diff options
author | Android Partner Docs <noreply@android.com> | 2018-01-29 12:09:36 -0800 |
---|---|---|
committer | Clay Murphy <claym@google.com> | 2018-01-29 15:45:26 -0800 |
commit | 69671f4acd61fdc756f5503288be56c3fa00d017 (patch) | |
tree | 4d370da035a066f3e8ca8512f5f28fae5452888b /en | |
parent | 1b3f9d16a9b8d5e069b5f5c43af1fbc731b4a18d (diff) | |
download | source.android.com-69671f4acd61fdc756f5503288be56c3fa00d017.tar.gz |
Docs: Changes to source.android.com
- 183705100 Move CVE-2017-13225 from the Android public bulletin to t... by Android Partner Docs <noreply@android.com>
- 183689692 Fix references to patches, add direct links to them by Clay Murphy <claym@google.com>
- 183669179 Devsite localized content from translation request b3ea6a... by Android Partner Docs <noreply@android.com>
- 183341488 Devsite localized content from translation request b89a83... by Android Partner Docs <noreply@android.com>
- 183267044 Devsite localized content from translation request dc7035... by Android Partner Docs <noreply@android.com>
- 183267033 Devsite localized content from translation request 3e98f2... by Android Partner Docs <noreply@android.com>
- 183186837 Devsite localized content from translation request abc2ba... by Android Partner Docs <noreply@android.com>
- 183119625 Devsite localized content from translation request 0e9220... by Android Partner Docs <noreply@android.com>
- 183119585 Devsite localized content from translation request 8603a0... by Android Partner Docs <noreply@android.com>
- 183119485 Devsite localized content from translation request d5f27b... by Android Partner Docs <noreply@android.com>
- 182963525 Add DEX const-method-handle and const-method-type, update... by Clay Murphy <claym@google.com>
- 182894798 Update the DEX bytecode list by Android Partner Docs <noreply@android.com>
- 182861804 Update for EMR builds. by Android Partner Docs <noreply@android.com>
PiperOrigin-RevId: 183705100
Change-Id: I5bc9a987212a5c1917cfb4561af644c226c08405
Diffstat (limited to 'en')
-rw-r--r-- | en/_index.yaml | 15 | ||||
-rw-r--r-- | en/devices/tech/dalvik/dalvik-bytecode.html | 55 | ||||
-rw-r--r-- | en/devices/tech/dalvik/instruction-formats.html | 6 | ||||
-rw-r--r-- | en/devices/tech/display/widgets-shortcuts.html | 8 | ||||
-rw-r--r-- | en/security/bulletin/2018-01-01.html | 36 | ||||
-rw-r--r-- | en/security/bulletin/pixel/2018-01-01.html | 30 | ||||
-rw-r--r-- | en/setup/build-numbers.html | 12 |
7 files changed, 99 insertions, 63 deletions
diff --git a/en/_index.yaml b/en/_index.yaml index 00e5133b..3f4fab67 100644 --- a/en/_index.yaml +++ b/en/_index.yaml @@ -73,6 +73,14 @@ landing_page: image_path: /images/android_stack.png - heading: News items: + - heading: ART DEX bytecode improvements + description: > + Android runtime (ART) now includes bytecode documentation for + <code>const-method-handle</code> and <code>const-method-type</code>, as + well as updates to <code>invoke-polymorphic</code>. + buttons: + - label: January 19th, 2018 + path: /devices/tech/dalvik/dalvik-bytecode - heading: January Security Bulletins description: > The January 2018 Android and Pixel/Nexus Security Bulletins have been @@ -87,13 +95,6 @@ landing_page: buttons: - label: December 5th, 2017 path: /setup/site-updates#Dec-2017 - - heading: HIDL Reference Updates - description: > - The reference materials for the HAL Interface Description Language - (HIDL) have been updated to reflect the Android 8.1 release. - buttons: - - label: December 5th. 2017 - path: /reference/hidl/ - classname: devsite-landing-row-100 tf-row-centered items: - buttons: diff --git a/en/devices/tech/dalvik/dalvik-bytecode.html b/en/devices/tech/dalvik/dalvik-bytecode.html index 5861452f..8e18c0e8 100644 --- a/en/devices/tech/dalvik/dalvik-bytecode.html +++ b/en/devices/tech/dalvik/dalvik-bytecode.html @@ -6,7 +6,7 @@ </head> <body> <!-- - Copyright 2017 The Android Open Source Project + Copyright 2018 The Android Open Source Project Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. @@ -1021,24 +1021,25 @@ <td>fa 45cc</td> <td>invoke-polymorphic {vC, vD, vE, vF, vG}, meth@BBBB, proto@HHHH</td> <td> - <code>A:</code> argument word count (4 bits) </br> - <code>B:</code> method reference index (16 bits) </br> - <code>C:</code> method handle reference to invoke (16 bits) </br> - <code>D..G:</code> argument registers (4 bits each) </br> - <code>H:</code> prototype reference index (16 bits) </br> + <code>A:</code> argument word count (4 bits) <br/> + <code>B:</code> method reference index (16 bits) <br/> + <code>C:</code> receiver (16 bits) <br/> + <code>D..G:</code> argument registers (4 bits each) <br/> + <code>H:</code> prototype reference index (16 bits) </td> <td> - Invoke the indicated method handle. The result (if any) may be stored + Invoke the indicated signature polymorphic method. The result (if any) may be stored with an appropriate <code>move-result*</code> variant as the immediately subsequent instruction. - <p> The method reference must be to <code>java.lang.invoke.MethodHandle.invoke</code> - or <code>java.lang.invoke.MethodHandle.invokeExact</code>. + <p> The method reference must be to a signature polymorphic method, such as + <code>java.lang.invoke.MethodHandle.invoke</code> or + <code>java.lang.invoke.MethodHandle.invokeExact</code>. + <p> The receiver must be an object supporting the signature polymorphic method being invoked. <p> The prototype reference describes the argument types provided and the expected return type. <p> The <code>invoke-polymorphic</code> bytecode may raise exceptions when it executes. The exceptions are described in the API documentation - for <code>java.lang.invoke.MethodHandle.invoke</code> and - <code>java.lang.invoke.MethodHandle.invokeExact</code>. + for the signature polymorphic method being invoked. <p> Present in Dex files from version <code>038</code> onwards. </td> </tr> @@ -1046,10 +1047,10 @@ <td>fb 4rcc</td> <td>invoke-polymorphic/range {vCCCC .. vNNNN}, meth@BBBB, proto@HHHH</td> <td> - <code>A:</code> argument word count (8 bits) </br> - <code>B:</code> method reference index (16 bits) </br> - <code>C:</code> method handle reference to invoke (16 bits) </br> - <code>H:</code> prototype reference index (16 bits) </br> + <code>A:</code> argument word count (8 bits) <br/> + <code>B:</code> method reference index (16 bits) <br/> + <code>C:</code> receiver (16 bits) <br/> + <code>H:</code> prototype reference index (16 bits) <br/> <code>N = A + C - 1</code> </td> <td> @@ -1118,10 +1119,26 @@ </td> </tr> <tr> - <td>fe..ff 10x</td> - <td><i>(unused)</i></td> - <td> </td> - <td><i>(unused)</i></td> + <td>fe 21c</td> + <td>const-method-handle vAA, method_handle@BBBB</td> + <td><code>A:</code> destination register (8 bits)<br/> + <code>B:</code> method handle index (16 bits)</td> + <td> + Move a reference to the method handle specified by the given index into the + specified register. + <p> Present in Dex files from version <code>039</code> onwards. + </td> +</tr> +<tr> + <td>ff 21c</td> + <td>const-method-type vAA, proto@BBBB</td> + <td><code>A:</code> destination register (8 bits)<br/> + <code>B:</code> method prototype reference (16 bits)</td> + <td> + Move a reference to the method prototype specified by the given index into the + specified register. + <p> Present in Dex files from version <code>039</code> onwards. + </td> </tr> </tbody> </table> diff --git a/en/devices/tech/dalvik/instruction-formats.html b/en/devices/tech/dalvik/instruction-formats.html index ab30d8a2..746be50e 100644 --- a/en/devices/tech/dalvik/instruction-formats.html +++ b/en/devices/tech/dalvik/instruction-formats.html @@ -6,7 +6,7 @@ </head> <body> <!-- - Copyright 2017 The Android Open Source Project + Copyright 2018 The Android Open Source Project Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. @@ -291,10 +291,14 @@ the correspondence.</p> <td>21c</td> <td><i><code>op</code></i> vAA, type@BBBB<br/> <i><code>op</code></i> vAA, field@BBBB<br/> + <i><code>op</code></i> vAA, method_handle@BBBB<br/> + <i><code>op</code></i> vAA, proto@BBBB<br/> <i><code>op</code></i> vAA, string@BBBB </td> <td>check-cast<br/> const-class<br/> + const-method-handle<br/> + const-method-type<br/> const-string </td> </tr> diff --git a/en/devices/tech/display/widgets-shortcuts.html b/en/devices/tech/display/widgets-shortcuts.html index ac152384..9364e915 100644 --- a/en/devices/tech/display/widgets-shortcuts.html +++ b/en/devices/tech/display/widgets-shortcuts.html @@ -72,11 +72,11 @@ (<code>packages/apps/Launcher3</code>) as reference. </p> <p> - Relevant Launcher3 changes: + Find the relevant Launcher3 changes in the Android Open Source Project (AOSP): </p> <ul> - <li>Change-Id: I664366822fe8088742faff2cce006239ab0771bc - <li>Change-Id: I905532ba44a8898c9c17476f9f75bc309eeb7b41 + <li>Change-Id: <a href="https://android.googlesource.com/platform/packages/apps/Launcher3/+/8b2002e28072c52d78f6d052c6ff6da50a2d0324">8b2002e28072c52d78f6d052c6ff6da50a2d0324</a> + <li>Change-Id: <a href="https://android.googlesource.com/platform/packages/apps/Launcher3/+/278359539c02ca160caf1df54ce96053a2a2ef59">278359539c02ca160caf1df54ce96053a2a2ef59</a> </ul> <h2 id="validation">Validation</h2> <p> @@ -86,5 +86,3 @@ </p> </body> </html> - - diff --git a/en/security/bulletin/2018-01-01.html b/en/security/bulletin/2018-01-01.html index ee037f11..5ee8ee9a 100644 --- a/en/security/bulletin/2018-01-01.html +++ b/en/security/bulletin/2018-01-01.html @@ -20,7 +20,7 @@ See the License for the specific language governing permissions and limitations under the License. --> -<p><em>Published January 2, 2018 | Updated January 5, 2018</em></p> +<p><em>Published January 2, 2018 | Updated January 29, 2018</em></p> <p> The Android Security Bulletin contains details of security vulnerabilities @@ -492,35 +492,6 @@ process.</p> </table> -<h3 id="mediatek-components">MediaTek components</h3> -<p>The most severe vulnerability in this section could enable a local malicious -application to execute arbitrary code within the context of a privileged -process.</p> - -<table> - <col width="17%"> - <col width="19%"> - <col width="9%"> - <col width="14%"> - <col width="39%"> - <tr> - <th>CVE</th> - <th>References</th> - <th>Type</th> - <th>Severity</th> - <th>Component</th> - </tr> - <tr> - <td>CVE-2017-13225</td> - <td>A-38308024<a href="#asterisk">*</a><br /> - M-ALPS03495789</td> - <td>EoP</td> - <td>High</td> - <td>MTK Media</td> - </tr> -</table> - - <h3 id="nvidia-components">NVIDIA components</h3> <p>The most severe vulnerability in this section could enable a local malicious application to execute arbitrary code within the context of a privileged @@ -833,5 +804,10 @@ security bulletins. <td>January 5, 2018</td> <td>Bulletin revised to include AOSP links.</td> </tr> + <tr> + <td>1.3</td> + <td>January 29, 2018</td> + <td>CVE-2017-13225 moved to <a href="/security/bulletin/pixel/">Pixel / Nexus + Security Bulletin</a>.</td> </table> </body></html> diff --git a/en/security/bulletin/pixel/2018-01-01.html b/en/security/bulletin/pixel/2018-01-01.html index 4c6dd4a4..e956aba6 100644 --- a/en/security/bulletin/pixel/2018-01-01.html +++ b/en/security/bulletin/pixel/2018-01-01.html @@ -20,7 +20,7 @@ See the License for the specific language governing permissions and limitations under the License. --> -<p><em>Published January 2, 2018 | Updated January 5, 2018</em></p> +<p><em>Published January 2, 2018 | Updated January 29, 2018</em></p> <p> The Pixel / Nexus Security Bulletin contains details of security @@ -446,6 +446,29 @@ Upstream kernel</a></td> <th>Component</th> </tr> <tr> + <td>CVE-2017-13225</td> + <td>A-38308024<a href="#asterisk">*</a><br /> + M-ALPS03495789</td> + <td>EoP</td> + <td>High</td> + <td>MTK Media</td> + </tr> +</table> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> <td>CVE-2017-13226</td> <td>A-32591194<a href="#asterisk">*</a><br /> M-ALPS03149184</td> @@ -788,6 +811,11 @@ bulletin, are not required for declaring a security patch level. <td>January 5, 2018</td> <td>Bulletin revised to include AOSP links.</td> </tr> + <tr> + <td>1.2</td> + <td>January 29, 2018</td> + <td>Added CVE-2017-13225.</td> + </tr> </table> </body></html> diff --git a/en/setup/build-numbers.html b/en/setup/build-numbers.html index 5f2d08c9..2054199f 100644 --- a/en/setup/build-numbers.html +++ b/en/setup/build-numbers.html @@ -213,6 +213,18 @@ site:</p> </thead> <tbody> <tr> + <td>OPM5.171019.014</td> + <td>android-8.1.0_r9</td> + <td>Oreo</td> + <td>Nexus 5X, Nexus 6P</td> + </tr> + <tr> + <td>OPM2.171019.016</td> + <td>android-8.1.0_r8</td> + <td>Oreo</td> + <td>Pixel 2</td> + </tr> + <tr> <td>OPM3.171019.013</td> <td>android-8.1.0_r7</td> <td>Oreo</td> |