAllowed);
} else { } else {
virtualUnPlugNative(Utils.getByteAddress(device)); virtualUnPlugNative(Utils.getByteAddress(device));
} }
@@ -978,7 +984,7 @@ public void dump(StringBuilder sb) { @@ -906,7 +912,7 @@ public class HidHostService extends ProfileService {
private native boolean connectHidNative(byte[] btAddress); private native boolean connectHidNative(byte[] btAddress);

View File

@ -1,4 +1,4 @@
From a85afea964ff0589e474b816ffa941b371076af8 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Tue, 11 Aug 2020 12:39:26 -0700 Date: Tue, 11 Aug 2020 12:39:26 -0700
Subject: [PATCH] Clean up BTM_SEC_MODE Subject: [PATCH] Clean up BTM_SEC_MODE

View File

@ -1,4 +1,4 @@
From 7de7f2049c84e82c38435ab74396a19406e594a5 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Mon, 7 Sep 2020 09:37:31 -0700 Date: Mon, 7 Sep 2020 09:37:31 -0700
Subject: [PATCH] Add getters to Subject: [PATCH] Add getters to

View File

@ -1,4 +1,4 @@
From 8ae3462db2bac7543116b9951c339ba6cffa24de Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Thu, 14 Jan 2021 14:04:09 -0800 Date: Thu, 14 Jan 2021 14:04:09 -0800
Subject: [PATCH] Add APIs stack/btm/security_device_record:: Subject: [PATCH] Add APIs stack/btm/security_device_record::

View File

@ -1,4 +1,4 @@
From 901b9e1e71a53cb99dca8117b20e6e2f525008df Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Fri, 1 Jan 2021 19:11:49 -0800 Date: Fri, 1 Jan 2021 19:11:49 -0800
Subject: [PATCH] Add tACL_CONN::SupportsSecureConnections Subject: [PATCH] Add tACL_CONN::SupportsSecureConnections

View File

@ -1,4 +1,4 @@
From ba1d7096e640b401fd72dec3bc7f5683df317d38 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Fri, 1 Jan 2021 19:12:36 -0800 Date: Fri, 1 Jan 2021 19:12:36 -0800
Subject: [PATCH] Use tACL_CONN::SupportsSecureConnections Subject: [PATCH] Use tACL_CONN::SupportsSecureConnections

View File

@ -1,4 +1,4 @@
From 541a53f79d4342e25cbe4212a8192a8f7467b163 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Tue, 20 Oct 2020 18:48:52 -0700 Date: Tue, 20 Oct 2020 18:48:52 -0700
Subject: [PATCH] Refactor btm_sec_set_peer_sec_caps Subject: [PATCH] Refactor btm_sec_set_peer_sec_caps

View File

@ -1,4 +1,4 @@
From a3b3bada1c107c7c97d776d4d1ba5f8602076737 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Hansong Zhang <hsz@google.com> From: Hansong Zhang <hsz@google.com>
Date: Thu, 29 Oct 2020 20:29:14 -0700 Date: Thu, 29 Oct 2020 20:29:14 -0700
Subject: [PATCH] Use btm_sec_set_peer_sec_caps to store features Subject: [PATCH] Use btm_sec_set_peer_sec_caps to store features

View File

@ -1,4 +1,4 @@
From e4fd09d4b7b1a4a4bd773b59f23f039d0fa877ca Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Sat, 25 May 2024 00:28:41 +0000 Date: Sat, 25 May 2024 00:28:41 +0000
Subject: [PATCH] Add support for checking security downgrade Subject: [PATCH] Add support for checking security downgrade

View File

@ -1,4 +1,4 @@
From 667ea99b7d6d8985664c5f1866d20b824e360b07 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Fri, 31 May 2024 21:46:17 +0000 Date: Fri, 31 May 2024 21:46:17 +0000
Subject: [PATCH] Disallow connect with Secure Connections downgrade Subject: [PATCH] Disallow connect with Secure Connections downgrade

View File

@ -1,4 +1,4 @@
From 51fa2abc7a900e24075bbd52b95c79be12e81ee2 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Brian Delwiche <delwiche@google.com> From: Brian Delwiche <delwiche@google.com>
Date: Fri, 31 May 2024 21:50:12 +0000 Date: Fri, 31 May 2024 21:50:12 +0000
Subject: [PATCH] Disallow connect with key length downgrade Subject: [PATCH] Disallow connect with key length downgrade

View File

@ -1,4 +1,4 @@
From eb91d38c9e876c23d9a51ecc8bf9b55ad90c2c4d Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Chris Manton <cmanton@google.com> From: Chris Manton <cmanton@google.com>
Date: Sun, 14 Mar 2021 09:52:19 -0700 Date: Sun, 14 Mar 2021 09:52:19 -0700
Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text Subject: [PATCH] Add btif/include/btif_hh::btif_hh_status_text

View File

@ -1,4 +1,4 @@
From 0196deeccce43dc7fc5d8c4bfe94d2f24ad2d4b2 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Himanshu Rawat <rwt@google.com> From: Himanshu Rawat <rwt@google.com>
Date: Mon, 8 Apr 2024 19:42:21 +0000 Date: Mon, 8 Apr 2024 19:42:21 +0000
Subject: [PATCH] RESTRICT AUTOMERGE Disallow unexpected incoming HID Subject: [PATCH] RESTRICT AUTOMERGE Disallow unexpected incoming HID
@ -85,7 +85,7 @@ index b1ada4db6..a32b7b8ff 100755
* *
* Function btif_storage_add_hid_device_info * Function btif_storage_add_hid_device_info
diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc diff --git a/btif/src/btif_hh.cc b/btif/src/btif_hh.cc
index aeaabc47d..4ad1537d6 100644 index b5135ff2f..0d184a646 100644
--- a/btif/src/btif_hh.cc --- a/btif/src/btif_hh.cc
+++ b/btif/src/btif_hh.cc +++ b/btif/src/btif_hh.cc
@@ -340,6 +340,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) { @@ -340,6 +340,24 @@ btif_hh_device_t* btif_hh_find_connected_dev_by_handle(uint8_t handle) {
@ -191,7 +191,7 @@ index aeaabc47d..4ad1537d6 100644
case BTA_HH_CLOSE_EVT: case BTA_HH_CLOSE_EVT:
BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d", BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
@@ -1021,7 +1076,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -1017,7 +1072,7 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
} }
return; return;
} }
@ -200,7 +200,7 @@ index aeaabc47d..4ad1537d6 100644
tBTA_HH_DEV_DSCP_INFO dscp_info; tBTA_HH_DEV_DSCP_INFO dscp_info;
bt_status_t ret; bt_status_t ret;
btif_hh_copy_hid_info(&dscp_info, p_data->h_d_info.dscp_info); btif_hh_copy_hid_info(&dscp_info, p_data->h_d_info.dscp_info);
@@ -1037,6 +1092,8 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) { @@ -1033,6 +1088,8 @@ static void btif_hh_upstreams_evt(uint16_t event, char* p_param) {
p_data->h_d_info.dscp_info->ssr_min_tout, len, p_data->h_d_info.dscp_info->ssr_min_tout, len,
p_data->h_d_info.dscp_info->descriptor.dsc_list); p_data->h_d_info.dscp_info->descriptor.dsc_list);
@ -209,7 +209,7 @@ index aeaabc47d..4ad1537d6 100644
ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret); ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device"); BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device");
@@ -1334,6 +1391,13 @@ static bt_status_t connect(RawAddress* bd_addr) { @@ -1330,6 +1387,13 @@ static bt_status_t connect(RawAddress* bd_addr) {
BTIF_TRACE_EVENT("%s Ignore connect request, device already connected", __func__); BTIF_TRACE_EVENT("%s Ignore connect request, device already connected", __func__);
return BT_STATUS_SUCCESS; return BT_STATUS_SUCCESS;
} else if (btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) { } else if (btif_hh_cb.status != BTIF_HH_DEV_CONNECTING) {
@ -223,7 +223,7 @@ index aeaabc47d..4ad1537d6 100644
btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT, btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
(char*)bd_addr, sizeof(RawAddress), NULL); (char*)bd_addr, sizeof(RawAddress), NULL);
return BT_STATUS_SUCCESS; return BT_STATUS_SUCCESS;
@@ -1350,7 +1414,7 @@ static bt_status_t connect(RawAddress* bd_addr) { @@ -1346,7 +1410,7 @@ static bt_status_t connect(RawAddress* bd_addr) {
* Returns bt_status_t * Returns bt_status_t
* *
******************************************************************************/ ******************************************************************************/
@ -232,7 +232,7 @@ index aeaabc47d..4ad1537d6 100644
CHECK_BTHH_INIT(); CHECK_BTHH_INIT();
BTIF_TRACE_EVENT("BTHH: %s", __func__); BTIF_TRACE_EVENT("BTHH: %s", __func__);
btif_hh_device_t* p_dev; btif_hh_device_t* p_dev;
@@ -1360,6 +1424,17 @@ static bt_status_t disconnect(RawAddress* bd_addr) { @@ -1356,6 +1420,17 @@ static bt_status_t disconnect(RawAddress* bd_addr) {
btif_hh_cb.status); btif_hh_cb.status);
return BT_STATUS_FAIL; return BT_STATUS_FAIL;
} }
@ -250,7 +250,7 @@ index aeaabc47d..4ad1537d6 100644
p_dev = btif_hh_find_connected_dev_by_bda(*bd_addr); p_dev = btif_hh_find_connected_dev_by_bda(*bd_addr);
if (p_dev != NULL) { if (p_dev != NULL) {
return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT, return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
@@ -1494,9 +1569,10 @@ static bt_status_t set_info(RawAddress* bd_addr, bthh_hid_info_t hid_info) { @@ -1490,9 +1565,10 @@ static bt_status_t set_info(RawAddress* bd_addr, bthh_hid_info_t hid_info) {
(uint8_t*)osi_malloc(dscp_info.descriptor.dl_len); (uint8_t*)osi_malloc(dscp_info.descriptor.dl_len);
memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len); memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
@ -263,19 +263,19 @@ index aeaabc47d..4ad1537d6 100644
osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list); osi_free_and_reset((void**)&dscp_info.descriptor.dsc_list);
diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc diff --git a/btif/src/btif_storage.cc b/btif/src/btif_storage.cc
index d7a9cdf3c..0c40afd16 100644 index a62d9da6d..db2091d9c 100644
--- a/btif/src/btif_storage.cc --- a/btif/src/btif_storage.cc
+++ b/btif/src/btif_storage.cc +++ b/btif/src/btif_storage.cc
@@ -88,6 +88,8 @@ using bluetooth::Uuid; @@ -91,6 +91,8 @@ using bluetooth::Uuid;
#define BTIF_STORAGE_KEY_LOCAL_IO_CAPS_BLE "LocalIOCapsBLE" #define BTIF_STORAGE_KEY_SECURE_CONNECTIONS_SUPPORTED \
#define BTIF_STORAGE_KEY_ADAPTER_DISC_TIMEOUT "DiscoveryTimeout" "SecureConnectionsSupported"
+#define BTIF_STORAGE_KEY_HID_RECONNECT_ALLOWED "HidReConnectAllowed" +#define BTIF_STORAGE_KEY_HID_RECONNECT_ALLOWED "HidReConnectAllowed"
+ +
/* This is a local property to add a device found */ /* This is a local property to add a device found */
#define BT_PROPERTY_REMOTE_DEVICE_TIMESTAMP 0xFF #define BT_PROPERTY_REMOTE_DEVICE_TIMESTAMP 0xFF
@@ -1486,6 +1488,50 @@ bt_status_t btif_storage_get_remote_addr_type(const RawAddress* remote_bd_addr, @@ -1516,6 +1518,50 @@ bt_status_t btif_storage_get_remote_addr_type(const RawAddress* remote_bd_addr,
addr_type); addr_type);
return ret ? BT_STATUS_SUCCESS : BT_STATUS_FAIL; return ret ? BT_STATUS_SUCCESS : BT_STATUS_FAIL;
} }
@ -326,7 +326,7 @@ index d7a9cdf3c..0c40afd16 100644
/******************************************************************************* /*******************************************************************************
* *
* Function btif_storage_add_hid_device_info * Function btif_storage_add_hid_device_info
@@ -1585,8 +1631,12 @@ bt_status_t btif_storage_load_bonded_hid_info(void) { @@ -1615,8 +1661,12 @@ bt_status_t btif_storage_load_bonded_hid_info(void) {
(uint8_t*)dscp_info.descriptor.dsc_list, &len); (uint8_t*)dscp_info.descriptor.dsc_list, &len);
} }
RawAddress::FromString(name, bd_addr); RawAddress::FromString(name, bd_addr);
@ -340,7 +340,7 @@ index d7a9cdf3c..0c40afd16 100644
BTA_HhAddDev(bd_addr, attr_mask, sub_class, app_id, dscp_info); BTA_HhAddDev(bd_addr, attr_mask, sub_class, app_id, dscp_info);
} }
} }
@@ -1626,6 +1676,7 @@ bt_status_t btif_storage_remove_hid_info(RawAddress* remote_bd_addr) { @@ -1656,6 +1706,7 @@ bt_status_t btif_storage_remove_hid_info(RawAddress* remote_bd_addr) {
btif_config_remove(bdstr, "HidSSRMaxLatency"); btif_config_remove(bdstr, "HidSSRMaxLatency");
btif_config_remove(bdstr, "HidSSRMinTimeout"); btif_config_remove(bdstr, "HidSSRMinTimeout");
btif_config_remove(bdstr, "HidDescriptor"); btif_config_remove(bdstr, "HidDescriptor");

View File

@ -53,7 +53,7 @@ commentPatches android_kernel_fxtec_msm8998.sh "0008-Graphene-Kernel_Hardening-s
commentPatches android_kernel_fxtec_sm6115.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2021-3600"; commentPatches android_kernel_fxtec_sm6115.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2021-3600";
commentPatches android_kernel_google_bonito.sh "CVE-2020-0067"; commentPatches android_kernel_google_bonito.sh "CVE-2020-0067";
commentPatches android_kernel_google_coral.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324"; commentPatches android_kernel_google_coral.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324";
commentPatches android_kernel_google_dragon.sh "0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" "0008-Graphene-Kernel_Hardening-ro" "CVE-2015-4167" "CVE-2017-15951" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214" "CVE-2021-39715/ANY/0001.patch"; commentPatches android_kernel_google_dragon.sh "0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" "0008-Graphene-Kernel_Hardening-ro" "CVE-2015-4167" "CVE-2017-15951" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214" "CVE-2021-39715/ANY/0001.patch" "CVE-2024-46777";
commentPatches android_kernel_google_crosshatch.sh "CVE-2020-0067"; commentPatches android_kernel_google_crosshatch.sh "CVE-2020-0067";
commentPatches android_kernel_google_gs101_private_gs-google.sh "CVE-2021-29648/^5.11/0001.patch" "CVE-2023-6817/5.10/0002.patch" "CVE-2023-52462/5.10/0002.patch" "CVE-2023-52672" "CVE-2024-26733/5.10/0002.patch" "CVE-2023-52656/5.10" "CVE-2024-26882" "CVE-2024-38564" "CVE-2022-48862" "CVE-2024-46681" "CVE-2024-46826"; commentPatches android_kernel_google_gs101_private_gs-google.sh "CVE-2021-29648/^5.11/0001.patch" "CVE-2023-6817/5.10/0002.patch" "CVE-2023-52462/5.10/0002.patch" "CVE-2023-52672" "CVE-2024-26733/5.10/0002.patch" "CVE-2023-52656/5.10" "CVE-2024-26882" "CVE-2024-38564" "CVE-2022-48862" "CVE-2024-46681" "CVE-2024-46826";
commentPatches android_kernel_google_gs201_private_gs-google.sh "CVE-2021-29648/^5.11/0001.patch" "CVE-2023-6817/5.10/0002.patch" "CVE-2023-52462/5.10/0002.patch" "CVE-2023-52672" "CVE-2024-26733/5.10/0002.patch" "CVE-2023-52656/5.10" "CVE-2024-26882" "CVE-2024-38564" "CVE-2022-48862" "CVE-2024-46681" "CVE-2024-46826"; commentPatches android_kernel_google_gs201_private_gs-google.sh "CVE-2021-29648/^5.11/0001.patch" "CVE-2023-6817/5.10/0002.patch" "CVE-2023-52462/5.10/0002.patch" "CVE-2023-52672" "CVE-2024-26733/5.10/0002.patch" "CVE-2023-52656/5.10" "CVE-2024-26882" "CVE-2024-38564" "CVE-2022-48862" "CVE-2024-46681" "CVE-2024-46826";
@ -106,7 +106,7 @@ commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch"
commentPatches android_kernel_xiaomi_vayu.sh "CVE-2020-24588/4.14/0018.patch"; commentPatches android_kernel_xiaomi_vayu.sh "CVE-2020-24588/4.14/0018.patch";
commentPatches android_kernel_xiaomi_sm6150.sh "CVE-2023-43550" "CVE-2023-52901"; commentPatches android_kernel_xiaomi_sm6150.sh "CVE-2023-43550" "CVE-2023-52901";
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-22075"; commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-22075";
commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166" "CVE-2024-35954"; commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166" "CVE-2024-35954" "CVE-2023-28542" "CVE-2021-30319";
commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima"; commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima";
commentPatches android_kernel_zte_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-13162" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9"; commentPatches android_kernel_zte_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-13162" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
commentPatches android_kernel_zuk_msm8996.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-1616"; commentPatches android_kernel_zuk_msm8996.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-1616";

View File

@ -1068,7 +1068,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch

View File

@ -278,7 +278,7 @@ applyPatch "$DOS_PATCHES/android_frameworks_base/399769-backport.patch"; #P_asb_
applyPatch "$DOS_PATCHES/android_frameworks_base/399770.patch"; #P_asb_2024-08 Hide SAW subwindows applyPatch "$DOS_PATCHES/android_frameworks_base/399770.patch"; #P_asb_2024-08 Hide SAW subwindows
applyPatch "$DOS_PATCHES/android_frameworks_base/401373-backport.patch"; #S_asb_2024-09 Sanitized uri scheme by removing scheme delimiter applyPatch "$DOS_PATCHES/android_frameworks_base/401373-backport.patch"; #S_asb_2024-09 Sanitized uri scheme by removing scheme delimiter
applyPatch "$DOS_PATCHES/android_frameworks_base/405829-backport.patch"; #P_asb_2024-10 Update AccountManagerService checkKeyIntent. applyPatch "$DOS_PATCHES/android_frameworks_base/405829-backport.patch"; #P_asb_2024-10 Update AccountManagerService checkKeyIntent.
+applyPatch "$DOS_PATCHES/android_frameworks_base/405830.patch"; #P_asb_2024-10 Fail parseUri if end is missing applyPatch "$DOS_PATCHES/android_frameworks_base/405830.patch"; #P_asb_2024-10 Fail parseUri if end is missing
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0001-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS) applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0001-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0003-SUPL_No_IMSI.patch"; #Don't send IMSI to SUPL (MSe1969) applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0003-SUPL_No_IMSI.patch"; #Don't send IMSI to SUPL (MSe1969)
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0004-Fingerprint_Lockout.patch"; #Enable fingerprint lockout after five failed attempts (GrapheneOS) applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0004-Fingerprint_Lockout.patch"; #Enable fingerprint lockout after five failed attempts (GrapheneOS)

View File

@ -313,7 +313,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0 #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
@ -631,7 +631,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28542/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0 #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28542/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch

View File

@ -330,7 +330,6 @@ applyPatch "$DOS_PATCHES/android_frameworks_base/402606.patch"; #Q_asb_2024-08 H
applyPatch "$DOS_PATCHES/android_frameworks_base/403301.patch"; #Q_asb_2024-09 Sanitized uri scheme by removing scheme delimiter applyPatch "$DOS_PATCHES/android_frameworks_base/403301.patch"; #Q_asb_2024-09 Sanitized uri scheme by removing scheme delimiter
applyPatch "$DOS_PATCHES/android_frameworks_base/405515.patch"; #R_asb_2024-10 Update AccountManagerService checkKeyIntent. applyPatch "$DOS_PATCHES/android_frameworks_base/405515.patch"; #R_asb_2024-10 Update AccountManagerService checkKeyIntent.
applyPatch "$DOS_PATCHES/android_frameworks_base/405516.patch"; #R_asb_2024-10 Fail parseUri if end is missing applyPatch "$DOS_PATCHES/android_frameworks_base/405516.patch"; #R_asb_2024-10 Fail parseUri if end is missing
applyPatch "$DOS_PATCHES/android_frameworks_base/405517-backport.patch"; #R_asb_2024-10 Prevent Sharing when FRP enforcement is in effect
applyPatch "$DOS_PATCHES/android_frameworks_base/405518.patch"; #R_asb_2024-10 Check whether installerPackageName contains only valid characters applyPatch "$DOS_PATCHES/android_frameworks_base/405518.patch"; #R_asb_2024-10 Check whether installerPackageName contains only valid characters
#applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS) #applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS)
#applyPatch "$DOS_PATCHES/android_frameworks_base/272646-forwardport.patch"; #ten-bt-sbc-hd-dualchannel: Add Dual Channel into Bluetooth Audio Channel Mode developer options menu (ValdikSS) #applyPatch "$DOS_PATCHES/android_frameworks_base/272646-forwardport.patch"; #ten-bt-sbc-hd-dualchannel: Add Dual Channel into Bluetooth Audio Channel Mode developer options menu (ValdikSS)
@ -468,7 +467,7 @@ fi;
if enterAndClear "packages/apps/Bluetooth"; then if enterAndClear "packages/apps/Bluetooth"; then
applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/378135.patch"; #Q_asb_2023-12 Fix UAF in ~CallbackEnv applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/378135.patch"; #Q_asb_2023-12 Fix UAF in ~CallbackEnv
applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/405540.patch"; #R_asb_2024-10 Disallow unexpected incoming HID connections 2/2 applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/405835-backport.patch"; #P_asb_2024-10 Disallow unexpected incoming HID connections 2/2
#applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/272652.patch"; #ten-bt-sbc-hd-dualchannel: SBC Dual Channel (SBC HD Audio) support (ValdikSS) #applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/272652.patch"; #ten-bt-sbc-hd-dualchannel: SBC Dual Channel (SBC HD Audio) support (ValdikSS)
#applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/272653.patch"; #ten-bt-sbc-hd-dualchannel: Assume optional codecs are supported if were supported previously (ValdikSS) #applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/272653.patch"; #ten-bt-sbc-hd-dualchannel: Assume optional codecs are supported if were supported previously (ValdikSS)
applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/0001-constify_JNINativeMethod.patch"; #Constify JNINativeMethod tables (GrapheneOS) applyPatch "$DOS_PATCHES/android_packages_apps_Bluetooth/0001-constify_JNINativeMethod.patch"; #Constify JNINativeMethod tables (GrapheneOS)
@ -676,7 +675,7 @@ applyPatch "$DOS_PATCHES/android_system_bt/403315.patch"; #Q_asb_2024-09 Add sup
applyPatch "$DOS_PATCHES/android_system_bt/403316.patch"; #Q_asb_2024-09 Disallow connect with Secure Connections downgrade applyPatch "$DOS_PATCHES/android_system_bt/403316.patch"; #Q_asb_2024-09 Disallow connect with Secure Connections downgrade
applyPatch "$DOS_PATCHES/android_system_bt/403317.patch"; #Q_asb_2024-09 Disallow connect with key length downgrade applyPatch "$DOS_PATCHES/android_system_bt/403317.patch"; #Q_asb_2024-09 Disallow connect with key length downgrade
applyPatch "$DOS_PATCHES/android_system_bt/405536.patch"; #R_asb_2024-10 Add btif/include/btif_hh::btif_hh_status_text applyPatch "$DOS_PATCHES/android_system_bt/405536.patch"; #R_asb_2024-10 Add btif/include/btif_hh::btif_hh_status_text
applyPatch "$DOS_PATCHES/android_system_bt/405537.patch"; #R_asb_2024-10 Disallow unexpected incoming HID connections 1/2 applyPatch "$DOS_PATCHES/android_system_bt/405834-backport.patch"; #P_asb_2024-10 Disallow unexpected incoming HID connections 1/2
applyPatch "$DOS_PATCHES_COMMON/android_system_bt/0001-alloc_size.patch"; #Add alloc_size attributes to the allocator (GrapheneOS) applyPatch "$DOS_PATCHES_COMMON/android_system_bt/0001-alloc_size.patch"; #Add alloc_size attributes to the allocator (GrapheneOS)
#applyPatch "$DOS_PATCHES/android_system_bt/272648.patch"; #ten-bt-sbc-hd-dualchannel: Increase maximum Bluetooth SBC codec bitrate for SBC HD (ValdikSS) #applyPatch "$DOS_PATCHES/android_system_bt/272648.patch"; #ten-bt-sbc-hd-dualchannel: Increase maximum Bluetooth SBC codec bitrate for SBC HD (ValdikSS)
#applyPatch "$DOS_PATCHES/android_system_bt/272649.patch"; #ten-bt-sbc-hd-dualchannel: Explicit SBC Dual Channel (SBC HD) support (ValdikSS) #applyPatch "$DOS_PATCHES/android_system_bt/272649.patch"; #ten-bt-sbc-hd-dualchannel: Explicit SBC Dual Channel (SBC HD) support (ValdikSS)
@ -758,7 +757,7 @@ fi;
if enterAndClear "vendor/qcom/opensource/commonsys/packages/apps/Bluetooth"; then if enterAndClear "vendor/qcom/opensource/commonsys/packages/apps/Bluetooth"; then
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_packages_apps_Bluetooth/378136.patch"; #Q_asb_2023-12 Fix UAF in ~CallbackEnv applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_packages_apps_Bluetooth/378136.patch"; #Q_asb_2023-12 Fix UAF in ~CallbackEnv
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_packages_apps_Bluetooth/405585.patch"; #R_asb_2024-10 Disallow unexpected incoming HID connections 2/2 applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_packages_apps_Bluetooth/405585-backport.patch"; #R_asb_2024-10 Disallow unexpected incoming HID connections 2/2
fi; fi;
if enterAndClear "vendor/qcom/opensource/commonsys/system/bt"; then if enterAndClear "vendor/qcom/opensource/commonsys/system/bt"; then