16.0: add land and santoni

Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
Tad 2021-10-28 17:40:56 -04:00
parent ecc4688ce0
commit a9f445ad47
33 changed files with 387 additions and 93 deletions

View file

@ -122,6 +122,3 @@ index 1ea4ac1a3..c86fbdaea 100644
static constexpr MallocDispatch __libc_malloc_default_dispatch
__attribute__((unused)) = {
--
2.31.1

View file

@ -37,6 +37,3 @@ index db5792b8..25df53a3 100644
}
if (metadata["ota-type"] != "AB") {
--
2.31.1

View file

@ -47,6 +47,3 @@ index ea1f5c03..6fa29b39 100644
GRSurface* ic_back;
GRSurface* ic_back_sel;
--
2.31.1

View file

@ -40,6 +40,3 @@ index 2c3f21f1db..a300efbcf5 100644
PRODUCT_DEX_PREOPT_DEFAULT_COMPILER_FILTER := \
$(strip $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_DEX_PREOPT_DEFAULT_COMPILER_FILTER))
PRODUCT_DEX_PREOPT_DEFAULT_FLAGS := \
--
2.31.1

View file

@ -21,6 +21,3 @@ index d570ccda8e..b200572d32 100644
+ my_cflags += -fwrapv
+ endif
+endif
--
2.31.1

View file

@ -51,6 +51,3 @@ index de970352e..17c11f8b1 100644
if Bool(sanitize.Properties.Sanitize.Diag.Undefined) {
diagSanitizers = append(diagSanitizers, "undefined")
}
--
2.31.1

View file

@ -29,6 +29,3 @@ index ed7babb..9c1f086 100755
r_dir_file(mediaserver, sysfs_esoc)
#allow mediaserver system_app_data_file:file rw_file_perms;
--
2.31.1

View file

@ -34,6 +34,3 @@ index e0c2d2dc6dde..85a669a4a6c1 100644
}
String name = sa.getNonConfigurationString(
--
2.31.1

View file

@ -28,6 +28,3 @@ index 8f1692a24d27..fd4703094780 100644
// Check if this is a secondary process that should be incorporated into some
// currently active instrumentation. (Note we do this AFTER all of the profiling
--
2.31.1

View file

@ -29,6 +29,3 @@ index 1ae59cbea452..0b8231b16693 100644
}
}
--
2.31.1

View file

@ -21,6 +21,3 @@ index 44eff665db9d..c924effe6933 100644
<!-- Physical hardware -->
<uses-permission android:name="android.permission.MANAGE_USB" />
<uses-permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS" />
--
2.31.1

View file

@ -246,6 +246,3 @@ index 95ba50246db0..a6cf19f9be8a 100644
if (DEBUG) Slog.d(TAG, "startOperation: allowing code " + code + " uid " + uid
+ " package " + resolvedPackageName);
if (op.startNesting == 0) {
--
2.31.1

View file

@ -1,4 +1,4 @@
From 99006a7ceb6cec2e5d54c9ed25c470c809e56157 Mon Sep 17 00:00:00 2001
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Tad <tad@spotco.us>
Date: Thu, 21 Oct 2021 20:54:37 -0400
Subject: [PATCH] Add more 'Private DNS' options
@ -21,7 +21,7 @@ Change-Id: Id75a774ce1ed109a83c6a5bf512536c643165d71
2 files changed, 170 insertions(+)
diff --git a/core/java/android/net/ConnectivityManager.java b/core/java/android/net/ConnectivityManager.java
index c5cb1f5b7cf8..e74637792128 100644
index c5cb1f5b7cf8..bcd253836663 100644
--- a/core/java/android/net/ConnectivityManager.java
+++ b/core/java/android/net/ConnectivityManager.java
@@ -688,6 +688,58 @@ public class ConnectivityManager {
@ -226,6 +226,3 @@ index c0beb37577fc..97efcd8ff49d 100644
return new PrivateDnsConfig(useTls);
}
--
2.31.1

View file

@ -154,6 +154,3 @@ index 1c3e943543..142c5a274e 100644
return true;
}
--
2.31.1

View file

@ -99,6 +99,3 @@ index 2d5b798..b0de83b 100644
+ return BitmapFactory.decodeResource(res, resId, options);
+ }
}
--
2.31.1

View file

@ -181,6 +181,3 @@ index 269b72111..ea45c9015 100644
<item name="android:navigationBarColor">@android:color/transparent</item>
<item name="android:windowDrawsSystemBarBackgrounds">true</item>
</style>
--
2.31.1

View file

@ -138,6 +138,3 @@ index 6833cfe..d06175e 100644
<ListPreference
android:key="sms_security_check_limit"
android:defaultValue="30"
--
2.31.1

View file

@ -338,6 +338,3 @@ index 89bf5f4dec..4af55e2b50 100644
@Override
public void showMobilePlanMessageDialog() {
showDialog(MANAGE_MOBILE_PLAN_DIALOG_ID);
--
2.31.1

View file

@ -198,6 +198,3 @@ index eeb1b2d302..8c8d2283ba 100644
};
/**
--
2.31.1

View file

@ -31,6 +31,3 @@ index 2f210435e8..4f01ceabda 100644
if (icon == null) {
Log.e(TAG, "Failed to retrieve icon for permission: " + perm);
} else {
--
2.31.1

View file

@ -1,4 +1,4 @@
From 145b7b0e4d1c0016906110a1cdde90408ae630eb Mon Sep 17 00:00:00 2001
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Tad <tad@spotco.us>
Date: Thu, 21 Oct 2021 21:09:38 -0400
Subject: [PATCH] Add more 'Private DNS' options
@ -123,10 +123,10 @@ index 652bc63ae3..6106900318 100644
android:id="@+id/private_dns_mode_opportunistic"
android:text="@string/private_dns_mode_opportunistic"
diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml
index 7d0b80d3c0..eea0f5a219 100644
index 1150011970..23e6f595d1 100644
--- a/res/values/cm_strings.xml
+++ b/res/values/cm_strings.xml
@@ -337,6 +337,21 @@
@@ -342,6 +342,21 @@
<string name="unlock_scramble_pin_layout_title">Scramble layout</string>
<string name="unlock_scramble_pin_layout_summary">Scramble PIN layout when unlocking device</string>
@ -239,7 +239,7 @@ index 290ffd599e..a37b535660 100644
mMode = PRIVATE_DNS_MODE_OPPORTUNISTIC;
break;
diff --git a/src/com/android/settings/network/PrivateDnsPreferenceController.java b/src/com/android/settings/network/PrivateDnsPreferenceController.java
index 6f38569673..956e16a826 100644
index 6f38569673..d24f9563f5 100644
--- a/src/com/android/settings/network/PrivateDnsPreferenceController.java
+++ b/src/com/android/settings/network/PrivateDnsPreferenceController.java
@@ -17,6 +17,19 @@
@ -321,6 +321,3 @@ index 6f38569673..956e16a826 100644
case PRIVATE_DNS_MODE_OPPORTUNISTIC:
// TODO (b/79122154) : create a string specifically for this, instead of
// hijacking a string from notifications. This is necessary at this time
--
2.31.1

View file

@ -182,6 +182,3 @@ index 1a9318d..e362841 100644
public static final String DISABLE_NAV_KEYS = "disable_nav_keys";
public static final String KEY_BUTTON_BACKLIGHT = "pre_navbar_button_backlight";
public static final String KEY_PRIVACY_GUARD = "privacy_guard_default";
--
2.31.1

View file

@ -31,6 +31,3 @@ index eed4d56..f7f62e4 100644
}
public static String getUpgradeBlockedURL(Context context) {
--
2.31.1

View file

@ -380,6 +380,3 @@ index f7f62e4..95b9acc 100644
return server + "?base=LineageOS&device=" + device + "&inc=" + incrementalVersion;
}
--
2.31.1

View file

@ -136,6 +136,3 @@ index f128f9a98..36b65e77c 100644
}
@Override
--
2.31.1

View file

@ -257,6 +257,3 @@ index 36b65e77c..968ec96bc 100644
} else {
mButtonEnabledNetworks.setSummary(R.string.network_global);
}
--
2.31.1

View file

@ -53,6 +53,3 @@ index 9ad628b4e..4ed148857 100644
write /proc/sys/kernel/randomize_va_space 2
write /proc/sys/vm/mmap_min_addr 32768
write /proc/sys/net/ipv4/ping_group_range "0 2147483647"
--
2.31.1

View file

@ -64,6 +64,3 @@ index 95b67a1c..35bd1663 100644
LOG(ERROR) << "Failed to find matching encryption policy for " << directory;
return false;
}
--
2.31.1