Skip to content
Snippets Groups Projects
  1. Feb 11, 2024
    • AShiningRay's avatar
      Bluetooth: Add a workaround for M_RELEASE rsp len in ble_gap.cc · 28427e8f
      AShiningRay authored
      
      Some devices ship with Bluetooth firmware that advertises
      compliance with Android M's capabilities but fails certain
      requirements such as the minimum expected response length.
      
      This commit introduces an if-else block that allows those devices
      to set a system property to bypass that check, fixing Bluetooth in
      cases where this check is the only thing impeding it from working.
      
      Change-Id: Ibbf81e922fe75bf0ef5b8cd7197c812348063db5
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      28427e8f
    • Ido Ben-Hur's avatar
      Bluetooth: Preserve APM_ENHANCEMENT on boot · 6cfe58bb
      Ido Ben-Hur authored
      
      Allows the user to set & preserve this value
      Use the config value as the default only
      
      Change-Id: I61a5278d351c5a297cbaf7c24f59331705a32884
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      6cfe58bb
    • Oliver Scott's avatar
      BluetoothManagerService: check if bluetooth is in airplane mode radios before disabling · c776240a
      Oliver Scott authored
      
      Test: adb shell settings put global airplane_mode_radios cell,wifi,nfc,wimax and then enable airplane mode
      Change-Id: I52d4223144a8dcf4ac454614df181155bda88b37
      (cherry picked from commit a3a13a26a46342bacd994b0a639f96f26a88ad8b)
      Signed-off-by: default avatarPranav Vashi <neobuddy89@gmail.com>
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      c776240a
    • Oliver Scott's avatar
      fixup! Bluetooth timeout feature · 948ddfef
      Oliver Scott authored
      
      Change-Id: Ie1cce8bdfbbcc7f4cea01d322cb7bde2156c60d7
      Signed-off-by: default avatarPranav Vashi <neobuddy89@gmail.com>
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      948ddfef
    • Oliver Scott's avatar
      Bluetooth timeout feature · 16fc3a7f
      Oliver Scott authored
      
      Add a bluetooth timeout setting and listen to changes to it as well as
      the bluetooth radio and connection state. Schedule an alarm to turn bluetooth
      off if it is enabled but not connected
      
      Issue: calyxos#124
      Change-Id: I4f4646139cd42b7ad20b486ed77dd00499aa3c6e
      (cherry picked from commit 28da7976f4643c1b9c49edcefc8f620aeaa06ae2)
      
      Issue: calyxos#830
      Change-Id: I5133909a030b5bb940707320420a26d8e1eb4852
      
      Alarm listener must not be a local variable
      
      Issue: calyxos#1050
      Change-Id: Ibb00c13ffe0fa5811c4fbd451acb8fa25fa58813
      
      Use AOSP Settings for BLUETOOTH_OFF_TIMEOUT
      
      This APEX module is not able to access LineageSettings, so the setting
      is moved back to AOSP.
      
      Change-Id: I887cc3cea6c7f59523680d1141f91727086e143e
      Signed-off-by: default avatarPranav Vashi <neobuddy89@gmail.com>
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      16fc3a7f
    • Oliver Scott's avatar
      BluetoothManagerService: allow bluetooth auto-enable if not in airplane mode radios · 8bd9f09a
      Oliver Scott authored
      
      Test: adb shell settings put global airplane_mode_radios cell,wifi,nfc,wimax and then enable airplane mode and reboot
      Change-Id: If4323c52ef315e6288412ce166d97690f435f496
      (cherry picked from commit 46d8532765b97c3accb6e403eb3494e00d45e766)
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      8bd9f09a
    • Brian Delwiche's avatar
      Fix OPP comparison · d8dd5c16
      Brian Delwiche authored
      
      isBluetoothShareUri_correctlyCheckUri (under
      com.android.bluetooth.opp.BluetoothOppUtilityTest) is failing
      on null input due to an incorrect comparison in
      isBluetoothShareUri.  Change the comparison to one which can
      cope with null input.
      
      Bug: 257190999
      Test: atest: BluetoothOppUtilityTest
      Tag: #security
      Ignore-AOSP-First: Security
      Change-Id: I61118f22577de7b975fb0df8dac8583e91f7b8c7
      (cherry picked from commit c9b53b95)
      Merged-In: I61118f22577de7b975fb0df8dac8583e91f7b8c7
      (cherry picked from commit bbbbdb52)
      Merged-In: I61118f22577de7b975fb0df8dac8583e91f7b8c7
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      d8dd5c16
    • Geel's avatar
      btm: allow BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE to be adjustable · cfbe0dc1
      Geel authored
      
      Some BCM firmwares shipped with LGE devices will not pass a check involving the BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE capability.
      
      This commit allows BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE to be adjusted as a workaround for these firmwares.
      This issue was seen on some v20 and g5 oreo release BCM firmwares and the BCM4358A3_001.004.015.0095.0168_KR_ORC.HCD fw found
      on the v20 f800k pie release (lge/elsa_kt_kr/elsa:9/PKQ1.190522.001/20192161159c5)
      
      Log snippet:
      ```
      08-14 11:16:52.534  3468  3468 F DEBUG   : Abort message: '[FATAL:btm_ble_gap.cc(668)] Check failed: p_vcs_cplt_params->param_len >= BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE.
      ```
      
      Change-Id: I1fccfd0f8877bdc878e7a2068f654369b136956e
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      cfbe0dc1
    • SamarV-121's avatar
      gd: hci: Allow disabling erroneous data reporting · 3443f14a
      SamarV-121 authored
      
      Certain devices may assert support for it, yet they may not genuinely possess it, resulting in a crash of the entire Bluetooth stack.
      
      Change-Id: I5d0d90b107ddcbfd99eaccc178146333eb3bd6f8
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      3443f14a
    • someone5678's avatar
      Add .gitignore · f1297fc7
      someone5678 authored
      
      * Add .gitignore so don't mess up with this repo's commit history
      
      Change-Id: I2514890c64350a3f344f58b6fc6b9995b9d4ec32
      Signed-off-by: default avatarsomeone5678 <nemui3353@gmail.com>
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      f1297fc7
    • Peter Cai's avatar
      audio_hal_interface: Optionally use sysbta HAL · 81843b0d
      Peter Cai authored
      
      Required to support sysbta, our system-side bt audio implementation.
      
      Change-Id: I59973e6ec84c5923be8a7c67b36b2e237f000860
      Signed-off-by: default avatarNishant Kumar <www.rajsonu13@gmail.com>
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      81843b0d
    • LuK1337's avatar
      gd: hci: Allow disabling selected local commands · 0e319642
      LuK1337 authored
      
      This allows us to disable selected commands in case they behave in
      unexpected ways. e.g. bluetooth.hci.disabled_commands=377 will disable
      LE_EXTENDED_CREATE_CONNECTION.
      
      Change-Id: I1fcc624df9fd07200a8406c51772ccb856a4258e
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      0e319642
    • me-cafebabe's avatar
      Add property to disable APCF extended features · fcb0f763
      me-cafebabe authored
      
      * It's broken on some legacy devices, rendering Bluetooth crashing
      
      Change-Id: I4b1764b7551150e78dd8e2dfc99a6472c1293c2b
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      fcb0f763
    • Peter Cai's avatar
      gd: hci: Ignore unexpected status events · f6074e7c
      Peter Cai authored
      
      For some reason, on some old devices, the controller will report a
      remote to support SNIFF_SUBRATING even when it does not. Just ignore the
      error here (the status event comes from the failure response).
      
      Change-Id: Ifb9a65fd77f21d15a8dc1ced9240194d38218ef6
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      f6074e7c
    • Christian Hoffmann's avatar
      legacy: Split header for hci legacy definitions · 95c1f77e
      Christian Hoffmann authored
      
      * To expose to c legacy hals
      * Like hardware/realtek/rtkbt.
      
      Change-Id: Ic67f9697b032b66a8af364ed41e90d51dc75dd6f
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      95c1f77e
    • Ji Luo's avatar
      bluetooth: abandon app local certificate · 5a3f3e27
      Ji Luo authored
      
      bluetooth app is signed with local certificate ':com.android.bluetooth.certificate'
      which is located at 'android/app/certs/*' and is aligned with the certificate in
      'build/target/product/security'. However, some vendors may specify their own
      certificates path by 'PRODUCT_DEFAULT_DEV_CERTIFICATE' and generate their own
      release bluetooth certificates, bluetooth app will fail to load in such scenario
      because of the certificate doesn't match and cause selinux error:
        ...
        E SELinux : seapp_context_lookup:  No match for app with uid 1002, seinfo default, name com.android.bluetooth
        E SELinux : selinux_android_setcontext:  Error setting context for app with uid 1002, seinfo default:privapp:targetSdkVersion=33:complete: Success
        ...
      
      This CL use the certificate name 'bluetooth' so the app can be signed with the
      same certificate which is located at 'PRODUCT_DEFAULT_DEV_CERTIFICATE/*'.
      
      Test: Bluetooth on&off.
      
      Signed-off-by: default avatarJi Luo <ji.luo@nxp.com>
      Change-Id: I286aed5a3b895272f5ffc077ecd1d76351e02af7
      Signed-off-by: default avatarHeroBuxx <me@herobuxx.me>
      5a3f3e27
  2. Dec 15, 2023
  3. Oct 12, 2023
  4. Oct 11, 2023
Loading