{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":568518144,"defaultBranch":"lineage-21.0","name":"android_packages_modules_Bluetooth","ownerLogin":"LineageOS","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2022-11-20T19:24:13.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/24304779?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1715387150.0","currentOid":""},"activityList":{"items":[{"before":"e52c1f82f3fad542834500e8b41ac90e9cedf57f","after":"8de6650cdc5a5c84f81d26efb4809f9661d5eee6","ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-11T14:42:17.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r35' into staging/lineage-21.0_merge-android-14.0.0_r35\n\nAndroid 14.0.0 release 35\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZjpriAAKCRDorT+BmrEO\n# eNijAJ4zLdTLuyQJAh43Tw9VOiDN5q5n0ACePzaVwzG/nDtWV0gqrFFeuZ/fEuQ=\n# =Jr3/\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue May 7 20:57:28 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2427 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Łukasz Rymanowski\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r35':\n leaudio: Fix crash on metadata update\n\nChange-Id: Ic13853c0947a1916799a00f7cd0d7849f848fe6a","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r35' into staging/lineage-21.0_merge-androi…"}},{"before":"e7555e287ff033645a141de95b752d299beb4593","after":"e52c1f82f3fad542834500e8b41ac90e9cedf57f","ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-08T20:10:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Reland \"Enforce authentication if encryption is required\"\n\nWhile aosp/2863686 was rebased on internal security\nfixes, aosp/2865187 was dropped, re-apply it.\n\nBug: 316244428\nTest: m com.android.btservices\nFlag: EXEMPT, tested/verfied on internal branches\nChange-Id: I319dcfbc9bb9603c515ac0c2c647155211f95e26","shortMessageHtmlLink":"Reland \"Enforce authentication if encryption is required\""}},{"before":"e40e2bbfba750e7d7cdc811b941acd0687d80c1d","after":"e7555e287ff033645a141de95b752d299beb4593","ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-08T16:37:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"btm_sec: Class of device regression fix\n\nBug: 314889276\nFix: 314889276\nTest: Manual testing cf b/314889276#comment23\nFlag: Exempt, unflag regression fix\nChange-Id: I554c9c7b056bb096d3a9609dafe2d96d134f307c","shortMessageHtmlLink":"btm_sec: Class of device regression fix"}},{"before":"750a0c34c7b8b5deed83a968be6ee528a5b0fee0","after":"e40e2bbfba750e7d7cdc811b941acd0687d80c1d","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-25T23:14:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"[ALPS08619561] Add VSC Cmd for Mediatek chip\n\n[Description]\nAdd VSC cmd for low latency mode\n\nCR-Id: ALPS08619561\n\nBug: 309700239\nTest: m .\nFlag: EXEMPT VSC command\n\nChange-Id: I789b6bddfc6b5661430b399943d1288a7c52e988","shortMessageHtmlLink":"[ALPS08619561] Add VSC Cmd for Mediatek chip"}},{"before":"c4ddad86dd9210dbc513748b6352490daab19be8","after":"750a0c34c7b8b5deed83a968be6ee528a5b0fee0","ref":"refs/heads/lineage-21.0","pushedAt":"2024-03-20T18:45:40.000Z","pushType":"push","commitsCount":10000,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r29' into staging/lineage-21.0_merge-android-14.0.0_r29\n\nAndroid 14.0.0 release 29\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZW6AAKCRDorT+BmrEO\n# eE1qAJ4sCHpfCO6YUFD753R54s23EJ3w4wCfWWcV9Jv7qucmvkp2eMERwXvvzbk=\n# =CWnZ\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Mar 5 01:19:04 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2357 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Chris Manton (274) and others\n# Via Automerger Merge Worker (20005) and others\n* tag 'android-14.0.0_r29': (2405 commits)\n Reland: Fix an OOB write bug in attp_build_value_cmd\n Revert \"Fix an OOB write bug in attp_build_value_cmd\"\n Copy the keys when re-pairing with a new RPA/IRK\n [Invisalign2] Make BTA_DmBleConfigLocalPrivacy synchronous\n Introduce libbt-jni-thread\n DckTest: Move Constants To Companion Object.\n BumbleBluetoothTest: Use Kotlin Mockito\n bt_target:[15/37] IWYU stack::btm\n Clean up logs in btif_dm.cc\n [le audio] remove the ending null bytes in native broadcast code\n bt_target:[7/37] IWYU shim, profile, fuzzer\n BumbleBluetoothTests: Add non-connectable scannable LeScanningTest\n BumbleBluetoothTests: Add non-connectable LeScanningTest\n tBTM_INQUIRY_VAR_ST:INQ [1-9] Use longform stack::btm\n bt_target:[33/37] IWYU bta::csis\n bt_target: [3/37] IWYU bta::sdp\n bt_target:[10/37] IWYU stack::acl\n Add wrapper for LE Multi-codec's HAL functions\n bt_target:[24/37] IWYU stack::test\n bt_target:[6/37] IWYU HCI\n ...\n\n Conflicts:\n\tservice/tests/Android.bp\n\tsystem/hci/include/hci_layer.h\n\nChange-Id: I0cac1f434952c133dc45f8d04e7640bf60edd22e","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r29' into staging/lineage-21.0_merge-androi…"}},{"before":"9dc349d70145e102005539339a9e05da58899b63","after":"57ace2515f722bfb046dcfbf1e5dbce69ea2f520","ref":"refs/heads/lineage-20.0","pushedAt":"2024-03-16T14:06:12.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r15' into staging/lineage-20.0_android-security-13.0.0_r15\n\nAndroid security 13.0.0 release 15\n\n* tag 'android-security-13.0.0_r15':\n Fix a security bypass issue in access_secure_service_from_temp_bond\n Reland: Fix an OOB write bug in attp_build_value_cmd\n Revert \"Fix an OOB write bug in attp_build_value_cmd\"\n Fix an OOB write bug in attp_build_value_cmd\n Fix an OOB bug in smp_proc_sec_req\n\nChange-Id: Iff3bafab1f1b523e8d8ca23423a7d57ed7b36d1b","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r15' into staging/lineage-20.0_and…"}},{"before":"52d9495b456a6a47698414da6ec7cc2f35453b62","after":"9dc349d70145e102005539339a9e05da58899b63","ref":"refs/heads/lineage-20.0","pushedAt":"2024-02-15T18:29:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"BondStateMachine: Allow skipping confirm for some remotes\n\nWhen pairing two of the Nvidia Shield accessories, a popup would show up\nstating that the accessory was an incoming pairing request and needs to\nbe accepted. The official Nvidia firmware has a whitelist of remotes\nthat skip this confirmation if pairing request is marked as originating\nfrom the Android device. This change takes a similar approach, but in a\nmore flexible manner. The main intent is to allow these accessories to\nbe paired via the pairing intent, which needs to complete with no user\ninteraction. Previously, the popup would prevent this from succeeding.\n\nChange-Id: Ib5a0226858f5745a20e4cd166500aecdcf1f3354","shortMessageHtmlLink":"BondStateMachine: Allow skipping confirm for some remotes"}},{"before":"1fbadd6b331844f69d711fa43e4ba3dcf8f166d0","after":"c4ddad86dd9210dbc513748b6352490daab19be8","ref":"refs/heads/lineage-21.0","pushedAt":"2024-02-15T18:29:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"BondStateMachine: Allow skipping confirm for some remotes\n\nWhen pairing two of the Nvidia Shield accessories, a popup would show up\nstating that the accessory was an incoming pairing request and needs to\nbe accepted. The official Nvidia firmware has a whitelist of remotes\nthat skip this confirmation if pairing request is marked as originating\nfrom the Android device. This change takes a similar approach, but in a\nmore flexible manner. The main intent is to allow these accessories to\nbe paired via the pairing intent, which needs to complete with no user\ninteraction. Previously, the popup would prevent this from succeeding.\n\nChange-Id: Ib5a0226858f5745a20e4cd166500aecdcf1f3354","shortMessageHtmlLink":"BondStateMachine: Allow skipping confirm for some remotes"}},{"before":"52d9495b456a6a47698414da6ec7cc2f35453b62","after":null,"ref":"refs/heads/lineage-20","pushedAt":"2024-02-14T02:27:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"mikeNG","name":"Michael Bestas","path":"/mikeNG","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1216752?s=80&v=4"}},{"before":"4ab290551e0f6ec8fa8db535437e121c6cfa5749","after":"52d9495b456a6a47698414da6ec7cc2f35453b62","ref":"refs/heads/lineage-20.0","pushedAt":"2024-02-13T12:27:17.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_merge-android-security-13.0.0_r14\n\nAndroid Security 13.0.0 Release 14 (11228180)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcEegAAKCRDorT+BmrEO\n# eGAeAJ93p2eKOzFHdlUK7SOjOnvWAlf2fwCgiWX8yF8+scPfGPqGS+aJV6barb4=\n# =KFY2\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 19:44:32 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2266 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Hui Peng (3) and Mehmet Murat Sevim (1)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r14':\n Revert \"Fix an OOB write bug in attp_build_value_cmd\"\n Fix an OOB write bug in attp_build_value_cmd\n Fix an OOB write bug in attp_build_read_by_type_value_cmd\n Fix an OOB bug in btif_to_bta_response and attp_build_value_cmd\n\nChange-Id: I591610b121758e3da91d226d187d4373a8859798","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_mer…"}},{"before":null,"after":"52d9495b456a6a47698414da6ec7cc2f35453b62","ref":"refs/heads/lineage-20","pushedAt":"2024-02-13T12:25:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_merge-android-security-13.0.0_r14\n\nAndroid Security 13.0.0 Release 14 (11228180)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcEegAAKCRDorT+BmrEO\n# eGAeAJ93p2eKOzFHdlUK7SOjOnvWAlf2fwCgiWX8yF8+scPfGPqGS+aJV6barb4=\n# =KFY2\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 19:44:32 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2266 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Hui Peng (3) and Mehmet Murat Sevim (1)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r14':\n Revert \"Fix an OOB write bug in attp_build_value_cmd\"\n Fix an OOB write bug in attp_build_value_cmd\n Fix an OOB write bug in attp_build_read_by_type_value_cmd\n Fix an OOB bug in btif_to_bta_response and attp_build_value_cmd\n\nChange-Id: I591610b121758e3da91d226d187d4373a8859798","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r14' into staging/lineage-20.0_mer…"}},{"before":"fc82283d8128d2dae7674b73cff173c3522889fc","after":"1fbadd6b331844f69d711fa43e4ba3dcf8f166d0","ref":"refs/heads/lineage-21.0","pushedAt":"2024-02-09T00:41:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bluetooth: Add a workaround for M_RELEASE rsp len in ble_gap.cc\n\nSome devices ship with Bluetooth firmware that advertises\ncompliance with Android M's capabilities but fails certain\nrequirements such as the minimum expected response length.\n\nThis commit introduces an if-else block that allows those devices\nto set a system property to bypass that check, fixing Bluetooth in\ncases where this check is the only thing impeding it from working.\n\nChange-Id: Ibbf81e922fe75bf0ef5b8cd7197c812348063db5","shortMessageHtmlLink":"Bluetooth: Add a workaround for M_RELEASE rsp len in ble_gap.cc"}},{"before":"4a60c8c20a5081907b59482b6e20f77a634b333f","after":"fc82283d8128d2dae7674b73cff173c3522889fc","ref":"refs/heads/lineage-21.0","pushedAt":"2024-02-07T15:47:56.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r25' into staging/lineage-21.0_merge-android-14.0.0_r25\n\nAndroid 14.0.0 Release 25 (UQ1A.240205.004)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZcE4oQAKCRDorT+BmrEO\n# eAEhAJ9wmd/WQKPbnXssMCWbfVWZYl1esQCfVskaqsDrQbHU+VapcyL/bxmRv3U=\n# =D9a8\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Feb 5 21:36:01 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2243 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Hui Peng\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r25':\n Fix an OOB write bug in attp_build_read_by_type_value_cmd\n Fix an OOB bug in btif_to_bta_response and attp_build_value_cmd\n\nChange-Id: I1e42463207383a81e060e744a0ee441a22ae3f03","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r25' into staging/lineage-21.0_merge-androi…"}},{"before":"34f488339b0c72102876b130698e8edc4ee23874","after":"4ab290551e0f6ec8fa8db535437e121c6cfa5749","ref":"refs/heads/lineage-20.0","pushedAt":"2024-01-10T14:23:10.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r13' into staging/lineage-20.0_merge-android-security-13.0.0_r13\n\nAndroid security 13.0.0 release 13\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZZWxiwAKCRDorT+BmrEO\n# eEsCAKCIhbDOn3n9433Ky8Wt+JVu9pW/hwCdH6OZVIWPvDY0ki/lb/0r24B4c4Q=\n# =mV7Z\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Wed Jan 3 21:12:11 2024 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2237 signatures in the past\n# 2 years. Encrypted 4 messages in the past 24 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Brian Delwiche\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r13':\n Fix some OOB errors in BTM parsing\n\nChange-Id: I6cc2374030f1a8b19ad71ecc4bb045385a8aeae5","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r13' into staging/lineage-20.0_mer…"}},{"before":"32d11b6ffb08879682e171751696dcf31da7f08b","after":"4a60c8c20a5081907b59482b6e20f77a634b333f","ref":"refs/heads/lineage-21.0","pushedAt":"2023-12-24T14:49:37.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Fix OPP comparison\n\nisBluetoothShareUri_correctlyCheckUri (under\ncom.android.bluetooth.opp.BluetoothOppUtilityTest) is failing\non null input due to an incorrect comparison in\nisBluetoothShareUri. Change the comparison to one which can\ncope with null input.\n\nBug: 257190999\nTest: atest: BluetoothOppUtilityTest\nTag: #security\nIgnore-AOSP-First: Security\nChange-Id: I61118f22577de7b975fb0df8dac8583e91f7b8c7\n(cherry picked from commit c9b53b958e30e8ec1ac883d02abfb20435076c49)\nMerged-In: I61118f22577de7b975fb0df8dac8583e91f7b8c7\n(cherry picked from commit bbbbdb523e76a588fd82e6379f9879dfa58134ac)\nMerged-In: I61118f22577de7b975fb0df8dac8583e91f7b8c7","shortMessageHtmlLink":"Fix OPP comparison"}},{"before":"bf575573d7fcad9f8967226a8b516b97dfd9d169","after":"34f488339b0c72102876b130698e8edc4ee23874","ref":"refs/heads/lineage-20.0","pushedAt":"2023-12-23T00:28:57.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Fix jni crash when get field of adType\n\nThe type of field 'ad_type' in com.android.bluetooth.gatt.ScanFilterQueue.Entry is int.\n\nTest: Use eng version to verity.\nChange-Id: Ieee0496d790ab14d86439fdadc330540bedd3ebc\nSigned-off-by: weidengke ","shortMessageHtmlLink":"Fix jni crash when get field of adType"}},{"before":"106e1c4814994c0db6a45b2a45d9f285887447f1","after":"bf575573d7fcad9f8967226a8b516b97dfd9d169","ref":"refs/heads/lineage-20.0","pushedAt":"2023-12-11T16:45:01.000Z","pushType":"push","commitsCount":13,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r12' into staging/lineage-20.0_merge-android-security-13.0.0_r12\n\nAndroid Security 13.0.0 Release 12 (10993242)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZW4XzQAKCRDorT+BmrEO\n# eIktAJ9Sb9IJYeNf3DnwNDnxvAlXf6u0zgCfd4S4MhRrFW687L9JkAv/Bsq+t/c=\n# =DUJZ\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Dec 4 20:17:49 2023 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2099 signatures in the past\n# 2 years. Encrypted 4 messages in the past 23 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Hui Peng (8) and Brian Delwiche (3)\n# Via Android Build Coastguard Worker\n* tag 'android-security-13.0.0_r12':\n Fix timing attack in BTM_BleVerifySignature\n Fix UAF in ~CallbackEnv\n Add bounds checks in btif_avrcp_audio_track.cc\n Fix an OOB bug in parse_gap_data\n Factor out duplicate code for parsing gap data\n Enforce authentication if encryption is required\n Reorganize the code for checking auth requirement\n Reject access to secure service authenticated from a temp bonding [3]\n Reject access to secure services authenticated from temp bonding [2]\n Reject access to secure service authenticated from a temp bonding [1]\n Fix multiple OOB bugs in btm_ble_gap.cc\n\nChange-Id: I1c8c715967e8715984ed45ad31c53bd4884f6389","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r12' into staging/lineage-20.0_mer…"}},{"before":"cbb30d721ad3ec9550fc4fbcffd0c94c55e9acb1","after":"32d11b6ffb08879682e171751696dcf31da7f08b","ref":"refs/heads/lineage-21.0","pushedAt":"2023-12-11T01:43:18.000Z","pushType":"push","commitsCount":1959,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r17' into staging/lineage-21.0_merge-android-14.0.0_r17\n\nAndroid 14.0.0 Release 17 (UQ1A.231205.015)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZXDPMwAKCRDorT+BmrEO\n# eEvEAKCOqyyAW/5Xs2qxd9HCTDc3Ww2G7wCgjcUCGUePNwQdzqnndVnfCQm0Xgo=\n# =IeZI\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Wed Dec 6 21:44:51 2023 EET\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2188 signatures in the past\n# 2 years. Encrypted 4 messages in the past 23 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Bill Yi (50) and others\n# Via Automerger Merge Worker (1739) and others\n* tag 'android-14.0.0_r17': (95 commits)\n Fix timing attack in BTM_BleVerifySignature\n Add bounds checks in btif_avrcp_audio_track.cc\n Fix some OOB errors in BTM parsing\n Relax the validation on sdp attr size\n Add validation on attr type and size in a2dp_api.cc\n Add tests for the following change\n Add validation on sdp attrinutes in bta_dm_act.cc\n Add validation in sdp attr type and size in connection_handler.cc\n Add validation on sdp attributes in bta_av_act.cc\n Reland ag/24529645\n Enforce authentication if encryption is required\n Enforce authentication if encryption is required\n Reorganize the code for checking auth requirement\n Reject access to secure service authenticated from a temp bonding [3]\n Reject access to secure services authenticated from temp bonding [2]\n Reject access to secure service authenticated from a temp bonding [1]\n Reorganize the code for checking auth requirement\n Reject access to secure service authenticated from a temp bonding [3]\n Reject access to secure services authenticated from temp bonding [2]\n Reject access to secure service authenticated from a temp bonding [1]\n ...\n\nChange-Id: I461f91ff9e2dd77c0899f441b80da65e75af897f","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r17' into staging/lineage-21.0_merge-androi…"}},{"before":"dec408e09f029328aa684390829c8f309c4e0aaf","after":"106e1c4814994c0db6a45b2a45d9f285887447f1","ref":"refs/heads/lineage-20.0","pushedAt":"2023-10-09T12:53:09.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r10' of https://android.googlesource.com/platform/packages/modules/Bluetooth into staging/lineage-20.0_merge_android-security-13.0.0_r10\n\nAndroid Security 13.0.0 Release 10 (10763433)\n\n* tag 'android-security-13.0.0_r10' of https://android.googlesource.com/platform/packages/modules/Bluetooth:\n Fix an integer underflow in build_read_multi_rsp\n\nChange-Id: Ia4c6ae2a76dac54ba479c3ae935cbb326c037d6c","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r10' of https://android.googlesour…"}},{"before":null,"after":"cbb30d721ad3ec9550fc4fbcffd0c94c55e9acb1","ref":"refs/heads/lineage-21.0","pushedAt":"2023-10-08T19:39:23.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge cherrypicks of ['googleplex-android-review.googlesource.com/24578387'] into udc-release.\n\nChange-Id: Ia92ddd808beafff9d375d6b7e400ed46ef204113","shortMessageHtmlLink":"Merge cherrypicks of ['googleplex-android-review.googlesource.com/245…"}},{"before":"bf9abb234967d49bfd2ba4228ee1483bb73ff314","after":"dec408e09f029328aa684390829c8f309c4e0aaf","ref":"refs/heads/lineage-20.0","pushedAt":"2023-09-25T15:29:25.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r75' into staging/lineage-20.0_merge-android-13.0.0_r75\n\nAndroid 13.0.0 release 75\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZQiSwQAKCRDorT+BmrEO\n# eGN8AJ9HHz8cTWM5IQvCMm9U/b4BoKfrYACeOaKfAfZA5D/firafLuOV0P00bK0=\n# =Nhfn\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon Sep 18 21:11:13 2023 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 1890 signatures in the past\n# 22 months. Encrypted 4 messages in the past 20 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Brian Delwiche (3) and Hui Peng (2)\n# Via Android Build Coastguard Worker\n* tag 'android-13.0.0_r75':\n Fix UAF in gatt_cl.cc\n Fix potential abort in btu_av_act.cc\n Fix integer overflow in build_read_multi_rsp\n Fix an integer overflow bug in avdt_msg_asmbl\n Fix multiple OOB bugs resulted from tx mtu in EATT\n\nChange-Id: I74a79b09d51cedf0f045d53fc59863fc88f12eee","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r75' into staging/lineage-20.0_merge-androi…"}},{"before":"01681e8cc8f736cf5a0a8af3c8a2184d6cb1998d","after":"bf9abb234967d49bfd2ba4228ee1483bb73ff314","ref":"refs/heads/lineage-20.0","pushedAt":"2023-09-18T13:51:46.000Z","pushType":"push","commitsCount":292,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-security-13.0.0_r9' of https://android.googlesource.com/platform/packages/modules/Bluetooth into staging/lineage-20.0_merge_android-security-13.0.0_r9\n\nAndroid security 13.0.0 release 9\n\n* tag 'android-security-13.0.0_r9' of https://android.googlesource.com/platform/packages/modules/Bluetooth:\n Revert \"Fix a type confusion bug in bta_av_setconfig_rej\"\n Fix UAF in gatt_cl.cc\n Fix potential abort in btu_av_act.cc\n Fix integer overflow in build_read_multi_rsp\n Fix an integer overflow bug in avdt_msg_asmbl\n Fix multiple OOB bugs resulted from tx mtu in EATT\n Fix a type confusion bug in bta_av_setconfig_rej\n\nConflicts:\n\tsystem/stack/eatt/eatt.h\n\nChange-Id: I57ee2e6dfcdd786a5c91f87439389a010fcd4dda","shortMessageHtmlLink":"Merge tag 'android-security-13.0.0_r9' of https://android.googlesourc…"}},{"before":"2b932ba1ef8d2cafde548d7efa2c977a21eb0547","after":"01681e8cc8f736cf5a0a8af3c8a2184d6cb1998d","ref":"refs/heads/lineage-20.0","pushedAt":"2023-08-17T18:48:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"btm: allow BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE to be adjustable\n\nSome BCM firmwares shipped with LGE devices will not pass a check involving the BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE capability.\n\nThis commit allows BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE to be adjusted as a workaround for these firmwares.\nThis issue was seen on some v20 and g5 oreo release BCM firmwares and the BCM4358A3_001.004.015.0095.0168_KR_ORC.HCD fw found\non the v20 f800k pie release (lge/elsa_kt_kr/elsa:9/PKQ1.190522.001/20192161159c5)\n\nLog snippet:\n```\n08-14 11:16:52.534 3468 3468 F DEBUG : Abort message: '[FATAL:btm_ble_gap.cc(668)] Check failed: p_vcs_cplt_params->param_len >= BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE.\n```\n\nChange-Id: I1fccfd0f8877bdc878e7a2068f654369b136956e","shortMessageHtmlLink":"btm: allow BTM_VSC_CHIP_CAPABILITY_RSP_LEN_M_RELEASE to be adjustable"}},{"before":"28ebbc5c6120716609a7581129113490dcc79240","after":"2b932ba1ef8d2cafde548d7efa2c977a21eb0547","ref":"refs/heads/lineage-20.0","pushedAt":"2023-07-26T20:59:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"gd: hci: Allow disabling selected local commands\n\nThis allows us to disable selected commands in case they behave in\nunexpected ways. e.g. bluetooth.hci.disabled_commands=377 will disable\nLE_EXTENDED_CREATE_CONNECTION.\n\nChange-Id: I1fcc624df9fd07200a8406c51772ccb856a4258e","shortMessageHtmlLink":"gd: hci: Allow disabling selected local commands"}},{"before":"ec322f23840deecd15ebb54be4e212f6bfdeab53","after":"28ebbc5c6120716609a7581129113490dcc79240","ref":"refs/heads/lineage-20.0","pushedAt":"2023-06-20T14:25:47.476Z","pushType":"push","commitsCount":646,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r52' into staging/lineage-20.0_merge-android-13.0.0_r52\n\nAndroid 13.0.0 Release 52 (TQ3A.230605.012)\n\n* tag 'android-13.0.0_r52': (294 commits)\n disable AT+ANDROID processing for wear\n Revert \"Handle AVDT_SCB_HDL_TC_CLOSE in avdt_scb idle state\"\n Revert \"OPP: Do not trimDatabase if ContentProvider doesn't exist\"\n Import translations. DO NOT MERGE ANYWHERE\n RESTRICT AUTOMERGE: Move BMW Carkit(9c:df:03) into IOP table to only use AVRCP 1.3 from 1.4 to resolve interop issues.\n Fix OOB read in btm_ble_periodic_av_sync_lost\n Revert \"Fix a test in BluetoothOppLauncherActivityTest\"\n Fix gatt_end_operation buffer overflow\n Fix a OOB bug in bta_hh_co_get_rpt_rsp\n [BluetoothMetrics] Adding dependent changes for direct LE-ACL L2CAP fixed channel\n BluetoothMetrics: Upload readable sha256, instead of bytes\n BluetoothMetrics: Add fallback solution for device names\n [BluetoothMetrics] This covers the case for Direct LE-ACL Connection Success Rate as per go/bluetooth-le-connection-metrics.\n [RESTRICT AUTOMERGE] Fix potential use after free in pan_api.cc\n [RESTRICT AUTOMERGE] Validate buffer length in sdpu_build_uuid_seq\n Revert \"Revert \"Validate buffer length in sdpu_build_uuid_seq\"\"\n LE Audio: close GATT server properly\n Only initiate Codec Negotation if locally supported.\n Fix null pointer access in handle_rc_ctrl_features\n Only add br_edr to power mode db\n ...\n\n Conflicts:\n\tandroid/app/src/com/android/bluetooth/map/BluetoothMapContentObserver.java\n\tandroid/app/src/com/android/bluetooth/map/BluetoothMapUtils.java\n\tframework/tests/unit/Android.bp\n\tsystem/bta/dm/bta_dm_act.cc\n\tsystem/device/include/interop_database.h\n\nChange-Id: I1ef387fdca7fd2e79c6fb06925ad9923714595dc","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r52' into staging/lineage-20.0_merge-androi…"}},{"before":"957b6985fce30f54da5879a06b2a953317c8be0a","after":"ec322f23840deecd15ebb54be4e212f6bfdeab53","ref":"refs/heads/lineage-20.0","pushedAt":"2023-05-04T18:41:10.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r43' into staging/lineage-20.0_merge-android-13.0.0_r43\n\nAndroid 13.0.0 release 43\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZFABmAAKCRDorT+BmrEO\n# eGOIAKCHf+/I/K1ZPzxEPtla8Qvl70qrVACfduSiJbqisbXbh7g10KpYXg+USYA=\n# =CNtH\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Mon May 1 21:14:48 2023 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 1659 signatures in the past\n# 18 months. Encrypted 4 messages in the past 15 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Brian Delwiche\n# Via Android Build Coastguard Worker\n* tag 'android-13.0.0_r43':\n Reject encryption drop in Common Criteria mode\n\nChange-Id: I920f6b1a029a786b546783d7d0e67df8aa6a48a7","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r43' into staging/lineage-20.0_merge-androi…"}},{"before":"765595a93e4ba840d866f9dda9a58aaa26999b5a","after":"957b6985fce30f54da5879a06b2a953317c8be0a","ref":"refs/heads/lineage-20.0","pushedAt":"2023-04-17T23:13:33.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Add system properties to config audio codec priority\n\nAdd and get audio codec priorities from properties below\nbluetooth.a2dp.source.sbc_priority.config\nbluetooth.a2dp.source.aac_priority.config\nbluetooth.a2dp.source.aptx_priority.config\nbluetooth.a2dp.source.aptx_hd_priority.config\nbluetooth.a2dp.source.ldac_priority.config\nbluetooth.a2dp.source.lc3_priority.config\n\nBug: 270032693\nTest: manually test in local build\nChange-Id: Ia0aa8bdf03cb66b3d2957dee24a27669651eb123","shortMessageHtmlLink":"Add system properties to config audio codec priority"}},{"before":"c05bc8c8b092128d078e1a4df5b66c8cfde78984","after":"765595a93e4ba840d866f9dda9a58aaa26999b5a","ref":"refs/heads/lineage-20.0","pushedAt":"2023-04-16T17:31:30.000Z","pushType":"push","commitsCount":8,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-13.0.0_r41' into staging/lineage-20.0_merge-android-13.0.0_r41\n\nAndroid 13.0.0 Release 41 (TQ2A.230405.003.E1)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZDSEtQAKCRDorT+BmrEO\n# eHylAJwI0WPS2jAUao6m7Zkya53OIi5j2wCfZTkFaZkL/ICOm763Heo9xAIcSog=\n# =19gF\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Apr 11 00:50:45 2023 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 1648 signatures in the past\n# 17 months. Encrypted 4 messages in the past 15 months.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Hui Peng (4) and Rahul Arya (2)\n# Via Android Build Coastguard Worker\n* tag 'android-13.0.0_r41':\n Disable Database Hash read for Eero devices\n Fix an OOB bug in register_notification_rsp\n Reset BTA conn_id on close\n Add regression test for b/254774758\n Add mocking support for now function in AttributionProcessor\n Fix a use-after-free bug in AttributionProcessor::OnWakelockReleased\n\nChange-Id: Ia53a7318c11789bfbcc78a448c1ff8dc9648a372","shortMessageHtmlLink":"Merge tag 'android-13.0.0_r41' into staging/lineage-20.0_merge-androi…"}},{"before":"4ced7fa2e1b9dbcbb6a8ad71cc507611ba08f428","after":"c05bc8c8b092128d078e1a4df5b66c8cfde78984","ref":"refs/heads/lineage-20.0","pushedAt":"2023-03-20T20:52:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Add property to disable APCF extended features\n\n* It's broken on some legacy devices, rendering Bluetooth crashing\n\nChange-Id: I4b1764b7551150e78dd8e2dfc99a6472c1293c2b","shortMessageHtmlLink":"Add property to disable APCF extended features"}},{"before":"47fc991d6eee862b21326bbe93192e08566afb7d","after":"4ced7fa2e1b9dbcbb6a8ad71cc507611ba08f428","ref":"refs/heads/lineage-20.0","pushedAt":"2023-03-19T14:25:47.000Z","pushType":"push","commitsCount":1121,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! bluetooth: abandon app local certificate\n\nChange-Id: Ibd89408568b969394f2fad2239e20ae5a5ea8e0a","shortMessageHtmlLink":"fixup! bluetooth: abandon app local certificate"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAER0h2ngA","startCursor":null,"endCursor":null}},"title":"Activity · LineageOS/android_packages_modules_Bluetooth"}