Skip to content
This repository was archived by the owner on Dec 23, 2024. It is now read-only.

Commit 7357b97

Browse files
Fixup + Churn
Signed-off-by: Tavi <[email protected]>
1 parent 3096e8a commit 7357b97

35 files changed

+69
-70
lines changed

Patches/LineageOS-14.1/android_frameworks_base/393646.patch

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
From 2786005045df9d37fc4de14e5e4f60b9d5ec59b7 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Dmitry Dementyev <[email protected]>
33
Date: Tue, 26 Mar 2024 10:31:44 -0700
44
Subject: [PATCH] Add more checkKeyIntent checks to AccountManagerService.
@@ -14,10 +14,10 @@ Change-Id: I9e45d758a2320328da5664b6341eafe6f285f297
1414
1 file changed, 10 insertions(+)
1515

1616
diff --git a/services/core/java/com/android/server/accounts/AccountManagerService.java b/services/core/java/com/android/server/accounts/AccountManagerService.java
17-
index 126955add01a9..6ae79ec2e4aaa 100644
17+
index b28e532c01bb..77fd4a8d6054 100644
1818
--- a/services/core/java/com/android/server/accounts/AccountManagerService.java
1919
+++ b/services/core/java/com/android/server/accounts/AccountManagerService.java
20-
@@ -2971,6 +2971,11 @@ public void onResult(Bundle result) {
20+
@@ -3002,6 +3002,11 @@ public class AccountManagerService
2121

2222
// Strip auth token from result.
2323
result.remove(AccountManager.KEY_AUTHTOKEN);
@@ -29,7 +29,7 @@ index 126955add01a9..6ae79ec2e4aaa 100644
2929

3030
if (Log.isLoggable(TAG, Log.VERBOSE)) {
3131
Log.v(TAG,
32-
@@ -4402,6 +4407,11 @@ public void onResult(Bundle result) {
32+
@@ -4493,6 +4498,11 @@ public class AccountManagerService
3333
} else {
3434
if (mStripAuthTokenFromResult) {
3535
result.remove(AccountManager.KEY_AUTHTOKEN);

Patches/LineageOS-14.1/android_frameworks_base/393647.patch

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
1-
From 1595b95840ad55128edacd32996afb954480aefd Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Chris Wailes <[email protected]>
33
Date: Thu, 18 Apr 2019 18:25:57 -0700
4-
Subject: [PATCH] [BACKPORT] Adds additional sanitization for Zygote command
5-
arguments.
4+
Subject: [PATCH] Adds additional sanitization for Zygote command arguments.
65

76
Previously we were only insuring that the arguments provided to the
87
Zygote didn't contain any newlines. This adds additional checks for
@@ -19,7 +18,7 @@ Merged-In: I4055c50d52db0047c02c11096710fd07b429660c
1918
1 file changed, 7 insertions(+), 2 deletions(-)
2019

2120
diff --git a/core/java/android/os/Process.java b/core/java/android/os/Process.java
22-
index e1b7fdad25e7d..1e084529de6e5 100644
21+
index e1b7fdad25e7..1e084529de6e 100644
2322
--- a/core/java/android/os/Process.java
2423
+++ b/core/java/android/os/Process.java
2524
@@ -16,6 +16,7 @@
@@ -30,7 +29,7 @@ index e1b7fdad25e7d..1e084529de6e5 100644
3029
import android.annotation.TestApi;
3130
import android.net.LocalSocket;
3231
import android.net.LocalSocketAddress;
33-
@@ -564,15 +565,19 @@ private static String getAbiList(BufferedWriter writer, DataInputStream inputStr
32+
@@ -564,15 +565,19 @@ public class Process {
3433
* @throws ZygoteStartFailedEx if process start failed for any reason
3534
*/
3635
private static ProcessStartResult zygoteSendArgsAndGetResult(

Patches/LineageOS-14.1/android_frameworks_base/393648.patch

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
From 556cc034e359fd1bb64a1b16ebe7a61f06810bcb Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Hans Boehm <[email protected]>
33
Date: Tue, 2 Jan 2024 16:53:13 -0800
4-
Subject: [PATCH] [BACKPORT] Check hidden API exemptions
4+
Subject: [PATCH] Check hidden API exemptions
55

66
Refuse to deal with newlines and null characters in
77
HiddenApiSettings.update(). Also disallow nulls in process start
@@ -18,10 +18,10 @@ Change-Id: I83cd60e46407a4a082f9f3c80e937dbd522dbac4
1818
1 file changed, 2 insertions(+)
1919

2020
diff --git a/core/java/android/os/Process.java b/core/java/android/os/Process.java
21-
index 1e084529de6e5..de8287baa828b 100644
21+
index 1e084529de6e..de8287baa828 100644
2222
--- a/core/java/android/os/Process.java
2323
+++ b/core/java/android/os/Process.java
24-
@@ -578,6 +578,8 @@ private static ProcessStartResult zygoteSendArgsAndGetResult(
24+
@@ -578,6 +578,8 @@ public class Process {
2525
throw new ZygoteStartFailedEx("Embedded newlines not allowed");
2626
} else if (args.get(i).indexOf('\r') >= 0) {
2727
throw new ZygoteStartFailedEx("Embedded carriage returns not allowed");

Patches/LineageOS-14.1/android_frameworks_base/393649.patch

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
From 53abf79f26084d26d2887d716137fa9cd4eeefc9 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Ameer Armaly <[email protected]>
33
Date: Fri, 8 Mar 2024 19:41:06 +0000
4-
Subject: [PATCH] [RESTRICT AUTOMERGE] AccessibilityManagerService: remove
5-
uninstalled services from enabled list after service update.
4+
Subject: [PATCH] AccessibilityManagerService: remove uninstalled services from
5+
enabled list after service update.
66

77
Bug: 326485767
88
Test: atest AccessibilityEndToEndTest#testUpdateServiceWithoutIntent_disablesService
@@ -16,10 +16,10 @@ Change-Id: I898044b388399bded66acb22dba55c5df26ccc9f
1616
1 file changed, 22 insertions(+)
1717

1818
diff --git a/services/accessibility/java/com/android/server/accessibility/AccessibilityManagerService.java b/services/accessibility/java/com/android/server/accessibility/AccessibilityManagerService.java
19-
index 34ccb7b82c87c..38cf47a5d87b9 100644
19+
index cae1adcafc23..b030dd4f6ead 100644
2020
--- a/services/accessibility/java/com/android/server/accessibility/AccessibilityManagerService.java
2121
+++ b/services/accessibility/java/com/android/server/accessibility/AccessibilityManagerService.java
22-
@@ -1294,10 +1294,13 @@ private void updateServicesLocked(UserState userState) {
22+
@@ -1302,10 +1302,13 @@ public class AccessibilityManagerService extends IAccessibilityManager.Stub {
2323
boolean isUnlockingOrUnlocked = mContext.getSystemService(UserManager.class)
2424
.isUserUnlockingOrUnlocked(userState.mUserId);
2525

@@ -33,7 +33,7 @@ index 34ccb7b82c87c..38cf47a5d87b9 100644
3333

3434
Service service = componentNameToServiceMap.get(componentName);
3535

36-
@@ -1325,6 +1328,25 @@ private void updateServicesLocked(UserState userState) {
36+
@@ -1333,6 +1336,25 @@ public class AccessibilityManagerService extends IAccessibilityManager.Stub {
3737
}
3838
}
3939

Patches/LineageOS-20.0/android_frameworks_base/0013-Special_Permissions-1.patch

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ Ported from 12: b294a2ce1d0d185dbc438ac3c06c90386d5f5949
99
1 file changed, 30 insertions(+), 9 deletions(-)
1010

1111
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
12-
index 8dadd3190ac3..b1de8d8a5830 100644
12+
index 96c34db79898..9fd704ac7d44 100644
1313
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
1414
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
15-
@@ -1409,7 +1409,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
15+
@@ -1410,7 +1410,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
1616
// their permissions as always granted runtime ones since we need
1717
// to keep the review required permission flag per user while an
1818
// install permission's state is shared across all users.
@@ -22,7 +22,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
2222
return;
2323
}
2424

25-
@@ -1452,7 +1453,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
25+
@@ -1453,7 +1454,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
2626
+ " for package " + packageName);
2727
}
2828

@@ -32,7 +32,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
3232
Slog.w(TAG, "Cannot grant runtime permission to a legacy app");
3333
return;
3434
}
35-
@@ -1598,7 +1600,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
35+
@@ -1599,7 +1601,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
3636
// their permissions as always granted runtime ones since we need
3737
// to keep the review required permission flag per user while an
3838
// install permission's state is shared across all users.
@@ -42,7 +42,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
4242
return;
4343
}
4444

45-
@@ -1785,7 +1788,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
45+
@@ -1786,7 +1789,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
4646
// permission as requiring a review as this is the initial state.
4747
final int uid = mPackageManagerInt.getPackageUid(packageName, 0, userId);
4848
final int targetSdk = mPackageManagerInt.getUidTargetSdkVersion(uid);
@@ -52,7 +52,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
5252
? FLAG_PERMISSION_REVIEW_REQUIRED | FLAG_PERMISSION_REVOKED_COMPAT
5353
: 0;
5454

55-
@@ -1805,7 +1809,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
55+
@@ -1806,7 +1810,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
5656

5757
// If this permission was granted by default or role, make sure it is.
5858
if ((oldFlags & FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0
@@ -62,7 +62,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
6262
// PermissionPolicyService will handle the app op for runtime permissions later.
6363
grantRuntimePermissionInternal(packageName, permName, false,
6464
Process.SYSTEM_UID, userId, delayingPermCallback);
65-
@@ -2518,6 +2523,10 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
65+
@@ -2519,6 +2524,10 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
6666
}
6767
}
6868

@@ -73,7 +73,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
7373
/**
7474
* Restore the permission state for a package.
7575
*
76-
@@ -2642,6 +2651,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
76+
@@ -2643,6 +2652,8 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
7777
synchronized (mLock) {
7878
for (final int userId : userIds) {
7979
final UserPermissionState userState = mState.getOrCreateUserState(userId);
@@ -82,7 +82,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
8282
final UidPermissionState uidState = userState.getOrCreateUidState(ps.getAppId());
8383

8484
if (uidState.isMissing()) {
85-
@@ -2658,7 +2669,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
85+
@@ -2659,7 +2670,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
8686
FLAG_PERMISSION_RESTRICTION_UPGRADE_EXEMPT,
8787
FLAG_PERMISSION_RESTRICTION_UPGRADE_EXEMPT);
8888
}
@@ -91,7 +91,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
9191
uidState.updatePermissionFlags(permission,
9292
PackageManager.FLAG_PERMISSION_REVIEW_REQUIRED
9393
| PackageManager.FLAG_PERMISSION_REVOKED_COMPAT,
94-
@@ -2854,7 +2865,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
94+
@@ -2855,7 +2866,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
9595
boolean restrictionApplied = (origState.getPermissionFlags(
9696
bp.getName()) & FLAG_PERMISSION_APPLY_RESTRICTION) != 0;
9797

@@ -100,7 +100,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
100100
// If hard restricted we don't allow holding it
101101
if (permissionPolicyInitialized && hardRestricted) {
102102
if (!restrictionExempt) {
103-
@@ -2907,6 +2918,16 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
103+
@@ -2908,6 +2919,16 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
104104
}
105105
}
106106
}
@@ -117,7 +117,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
117117
} else {
118118
if (origPermState == null) {
119119
// New permission
120-
@@ -2941,7 +2962,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
120+
@@ -2942,7 +2963,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
121121
if (restrictionApplied) {
122122
flags &= ~FLAG_PERMISSION_APPLY_RESTRICTION;
123123
// Dropping restriction on a legacy app implies a review
@@ -126,7 +126,7 @@ index 8dadd3190ac3..b1de8d8a5830 100644
126126
flags |= FLAG_PERMISSION_REVIEW_REQUIRED;
127127
}
128128
wasChanged = true;
129-
@@ -3658,7 +3679,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
129+
@@ -3659,7 +3680,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
130130
if (shouldGrantPermission) {
131131
final int flags = getPermissionFlagsInternal(pkg.getPackageName(), permission,
132132
myUid, userId);

Patches/LineageOS-20.0/android_frameworks_base/0013-Special_Permissions-10.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ Subject: [PATCH] srt permissions: don't auto-grant denied ones when
99
1 file changed, 3 insertions(+), 1 deletion(-)
1010

1111
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
12-
index 29658387fed4..5d2bb41c4b4d 100644
12+
index f4064d1ab984..556443b40c3d 100644
1313
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
1414
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
15-
@@ -1810,7 +1810,9 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
15+
@@ -1811,7 +1811,9 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
1616
// If this permission was granted by default or role, make sure it is.
1717
if ((oldFlags & FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0
1818
|| (oldFlags & FLAG_PERMISSION_GRANTED_BY_ROLE) != 0

Patches/LineageOS-20.0/android_frameworks_base/0013-Special_Permissions-2.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,10 +67,10 @@ index 2091c0502b6f..4c45fdc4de44 100644
6767
<string name="capability_title_canRetrieveWindowContent">Retrieve window content</string>
6868
<!-- Description for the capability of an accessibility service to retrieve window content. -->
6969
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
70-
index b1de8d8a5830..6ea489ce05b6 100644
70+
index 9fd704ac7d44..fde265d12bf9 100644
7171
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
7272
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
73-
@@ -2524,7 +2524,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
73+
@@ -2525,7 +2525,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
7474
}
7575

7676
public static boolean isSpecialRuntimePermission(final String permission) {

Patches/LineageOS-20.0/android_frameworks_base/0013-Special_Permissions-3.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,10 @@ index 4c45fdc4de44..e0ca922bf686 100644
8686
<string name="permlab_readCalendar">Read calendar events and details</string>
8787
<!-- Description of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
8888
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
89-
index 6ea489ce05b6..29658387fed4 100644
89+
index fde265d12bf9..f4064d1ab984 100644
9090
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
9191
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
92-
@@ -2524,7 +2524,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
92+
@@ -2525,7 +2525,7 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
9393
}
9494

9595
public static boolean isSpecialRuntimePermission(final String permission) {

Patches/LineageOS-20.0/android_frameworks_base/0039-package_hooks.patch

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ index a9b624653b92..9cac3e75a698 100644
159159
ATTR_ENABLED_CALLER);
160160
final String harmfulAppWarning =
161161
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
162-
index 5d2bb41c4b4d..fae8dc90371a 100644
162+
index 556443b40c3d..ac5aadd45467 100644
163163
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
164164
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerServiceImpl.java
165165
@@ -127,6 +127,7 @@ import com.android.server.LocalServices;
@@ -170,7 +170,7 @@ index 5d2bb41c4b4d..fae8dc90371a 100644
170170
import com.android.server.pm.ApexManager;
171171
import com.android.server.pm.KnownPackages;
172172
import com.android.server.pm.UserManagerInternal;
173-
@@ -1363,6 +1364,13 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
173+
@@ -1364,6 +1365,13 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
174174
isRolePermission = permission.isRole();
175175
isSoftRestrictedPermission = permission.isSoftRestricted();
176176
}
@@ -184,7 +184,7 @@ index 5d2bb41c4b4d..fae8dc90371a 100644
184184
final boolean mayGrantRolePermission = isRolePermission
185185
&& mayManageRolePermission(callingUid);
186186
final boolean mayGrantSoftRestrictedPermission = isSoftRestrictedPermission
187-
@@ -2982,6 +2990,11 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
187+
@@ -2983,6 +2991,11 @@ public class PermissionManagerServiceImpl implements PermissionManagerServiceInt
188188
Slog.wtf(LOG_TAG, "Unknown permission protection " + bp.getProtection()
189189
+ " for permission " + bp.getName());
190190
}

Patches/LineageOS-20.0/android_packages_apps_Updater/0002-Tor_Support.patch

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -376,18 +376,18 @@ index 774d1be..8a01e3d 100644
376376
android:id="@+id/preferences_auto_delete_updates"
377377
android:layout_width="match_parent"
378378
diff --git a/app/src/main/res/values/strings.xml b/app/src/main/res/values/strings.xml
379-
index 8c64dca..6b78e39 100644
379+
index 0303481..46bb291 100644
380380
--- a/app/src/main/res/values/strings.xml
381381
+++ b/app/src/main/res/values/strings.xml
382-
@@ -59,6 +59,7 @@
382+
@@ -68,6 +68,7 @@
383383
<string name="menu_auto_updates_check_interval_weekly">Once a week</string>
384384
<string name="menu_auto_updates_check_interval_monthly">Once a month</string>
385385
<string name="menu_auto_updates_check_interval_never">Never</string>
386386
+ <string name="menu_onion_routing">Perform requests over Tor</string>
387387
<string name="menu_auto_delete_updates">Delete updates when installed</string>
388388
<string name="menu_delete_update">Delete</string>
389389
<string name="menu_copy_url">Copy URL</string>
390-
@@ -76,6 +77,7 @@
390+
@@ -85,6 +86,7 @@
391391
<string name="snack_download_failed">The download failed. Please check your internet connection and try again later.</string>
392392
<string name="snack_download_verification_failed">The update verification failed.</string>
393393
<string name="snack_download_verified">Download completed.</string>

0 commit comments

Comments
 (0)