aboutsummaryrefslogtreecommitdiff
path: root/en
diff options
context:
space:
mode:
authorAndroid Partner Docs <noreply@android.com>2018-01-29 12:09:36 -0800
committerClay Murphy <claym@google.com>2018-01-29 15:45:26 -0800
commit69671f4acd61fdc756f5503288be56c3fa00d017 (patch)
tree4d370da035a066f3e8ca8512f5f28fae5452888b /en
parent1b3f9d16a9b8d5e069b5f5c43af1fbc731b4a18d (diff)
downloadsource.android.com-69671f4acd61fdc756f5503288be56c3fa00d017.tar.gz
Docs: Changes to source.android.com
- 183705100 Move CVE-2017-13225 from the Android public bulletin to t... by Android Partner Docs <noreply@android.com> - 183689692 Fix references to patches, add direct links to them by Clay Murphy <claym@google.com> - 183669179 Devsite localized content from translation request b3ea6a... by Android Partner Docs <noreply@android.com> - 183341488 Devsite localized content from translation request b89a83... by Android Partner Docs <noreply@android.com> - 183267044 Devsite localized content from translation request dc7035... by Android Partner Docs <noreply@android.com> - 183267033 Devsite localized content from translation request 3e98f2... by Android Partner Docs <noreply@android.com> - 183186837 Devsite localized content from translation request abc2ba... by Android Partner Docs <noreply@android.com> - 183119625 Devsite localized content from translation request 0e9220... by Android Partner Docs <noreply@android.com> - 183119585 Devsite localized content from translation request 8603a0... by Android Partner Docs <noreply@android.com> - 183119485 Devsite localized content from translation request d5f27b... by Android Partner Docs <noreply@android.com> - 182963525 Add DEX const-method-handle and const-method-type, update... by Clay Murphy <claym@google.com> - 182894798 Update the DEX bytecode list by Android Partner Docs <noreply@android.com> - 182861804 Update for EMR builds. by Android Partner Docs <noreply@android.com> PiperOrigin-RevId: 183705100 Change-Id: I5bc9a987212a5c1917cfb4561af644c226c08405
Diffstat (limited to 'en')
-rw-r--r--en/_index.yaml15
-rw-r--r--en/devices/tech/dalvik/dalvik-bytecode.html55
-rw-r--r--en/devices/tech/dalvik/instruction-formats.html6
-rw-r--r--en/devices/tech/display/widgets-shortcuts.html8
-rw-r--r--en/security/bulletin/2018-01-01.html36
-rw-r--r--en/security/bulletin/pixel/2018-01-01.html30
-rw-r--r--en/setup/build-numbers.html12
7 files changed, 99 insertions, 63 deletions
diff --git a/en/_index.yaml b/en/_index.yaml
index 00e5133b..3f4fab67 100644
--- a/en/_index.yaml
+++ b/en/_index.yaml
@@ -73,6 +73,14 @@ landing_page:
image_path: /images/android_stack.png
- heading: News
items:
+ - heading: ART DEX bytecode improvements
+ description: >
+ Android runtime (ART) now includes bytecode documentation for
+ <code>const-method-handle</code> and <code>const-method-type</code>, as
+ well as updates to <code>invoke-polymorphic</code>.
+ buttons:
+ - label: January 19th, 2018
+ path: /devices/tech/dalvik/dalvik-bytecode
- heading: January Security Bulletins
description: >
The January 2018 Android and Pixel/Nexus Security Bulletins have been
@@ -87,13 +95,6 @@ landing_page:
buttons:
- label: December 5th, 2017
path: /setup/site-updates#Dec-2017
- - heading: HIDL Reference Updates
- description: >
- The reference materials for the HAL Interface Description Language
- (HIDL) have been updated to reflect the Android 8.1 release.
- buttons:
- - label: December 5th. 2017
- path: /reference/hidl/
- classname: devsite-landing-row-100 tf-row-centered
items:
- buttons:
diff --git a/en/devices/tech/dalvik/dalvik-bytecode.html b/en/devices/tech/dalvik/dalvik-bytecode.html
index 5861452f..8e18c0e8 100644
--- a/en/devices/tech/dalvik/dalvik-bytecode.html
+++ b/en/devices/tech/dalvik/dalvik-bytecode.html
@@ -6,7 +6,7 @@
</head>
<body>
<!--
- Copyright 2017 The Android Open Source Project
+ Copyright 2018 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
@@ -1021,24 +1021,25 @@
<td>fa 45cc</td>
<td>invoke-polymorphic {vC, vD, vE, vF, vG}, meth@BBBB, proto@HHHH</td>
<td>
- <code>A:</code> argument word count (4 bits) </br>
- <code>B:</code> method reference index (16 bits) </br>
- <code>C:</code> method handle reference to invoke (16 bits) </br>
- <code>D..G:</code> argument registers (4 bits each) </br>
- <code>H:</code> prototype reference index (16 bits) </br>
+ <code>A:</code> argument word count (4 bits) <br/>
+ <code>B:</code> method reference index (16 bits) <br/>
+ <code>C:</code> receiver (16 bits) <br/>
+ <code>D..G:</code> argument registers (4 bits each) <br/>
+ <code>H:</code> prototype reference index (16 bits)
</td>
<td>
- Invoke the indicated method handle. The result (if any) may be stored
+ Invoke the indicated signature polymorphic method. The result (if any) may be stored
with an appropriate <code>move-result*</code> variant as the immediately
subsequent instruction.
- <p> The method reference must be to <code>java.lang.invoke.MethodHandle.invoke</code>
- or <code>java.lang.invoke.MethodHandle.invokeExact</code>.
+ <p> The method reference must be to a signature polymorphic method, such as
+ <code>java.lang.invoke.MethodHandle.invoke</code> or
+ <code>java.lang.invoke.MethodHandle.invokeExact</code>.
+ <p> The receiver must be an object supporting the signature polymorphic method being invoked.
<p> The prototype reference describes the argument types provided
and the expected return type.
<p> The <code>invoke-polymorphic</code> bytecode may raise exceptions when it
executes. The exceptions are described in the API documentation
- for <code>java.lang.invoke.MethodHandle.invoke</code> and
- <code>java.lang.invoke.MethodHandle.invokeExact</code>.
+ for the signature polymorphic method being invoked.
<p> Present in Dex files from version <code>038</code> onwards.
</td>
</tr>
@@ -1046,10 +1047,10 @@
<td>fb 4rcc</td>
<td>invoke-polymorphic/range {vCCCC .. vNNNN}, meth@BBBB, proto@HHHH</td>
<td>
- <code>A:</code> argument word count (8 bits) </br>
- <code>B:</code> method reference index (16 bits) </br>
- <code>C:</code> method handle reference to invoke (16 bits) </br>
- <code>H:</code> prototype reference index (16 bits) </br>
+ <code>A:</code> argument word count (8 bits) <br/>
+ <code>B:</code> method reference index (16 bits) <br/>
+ <code>C:</code> receiver (16 bits) <br/>
+ <code>H:</code> prototype reference index (16 bits) <br/>
<code>N = A + C - 1</code>
</td>
<td>
@@ -1118,10 +1119,26 @@
</td>
</tr>
<tr>
- <td>fe..ff 10x</td>
- <td><i>(unused)</i></td>
- <td>&nbsp;</td>
- <td><i>(unused)</i></td>
+ <td>fe 21c</td>
+ <td>const-method-handle vAA, method_handle@BBBB</td>
+ <td><code>A:</code> destination register (8 bits)<br/>
+ <code>B:</code> method handle index (16 bits)</td>
+ <td>
+ Move a reference to the method handle specified by the given index into the
+ specified register.
+ <p> Present in Dex files from version <code>039</code> onwards.
+ </td>
+</tr>
+<tr>
+ <td>ff 21c</td>
+ <td>const-method-type vAA, proto@BBBB</td>
+ <td><code>A:</code> destination register (8 bits)<br/>
+ <code>B:</code> method prototype reference (16 bits)</td>
+ <td>
+ Move a reference to the method prototype specified by the given index into the
+ specified register.
+ <p> Present in Dex files from version <code>039</code> onwards.
+ </td>
</tr>
</tbody>
</table>
diff --git a/en/devices/tech/dalvik/instruction-formats.html b/en/devices/tech/dalvik/instruction-formats.html
index ab30d8a2..746be50e 100644
--- a/en/devices/tech/dalvik/instruction-formats.html
+++ b/en/devices/tech/dalvik/instruction-formats.html
@@ -6,7 +6,7 @@
</head>
<body>
<!--
- Copyright 2017 The Android Open Source Project
+ Copyright 2018 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
@@ -291,10 +291,14 @@ the correspondence.</p>
<td>21c</td>
<td><i><code>op</code></i> vAA, type@BBBB<br/>
<i><code>op</code></i> vAA, field@BBBB<br/>
+ <i><code>op</code></i> vAA, method_handle@BBBB<br/>
+ <i><code>op</code></i> vAA, proto@BBBB<br/>
<i><code>op</code></i> vAA, string@BBBB
</td>
<td>check-cast<br/>
const-class<br/>
+ const-method-handle<br/>
+ const-method-type<br/>
const-string
</td>
</tr>
diff --git a/en/devices/tech/display/widgets-shortcuts.html b/en/devices/tech/display/widgets-shortcuts.html
index ac152384..9364e915 100644
--- a/en/devices/tech/display/widgets-shortcuts.html
+++ b/en/devices/tech/display/widgets-shortcuts.html
@@ -72,11 +72,11 @@
(<code>packages/apps/Launcher3</code>) as reference.
</p>
<p>
- Relevant Launcher3 changes:
+ Find the relevant Launcher3 changes in the Android Open Source Project (AOSP):
</p>
<ul>
- <li>Change-Id: I664366822fe8088742faff2cce006239ab0771bc
- <li>Change-Id: I905532ba44a8898c9c17476f9f75bc309eeb7b41
+ <li>Change-Id: <a href="https://android.googlesource.com/platform/packages/apps/Launcher3/+/8b2002e28072c52d78f6d052c6ff6da50a2d0324">8b2002e28072c52d78f6d052c6ff6da50a2d0324</a>
+ <li>Change-Id: <a href="https://android.googlesource.com/platform/packages/apps/Launcher3/+/278359539c02ca160caf1df54ce96053a2a2ef59">278359539c02ca160caf1df54ce96053a2a2ef59</a>
</ul>
<h2 id="validation">Validation</h2>
<p>
@@ -86,5 +86,3 @@
</p>
</body>
</html>
-
-
diff --git a/en/security/bulletin/2018-01-01.html b/en/security/bulletin/2018-01-01.html
index ee037f11..5ee8ee9a 100644
--- a/en/security/bulletin/2018-01-01.html
+++ b/en/security/bulletin/2018-01-01.html
@@ -20,7 +20,7 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
-<p><em>Published January 2, 2018 | Updated January 5, 2018</em></p>
+<p><em>Published January 2, 2018 | Updated January 29, 2018</em></p>
<p>
The Android Security Bulletin contains details of security vulnerabilities
@@ -492,35 +492,6 @@ process.</p>
</table>
-<h3 id="mediatek-components">MediaTek components</h3>
-<p>The most severe vulnerability in this section could enable a local malicious
-application to execute arbitrary code within the context of a privileged
-process.</p>
-
-<table>
- <col width="17%">
- <col width="19%">
- <col width="9%">
- <col width="14%">
- <col width="39%">
- <tr>
- <th>CVE</th>
- <th>References</th>
- <th>Type</th>
- <th>Severity</th>
- <th>Component</th>
- </tr>
- <tr>
- <td>CVE-2017-13225</td>
- <td>A-38308024<a href="#asterisk">*</a><br />
- M-ALPS03495789</td>
- <td>EoP</td>
- <td>High</td>
- <td>MTK Media</td>
- </tr>
-</table>
-
-
<h3 id="nvidia-components">NVIDIA components</h3>
<p>The most severe vulnerability in this section could enable a local malicious
application to execute arbitrary code within the context of a privileged
@@ -833,5 +804,10 @@ security bulletins.
<td>January 5, 2018</td>
<td>Bulletin revised to include AOSP links.</td>
</tr>
+ <tr>
+ <td>1.3</td>
+ <td>January 29, 2018</td>
+ <td>CVE-2017-13225 moved to <a href="/security/bulletin/pixel/">Pixel / Nexus
+ Security Bulletin</a>.</td>
</table>
</body></html>
diff --git a/en/security/bulletin/pixel/2018-01-01.html b/en/security/bulletin/pixel/2018-01-01.html
index 4c6dd4a4..e956aba6 100644
--- a/en/security/bulletin/pixel/2018-01-01.html
+++ b/en/security/bulletin/pixel/2018-01-01.html
@@ -20,7 +20,7 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
-<p><em>Published January 2, 2018 | Updated January 5, 2018</em></p>
+<p><em>Published January 2, 2018 | Updated January 29, 2018</em></p>
<p>
The Pixel&hairsp;/&hairsp;Nexus Security Bulletin contains details of security
@@ -446,6 +446,29 @@ Upstream kernel</a></td>
<th>Component</th>
</tr>
<tr>
+ <td>CVE-2017-13225</td>
+ <td>A-38308024<a href="#asterisk">*</a><br />
+ M-ALPS03495789</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>MTK Media</td>
+ </tr>
+</table>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
<td>CVE-2017-13226</td>
<td>A-32591194<a href="#asterisk">*</a><br />
M-ALPS03149184</td>
@@ -788,6 +811,11 @@ bulletin, are not required for declaring a security patch level.
<td>January 5, 2018</td>
<td>Bulletin revised to include AOSP links.</td>
</tr>
+ <tr>
+ <td>1.2</td>
+ <td>January 29, 2018</td>
+ <td>Added CVE-2017-13225.</td>
+ </tr>
</table>
</body></html>
diff --git a/en/setup/build-numbers.html b/en/setup/build-numbers.html
index 5f2d08c9..2054199f 100644
--- a/en/setup/build-numbers.html
+++ b/en/setup/build-numbers.html
@@ -213,6 +213,18 @@ site:</p>
</thead>
<tbody>
<tr>
+ <td>OPM5.171019.014</td>
+ <td>android-8.1.0_r9</td>
+ <td>Oreo</td>
+ <td>Nexus 5X, Nexus 6P</td>
+ </tr>
+ <tr>
+ <td>OPM2.171019.016</td>
+ <td>android-8.1.0_r8</td>
+ <td>Oreo</td>
+ <td>Pixel 2</td>
+ </tr>
+ <tr>
<td>OPM3.171019.013</td>
<td>android-8.1.0_r7</td>
<td>Oreo</td>