mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-01-12 07:59:36 -05:00
17.1: April ASB work
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
113cbef36e
commit
b6f3f2e055
@ -1,4 +1,4 @@
|
|||||||
From 0254ee96d60cd80a52ce583c90486d6ca1549fb6 Mon Sep 17 00:00:00 2001
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
From: kumarashishg <kumarashishg@google.com>
|
From: kumarashishg <kumarashishg@google.com>
|
||||||
Date: Mon, 17 Jul 2023 12:01:18 +0000
|
Date: Mon, 17 Jul 2023 12:01:18 +0000
|
||||||
Subject: [PATCH] Resolve custom printer icon boundary exploit.
|
Subject: [PATCH] Resolve custom printer icon boundary exploit.
|
||||||
@ -16,10 +16,10 @@ Change-Id: Iaaa6fe2a627a265c4d1d7b843a033a132e1fe2ce
|
|||||||
1 file changed, 33 insertions(+), 1 deletion(-)
|
1 file changed, 33 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/services/print/java/com/android/server/print/PrintManagerService.java b/services/print/java/com/android/server/print/PrintManagerService.java
|
diff --git a/services/print/java/com/android/server/print/PrintManagerService.java b/services/print/java/com/android/server/print/PrintManagerService.java
|
||||||
index dc55179bdc9e8..101a2b41addbe 100644
|
index c9b9f3e6bd48..2bed4b5a81f5 100644
|
||||||
--- a/services/print/java/com/android/server/print/PrintManagerService.java
|
--- a/services/print/java/com/android/server/print/PrintManagerService.java
|
||||||
+++ b/services/print/java/com/android/server/print/PrintManagerService.java
|
+++ b/services/print/java/com/android/server/print/PrintManagerService.java
|
||||||
@@ -251,12 +251,44 @@ public Icon getCustomPrinterIcon(PrinterId printerId, int userId) {
|
@@ -252,12 +252,44 @@ public final class PrintManagerService extends SystemService {
|
||||||
}
|
}
|
||||||
final long identity = Binder.clearCallingIdentity();
|
final long identity = Binder.clearCallingIdentity();
|
||||||
try {
|
try {
|
||||||
|
@ -0,0 +1,338 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Tetiana Meronyk <tetianameronyk@google.com>
|
||||||
|
Date: Wed, 10 Jan 2024 16:25:13 +0000
|
||||||
|
Subject: [PATCH] Fix security vulnerability that creates user with no
|
||||||
|
restrictions when accountOptions are too long.
|
||||||
|
|
||||||
|
Bug: 293602970
|
||||||
|
Test: atest UserManagerTest#testAddUserAccountData_validStringValuesAreSaved_validBundleIsSaved && atest UserManagerTest#testAddUserAccountData_invalidStringValuesAreTruncated_invalidBundleIsDropped
|
||||||
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:944ea959ab8464c39a8f6a4fc391fb6953e1df89)
|
||||||
|
Merged-In: I23c971f671546ac085060add89485cfac6691ca3
|
||||||
|
Change-Id: I23c971f671546ac085060add89485cfac6691ca3
|
||||||
|
---
|
||||||
|
core/java/android/os/PersistableBundle.java | 37 +++++++
|
||||||
|
core/java/android/os/UserManager.java | 23 +++-
|
||||||
|
.../app/ConfirmUserCreationActivity.java | 12 +++
|
||||||
|
.../android/server/pm/UserManagerService.java | 29 ++---
|
||||||
|
.../android/server/pm/UserManagerTest.java | 102 ++++++++++++++++++
|
||||||
|
5 files changed, 187 insertions(+), 16 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/core/java/android/os/PersistableBundle.java b/core/java/android/os/PersistableBundle.java
|
||||||
|
index 3e6312754359..bf584c957aa0 100644
|
||||||
|
--- a/core/java/android/os/PersistableBundle.java
|
||||||
|
+++ b/core/java/android/os/PersistableBundle.java
|
||||||
|
@@ -268,6 +268,43 @@ public final class PersistableBundle extends BaseBundle implements Cloneable, Pa
|
||||||
|
XmlUtils.writeMapXml(mMap, out, this);
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /**
|
||||||
|
+ * Checks whether all keys and values are within the given character limit.
|
||||||
|
+ * Note: Maximum character limit of String that can be saved to XML as part of bundle is 65535.
|
||||||
|
+ * Otherwise IOException is thrown.
|
||||||
|
+ * @param limit length of String keys and values in the PersistableBundle, including nested
|
||||||
|
+ * PersistableBundles to check against.
|
||||||
|
+ *
|
||||||
|
+ * @hide
|
||||||
|
+ */
|
||||||
|
+ public boolean isBundleContentsWithinLengthLimit(int limit) {
|
||||||
|
+ unparcel();
|
||||||
|
+ if (mMap == null) {
|
||||||
|
+ return true;
|
||||||
|
+ }
|
||||||
|
+ for (int i = 0; i < mMap.size(); i++) {
|
||||||
|
+ if (mMap.keyAt(i) != null && mMap.keyAt(i).length() > limit) {
|
||||||
|
+ return false;
|
||||||
|
+ }
|
||||||
|
+ final Object value = mMap.valueAt(i);
|
||||||
|
+ if (value instanceof String && ((String) value).length() > limit) {
|
||||||
|
+ return false;
|
||||||
|
+ } else if (value instanceof String[]) {
|
||||||
|
+ String[] stringArray = (String[]) value;
|
||||||
|
+ for (int j = 0; j < stringArray.length; j++) {
|
||||||
|
+ if (stringArray[j] != null
|
||||||
|
+ && stringArray[j].length() > limit) {
|
||||||
|
+ return false;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ } else if (value instanceof PersistableBundle
|
||||||
|
+ && !((PersistableBundle) value).isBundleContentsWithinLengthLimit(limit)) {
|
||||||
|
+ return false;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ return true;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
/** @hide */
|
||||||
|
static class MyReadMapCallback implements XmlUtils.ReadMapCallback {
|
||||||
|
@Override
|
||||||
|
diff --git a/core/java/android/os/UserManager.java b/core/java/android/os/UserManager.java
|
||||||
|
index da41478e91a6..fc714923bf41 100644
|
||||||
|
--- a/core/java/android/os/UserManager.java
|
||||||
|
+++ b/core/java/android/os/UserManager.java
|
||||||
|
@@ -77,6 +77,21 @@ public class UserManager {
|
||||||
|
|
||||||
|
private Boolean mIsManagedProfileCached;
|
||||||
|
|
||||||
|
+ /** Maximum length of username.
|
||||||
|
+ * @hide
|
||||||
|
+ */
|
||||||
|
+ public static final int MAX_USER_NAME_LENGTH = 100;
|
||||||
|
+
|
||||||
|
+ /** Maximum length of user property String value.
|
||||||
|
+ * @hide
|
||||||
|
+ */
|
||||||
|
+ public static final int MAX_ACCOUNT_STRING_LENGTH = 500;
|
||||||
|
+
|
||||||
|
+ /** Maximum length of account options String values.
|
||||||
|
+ * @hide
|
||||||
|
+ */
|
||||||
|
+ public static final int MAX_ACCOUNT_OPTIONS_LENGTH = 1000;
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* @hide
|
||||||
|
* No user restriction.
|
||||||
|
@@ -2199,15 +2214,15 @@ public class UserManager {
|
||||||
|
* time, the preferred user name and account information are used by the setup process for that
|
||||||
|
* user.
|
||||||
|
*
|
||||||
|
- * @param userName Optional name to assign to the user.
|
||||||
|
+ * @param userName Optional name to assign to the user. Character limit is 100.
|
||||||
|
* @param accountName Optional account name that will be used by the setup wizard to initialize
|
||||||
|
- * the user.
|
||||||
|
+ * the user. Character limit is 500.
|
||||||
|
* @param accountType Optional account type for the account to be created. This is required
|
||||||
|
- * if the account name is specified.
|
||||||
|
+ * if the account name is specified. Character limit is 500.
|
||||||
|
* @param accountOptions Optional bundle of data to be passed in during account creation in the
|
||||||
|
* new user via {@link AccountManager#addAccount(String, String, String[],
|
||||||
|
* Bundle, android.app.Activity, android.accounts.AccountManagerCallback,
|
||||||
|
- * Handler)}.
|
||||||
|
+ * Handler)}. Character limit is 1000.
|
||||||
|
* @return An Intent that can be launched from an Activity.
|
||||||
|
* @see #USER_CREATION_FAILED_NOT_PERMITTED
|
||||||
|
* @see #USER_CREATION_FAILED_NO_MORE_USERS
|
||||||
|
diff --git a/core/java/com/android/internal/app/ConfirmUserCreationActivity.java b/core/java/com/android/internal/app/ConfirmUserCreationActivity.java
|
||||||
|
index 03da9bc939ec..74dedc38a922 100644
|
||||||
|
--- a/core/java/com/android/internal/app/ConfirmUserCreationActivity.java
|
||||||
|
+++ b/core/java/com/android/internal/app/ConfirmUserCreationActivity.java
|
||||||
|
@@ -110,6 +110,14 @@ public class ConfirmUserCreationActivity extends AlertActivity
|
||||||
|
if (cantCreateUser) {
|
||||||
|
setResult(UserManager.USER_CREATION_FAILED_NOT_PERMITTED);
|
||||||
|
return null;
|
||||||
|
+ } else if (!(isUserPropertyWithinLimit(mUserName, UserManager.MAX_USER_NAME_LENGTH)
|
||||||
|
+ && isUserPropertyWithinLimit(mAccountName, UserManager.MAX_ACCOUNT_STRING_LENGTH)
|
||||||
|
+ && isUserPropertyWithinLimit(mAccountType, UserManager.MAX_ACCOUNT_STRING_LENGTH))
|
||||||
|
+ || (mAccountOptions != null && !mAccountOptions.isBundleContentsWithinLengthLimit(
|
||||||
|
+ UserManager.MAX_ACCOUNT_OPTIONS_LENGTH))) {
|
||||||
|
+ setResult(UserManager.USER_CREATION_FAILED_NOT_PERMITTED);
|
||||||
|
+ Log.i(TAG, "User properties must not exceed their character limits");
|
||||||
|
+ return null;
|
||||||
|
} else if (cantCreateAnyMoreUsers) {
|
||||||
|
setResult(UserManager.USER_CREATION_FAILED_NO_MORE_USERS);
|
||||||
|
return null;
|
||||||
|
@@ -137,4 +145,8 @@ public class ConfirmUserCreationActivity extends AlertActivity
|
||||||
|
}
|
||||||
|
finish();
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+ private boolean isUserPropertyWithinLimit(String property, int limit) {
|
||||||
|
+ return property == null || property.length() <= limit;
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
diff --git a/services/core/java/com/android/server/pm/UserManagerService.java b/services/core/java/com/android/server/pm/UserManagerService.java
|
||||||
|
index 318c11141cfe..645ee1a2f12e 100644
|
||||||
|
--- a/services/core/java/com/android/server/pm/UserManagerService.java
|
||||||
|
+++ b/services/core/java/com/android/server/pm/UserManagerService.java
|
||||||
|
@@ -225,8 +225,6 @@ public class UserManagerService extends IUserManager.Stub {
|
||||||
|
|
||||||
|
private static final int USER_VERSION = 7;
|
||||||
|
|
||||||
|
- private static final int MAX_USER_STRING_LENGTH = 500;
|
||||||
|
-
|
||||||
|
private static final long EPOCH_PLUS_30_YEARS = 30L * 365 * 24 * 60 * 60 * 1000L; // ms
|
||||||
|
|
||||||
|
// Maximum number of managed profiles permitted per user is 1. This cannot be increased
|
||||||
|
@@ -2420,16 +2418,18 @@ public class UserManagerService extends IUserManager.Stub {
|
||||||
|
if (userData.persistSeedData) {
|
||||||
|
if (userData.seedAccountName != null) {
|
||||||
|
serializer.attribute(null, ATTR_SEED_ACCOUNT_NAME,
|
||||||
|
- truncateString(userData.seedAccountName));
|
||||||
|
+ truncateString(userData.seedAccountName,
|
||||||
|
+ UserManager.MAX_ACCOUNT_STRING_LENGTH));
|
||||||
|
}
|
||||||
|
if (userData.seedAccountType != null) {
|
||||||
|
serializer.attribute(null, ATTR_SEED_ACCOUNT_TYPE,
|
||||||
|
- truncateString(userData.seedAccountType));
|
||||||
|
+ truncateString(userData.seedAccountType,
|
||||||
|
+ UserManager.MAX_ACCOUNT_STRING_LENGTH));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (userInfo.name != null) {
|
||||||
|
serializer.startTag(null, TAG_NAME);
|
||||||
|
- serializer.text(truncateString(userInfo.name));
|
||||||
|
+ serializer.text(truncateString(userInfo.name, UserManager.MAX_USER_NAME_LENGTH));
|
||||||
|
serializer.endTag(null, TAG_NAME);
|
||||||
|
}
|
||||||
|
synchronized (mRestrictionsLock) {
|
||||||
|
@@ -2470,11 +2470,11 @@ public class UserManagerService extends IUserManager.Stub {
|
||||||
|
serializer.endDocument();
|
||||||
|
}
|
||||||
|
|
||||||
|
- private String truncateString(String original) {
|
||||||
|
- if (original == null || original.length() <= MAX_USER_STRING_LENGTH) {
|
||||||
|
+ private String truncateString(String original, int limit) {
|
||||||
|
+ if (original == null || original.length() <= limit) {
|
||||||
|
return original;
|
||||||
|
}
|
||||||
|
- return original.substring(0, MAX_USER_STRING_LENGTH);
|
||||||
|
+ return original.substring(0, limit);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -2819,7 +2819,7 @@ public class UserManagerService extends IUserManager.Stub {
|
||||||
|
private UserInfo createUserInternalUncheckedNoTracing(@Nullable String name,
|
||||||
|
@UserInfoFlag int flags, @UserIdInt int parentId, boolean preCreate,
|
||||||
|
@Nullable String[] disallowedPackages, @NonNull TimingsTraceLog t) {
|
||||||
|
- String truncatedName = truncateString(name);
|
||||||
|
+ String truncatedName = truncateString(name, UserManager.MAX_USER_NAME_LENGTH);
|
||||||
|
// First try to use a pre-created user (if available).
|
||||||
|
// NOTE: currently we don't support pre-created managed profiles
|
||||||
|
if (!preCreate && (parentId < 0 && !UserInfo.isManagedProfile(flags))) {
|
||||||
|
@@ -3877,9 +3877,14 @@ public class UserManagerService extends IUserManager.Stub {
|
||||||
|
Slog.e(LOG_TAG, "No such user for settings seed data u=" + userId);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
- userData.seedAccountName = truncateString(accountName);
|
||||||
|
- userData.seedAccountType = truncateString(accountType);
|
||||||
|
- userData.seedAccountOptions = accountOptions;
|
||||||
|
+ userData.seedAccountName = truncateString(accountName,
|
||||||
|
+ UserManager.MAX_ACCOUNT_STRING_LENGTH);
|
||||||
|
+ userData.seedAccountType = truncateString(accountType,
|
||||||
|
+ UserManager.MAX_ACCOUNT_STRING_LENGTH);
|
||||||
|
+ if (accountOptions != null && accountOptions.isBundleContentsWithinLengthLimit(
|
||||||
|
+ UserManager.MAX_ACCOUNT_OPTIONS_LENGTH)) {
|
||||||
|
+ userData.seedAccountOptions = accountOptions;
|
||||||
|
+ }
|
||||||
|
userData.persistSeedData = persist;
|
||||||
|
}
|
||||||
|
if (persist) {
|
||||||
|
diff --git a/services/tests/servicestests/src/com/android/server/pm/UserManagerTest.java b/services/tests/servicestests/src/com/android/server/pm/UserManagerTest.java
|
||||||
|
index e9edba58a3dd..331bbb753ebf 100644
|
||||||
|
--- a/services/tests/servicestests/src/com/android/server/pm/UserManagerTest.java
|
||||||
|
+++ b/services/tests/servicestests/src/com/android/server/pm/UserManagerTest.java
|
||||||
|
@@ -24,6 +24,7 @@ import android.content.IntentFilter;
|
||||||
|
import android.content.pm.PackageManager;
|
||||||
|
import android.content.pm.UserInfo;
|
||||||
|
import android.os.Bundle;
|
||||||
|
+import android.os.PersistableBundle;
|
||||||
|
import android.os.UserHandle;
|
||||||
|
import android.os.UserManager;
|
||||||
|
import android.provider.Settings;
|
||||||
|
@@ -601,6 +602,107 @@ public class UserManagerTest extends AndroidTestCase {
|
||||||
|
assertEquals(canBeCreatedCount, created.get());
|
||||||
|
}
|
||||||
|
|
||||||
|
+ @Test
|
||||||
|
+ public void testAddUserAccountData_validStringValuesAreSaved_validBundleIsSaved() {
|
||||||
|
+ assumeManagedUsersSupported();
|
||||||
|
+
|
||||||
|
+ String userName = "User";
|
||||||
|
+ String accountName = "accountName";
|
||||||
|
+ String accountType = "accountType";
|
||||||
|
+ String arrayKey = "StringArrayKey";
|
||||||
|
+ String stringKey = "StringKey";
|
||||||
|
+ String intKey = "IntKey";
|
||||||
|
+ String nestedBundleKey = "PersistableBundleKey";
|
||||||
|
+ String value1 = "Value 1";
|
||||||
|
+ String value2 = "Value 2";
|
||||||
|
+ String value3 = "Value 3";
|
||||||
|
+
|
||||||
|
+ UserInfo userInfo = mUserManager.createUser(userName,
|
||||||
|
+ UserManager.USER_TYPE_FULL_SECONDARY, 0);
|
||||||
|
+
|
||||||
|
+ PersistableBundle accountOptions = new PersistableBundle();
|
||||||
|
+ String[] stringArray = {value1, value2};
|
||||||
|
+ accountOptions.putInt(intKey, 1234);
|
||||||
|
+ PersistableBundle nested = new PersistableBundle();
|
||||||
|
+ nested.putString(stringKey, value3);
|
||||||
|
+ accountOptions.putPersistableBundle(nestedBundleKey, nested);
|
||||||
|
+ accountOptions.putStringArray(arrayKey, stringArray);
|
||||||
|
+
|
||||||
|
+ mUserManager.clearSeedAccountData();
|
||||||
|
+ mUserManager.setSeedAccountData(mContext.getUserId(), accountName,
|
||||||
|
+ accountType, accountOptions);
|
||||||
|
+
|
||||||
|
+ //assert userName accountName and accountType were saved correctly
|
||||||
|
+ assertTrue(mUserManager.getUserInfo(userInfo.id).name.equals(userName));
|
||||||
|
+ assertTrue(mUserManager.getSeedAccountName().equals(accountName));
|
||||||
|
+ assertTrue(mUserManager.getSeedAccountType().equals(accountType));
|
||||||
|
+
|
||||||
|
+ //assert bundle with correct values was added
|
||||||
|
+ assertThat(mUserManager.getSeedAccountOptions().containsKey(arrayKey)).isTrue();
|
||||||
|
+ assertThat(mUserManager.getSeedAccountOptions().getPersistableBundle(nestedBundleKey)
|
||||||
|
+ .getString(stringKey)).isEqualTo(value3);
|
||||||
|
+ assertThat(mUserManager.getSeedAccountOptions().getStringArray(arrayKey)[0])
|
||||||
|
+ .isEqualTo(value1);
|
||||||
|
+
|
||||||
|
+ mUserManager.removeUser(userInfo.id);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ @Test
|
||||||
|
+ public void testAddUserAccountData_invalidStringValuesAreTruncated_invalidBundleIsDropped() {
|
||||||
|
+ assumeManagedUsersSupported();
|
||||||
|
+
|
||||||
|
+ String tooLongString = generateLongString();
|
||||||
|
+ String userName = "User " + tooLongString;
|
||||||
|
+ String accountType = "Account Type " + tooLongString;
|
||||||
|
+ String accountName = "accountName " + tooLongString;
|
||||||
|
+ String arrayKey = "StringArrayKey";
|
||||||
|
+ String stringKey = "StringKey";
|
||||||
|
+ String intKey = "IntKey";
|
||||||
|
+ String nestedBundleKey = "PersistableBundleKey";
|
||||||
|
+ String value1 = "Value 1";
|
||||||
|
+ String value2 = "Value 2";
|
||||||
|
+
|
||||||
|
+ UserInfo userInfo = mUserManager.createUser(userName,
|
||||||
|
+ UserManager.USER_TYPE_FULL_SECONDARY, 0);
|
||||||
|
+
|
||||||
|
+ PersistableBundle accountOptions = new PersistableBundle();
|
||||||
|
+ String[] stringArray = {value1, value2};
|
||||||
|
+ accountOptions.putInt(intKey, 1234);
|
||||||
|
+ PersistableBundle nested = new PersistableBundle();
|
||||||
|
+ nested.putString(stringKey, tooLongString);
|
||||||
|
+ accountOptions.putPersistableBundle(nestedBundleKey, nested);
|
||||||
|
+ accountOptions.putStringArray(arrayKey, stringArray);
|
||||||
|
+ mUserManager.clearSeedAccountData();
|
||||||
|
+ mUserManager.setSeedAccountData(mContext.getUserId(), accountName,
|
||||||
|
+ accountType, accountOptions);
|
||||||
|
+
|
||||||
|
+ //assert userName was truncated
|
||||||
|
+ assertTrue(mUserManager.getUserInfo(userInfo.id).name.length()
|
||||||
|
+ == UserManager.MAX_USER_NAME_LENGTH);
|
||||||
|
+
|
||||||
|
+ //assert accountName and accountType got truncated
|
||||||
|
+ assertTrue(mUserManager.getSeedAccountName().length()
|
||||||
|
+ == UserManager.MAX_ACCOUNT_STRING_LENGTH);
|
||||||
|
+ assertTrue(mUserManager.getSeedAccountType().length()
|
||||||
|
+ == UserManager.MAX_ACCOUNT_STRING_LENGTH);
|
||||||
|
+
|
||||||
|
+ //assert bundle with invalid values was dropped
|
||||||
|
+ assertThat(mUserManager.getSeedAccountOptions() == null).isTrue();
|
||||||
|
+
|
||||||
|
+ mUserManager.removeUser(userInfo.id);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ private String generateLongString() {
|
||||||
|
+ String partialString = "Test Name Test Name Test Name Test Name Test Name Test Name Test "
|
||||||
|
+ + "Name Test Name Test Name Test Name "; //String of length 100
|
||||||
|
+ StringBuilder resultString = new StringBuilder();
|
||||||
|
+ for (int i = 0; i < 600; i++) {
|
||||||
|
+ resultString.append(partialString);
|
||||||
|
+ }
|
||||||
|
+ return resultString.toString();
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+
|
||||||
|
private boolean isPackageInstalledForUser(String packageName, int userId) {
|
||||||
|
try {
|
||||||
|
return mPackageManager.getPackageInfoAsUser(packageName, 0, userId) != null;
|
@ -18,7 +18,7 @@ Change-Id: Ieffac6db5c6359b071efc599f7a70de609b80b72
|
|||||||
1 file changed, 45 insertions(+), 11 deletions(-)
|
1 file changed, 45 insertions(+), 11 deletions(-)
|
||||||
|
|
||||||
diff --git a/stack/gatt/att_protocol.cc b/stack/gatt/att_protocol.cc
|
diff --git a/stack/gatt/att_protocol.cc b/stack/gatt/att_protocol.cc
|
||||||
index d1e0ece59..3117dc6ea 100644
|
index d1e0ece59..41839b072 100644
|
||||||
--- a/stack/gatt/att_protocol.cc
|
--- a/stack/gatt/att_protocol.cc
|
||||||
+++ b/stack/gatt/att_protocol.cc
|
+++ b/stack/gatt/att_protocol.cc
|
||||||
@@ -278,46 +278,80 @@ BT_HDR* attp_build_opcode_cmd(uint8_t op_code) {
|
@@ -278,46 +278,80 @@ BT_HDR* attp_build_opcode_cmd(uint8_t op_code) {
|
||||||
|
@ -82,6 +82,7 @@ patchWorkspaceReal() {
|
|||||||
repopick 378494; #repopick: Require --force for closed changes found via --query
|
repopick 378494; #repopick: Require --force for closed changes found via --query
|
||||||
repopick 378458; #repopick: Fix apply order of dependent commits
|
repopick 378458; #repopick: Fix apply order of dependent commits
|
||||||
#repopick -it ten-firewall;
|
#repopick -it ten-firewall;
|
||||||
|
repopick 353117; #bonus for Q_asb_2023-01
|
||||||
repopick -t Q_asb_2023-03 -e 352333,352570;
|
repopick -t Q_asb_2023-03 -e 352333,352570;
|
||||||
repopick -t Q_asb_2023-04;
|
repopick -t Q_asb_2023-04;
|
||||||
repopick -t Q_asb_2023-05;
|
repopick -t Q_asb_2023-05;
|
||||||
|
@ -98,7 +98,7 @@ sed -i '75i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aap
|
|||||||
awk -i inplace '!/updatable_apex.mk/' target/product/mainline_system.mk; #Disable APEX
|
awk -i inplace '!/updatable_apex.mk/' target/product/mainline_system.mk; #Disable APEX
|
||||||
sed -i 's/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; #Set the minimum supported target SDK to Pie (GrapheneOS)
|
sed -i 's/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; #Set the minimum supported target SDK to Pie (GrapheneOS)
|
||||||
#sed -i 's/PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS := true/PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS := false/' core/product_config.mk; #broken by hardenDefconfig
|
#sed -i 's/PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS := true/PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS := false/' core/product_config.mk; #broken by hardenDefconfig
|
||||||
sed -i 's/2024-02-05/2024-03-05/' core/version_defaults.mk; #Bump Security String #R_asb_2024-03
|
sed -i 's/2024-02-05/2024-04-05/' core/version_defaults.mk; #Bump Security String #R_asb_2024-04
|
||||||
fi;
|
fi;
|
||||||
|
|
||||||
if enterAndClear "build/soong"; then
|
if enterAndClear "build/soong"; then
|
||||||
@ -173,6 +173,7 @@ applyPatch "$DOS_PATCHES/android_frameworks_base/379136.patch"; #R_asb_2024-01 F
|
|||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/385672.patch"; #P_asb_2024-03 Resolve custom printer icon boundary exploit.
|
applyPatch "$DOS_PATCHES/android_frameworks_base/385672.patch"; #P_asb_2024-03 Resolve custom printer icon boundary exploit.
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/385538.patch"; #R_asb_2024-03 Disallow system apps to be installed/updated as instant.
|
applyPatch "$DOS_PATCHES/android_frameworks_base/385538.patch"; #R_asb_2024-03 Disallow system apps to be installed/updated as instant.
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/385539.patch"; #R_asb_2024-03 Close AccountManagerService.session after timeout.
|
applyPatch "$DOS_PATCHES/android_frameworks_base/385539.patch"; #R_asb_2024-03 Close AccountManagerService.session after timeout.
|
||||||
|
applyPatch "$DOS_PATCHES/android_frameworks_base/389014-backport.patch"; #S_asb_2024-04 Fix security vulnerability that creates user with no restrictions when accountOptions are too long.
|
||||||
#applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS)
|
||||||
#applyPatch "$DOS_PATCHES/android_frameworks_base/272646-forwardport.patch"; #ten-bt-sbc-hd-dualchannel: Add Dual Channel into Bluetooth Audio Channel Mode developer options menu (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_frameworks_base/272646-forwardport.patch"; #ten-bt-sbc-hd-dualchannel: Add Dual Channel into Bluetooth Audio Channel Mode developer options menu (ValdikSS)
|
||||||
#applyPatch "$DOS_PATCHES/android_frameworks_base/272647.patch"; #ten-bt-sbc-hd-dualchannel: Allow SBC as HD audio codec in Bluetooth device configuration (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_frameworks_base/272647.patch"; #ten-bt-sbc-hd-dualchannel: Allow SBC as HD audio codec in Bluetooth device configuration (ValdikSS)
|
||||||
|
Loading…
Reference in New Issue
Block a user