History log of /frameworks/base/core/java/android/bluetooth/BluetoothPbapClient.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
0146463d70355592da85c3605aaaef4cf0b7335e 17-Aug-2017 Jack He <siyuanh@google.com> Bluetooth: Thread-safe binder invocation

* Binder object may become null between null check and actual invocation
if using a instance private variable assignable by service connection
callbacks
* The solution to this problem without locking is to assign existing
binder variable to a local final variable before the null check
* Any further invocation to a disconnected binder object will result in
RemoteException that is caught by the try-catch block
* Read and write to volatile variable is always atomic and hence thread-safe
* Removed unnecessary synchronization in BluetoothAdapter constructor
* Private mConnection objects should be final
* Simplfied several return statements where booleans can be returned
directly
* Removed unnecessary catches for NPE since there won't be any

Bug: 64724692
Test: make, pair and use devices, no functional change
Change-Id: Ifc9d6337c0d451a01484b61243230725d5314f8e
(cherry picked from commit 16eeac356c68f3674677169b618774718ec982b2)
/frameworks/base/core/java/android/bluetooth/BluetoothPbapClient.java
0a17db1cc5942ea000ca87bb72853de57a15ec64 04-Nov-2016 Jeff Sharkey <jsharkey@android.com> Detect non-oneway calls leaving system_server.

To protect system stability, any Binder calls leaving the
system_server must carefully be performed using FLAG_ONEWAY (or
the 'oneway' verb in AIDL) which prevents the call from blocking
indefinitely on the remote process.

In this CL, the system_server uses the new Binder.setWarnOnBlocking()
method to enable detection by default for all remote Binder
interfaces. It can also use Binder.allowBlocking() to allow
blocking calls on certain remote interfaces that have been
determined to be safe.

This CL adds the 'oneway' verb to several interfaces and methods
where it should have been added, and marks a handful of system
ContentProviders as being safe to call into. Also, we assume that
any services obtained from ServiceManager are part of the core
OS, and are okay to make blocking calls to.

Test: builds, boots, runs with minimal logs triggered
Bug: 32715088
Change-Id: Ide476e120cb40436a94b7faf7615c943d691f4c0
/frameworks/base/core/java/android/bluetooth/BluetoothPbapClient.java
563c700f7025d2f792a52b7483725b3d58eaa7a6 21-Mar-2016 Joseph Pirozzo <pirozzoj@google.com> PBAP client Settings profile.

Add content to Settings and SettingsLib to add a checkbox for PBAP
client profile, and remove the box for PBAP server profile when the
client profile is enabled.

Bug: 27642222
Change-Id: I125559904a8e017a01ae90b1f6425129a87cbee3
/frameworks/base/core/java/android/bluetooth/BluetoothPbapClient.java
cfa8a6469463ace9c3336e3686d950792a2c7ad4 04-Mar-2016 Joseph Pirozzo <pirozzoj@google.com> Add BluetoothProfile for PBAP PCE role.

Create a new Bluetooth profile for Pbap Client.

Bug: 27490041
Change-Id: I77d2c7eeeb8e955ea61386d784b02b14f415b318
/frameworks/base/core/java/android/bluetooth/BluetoothPbapClient.java