Tad
4282c7c35f
Backports of 0f4044e2
to 17.1/18.1/19.1
...
Also don't grant any special location permissions
Signed-off-by: Tad <tad@spotco.us>
2023-07-03 15:17:56 -04:00
Tad
5146f67cee
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2023-06-18 07:34:03 -04:00
Tad
41e2669884
17.1: switch to flamefire's ASB topics
...
This gets us ~9 extra patches
Signed-off-by: Tad <tad@spotco.us>
2023-06-17 15:13:46 -04:00
Tad
8c7f3daa00
15.1+16.0 June ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2023-06-10 05:16:45 -04:00
Tad
67dd049bf6
17.1 June ASB work
...
Note: 358555 is prone to mismerge
Signed-off-by: Tad <tad@spotco.us>
2023-06-09 23:42:54 -04:00
Tad
ffe020a7a0
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2023-06-07 18:01:35 -04:00
Tad
11d228c7c3
Switch CensurfriDNS to anycast domain
...
Signed-off-by: Tad <tad@spotco.us>
2023-06-05 15:47:21 -04:00
Tad
6fb0a581c3
15.1 and 16.0 May ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2023-05-07 21:28:27 -04:00
Tad
8503986acb
17.1 May ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2023-05-07 14:29:54 -04:00
Tad
e7d8f7598b
17.1 extra backports, credit @Flamefire
...
Includes 2 extra patches from
https://github.com/Flamefire/android_device_sony_lilac/tree/lineage-17.1/patches/asb-2023-04
Santiy checked patches against
https://github.com/Flamefire/android_device_sony_lilac/tree/lineage-17.1/patches/asb-2023-03
Signed-off-by: Tad <tad@spotco.us>
2023-04-29 11:17:21 -04:00
Tad
ab4eceb830
17.1 April ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2023-04-28 17:17:54 -04:00
Tad
aad60b7567
Promotions
...
16.0 santoni/land to 20.0 Mi8937 unified
17.1 griffin to 18.1
17.1 star*/crownlte to 20.0
20.0 add pro1x
Signed-off-by: Tad <tad@spotco.us>
2023-04-17 21:36:49 -04:00
Tad
2cc87c4dc7
Switch fingerprint locked to 5 attempts instead of 3 + churn
...
Signed-off-by: Tad <tad@spotco.us>
2023-04-12 15:26:26 -04:00
Tad
750f244304
Updates, logging, and churn
...
also add an extra March ASB patch for 17.1
Signed-off-by: Tad <tad@spotco.us>
2023-03-31 12:38:46 -04:00
Tad
9039ae3ed1
17 extra March patch
...
Signed-off-by: Tad <tad@spotco.us>
2023-03-28 23:42:28 -04:00
Tad
44fa294eca
17.1 March ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2023-03-21 15:01:12 -04:00
Tad
62b2318078
Backports + Picks
...
Signed-off-by: Tad <tad@spotco.us>
2023-02-11 19:20:28 -05:00
Tad
a96d2221cd
Fix off-by one
...
Signed-off-by: Tad <tad@spotco.us>
2023-01-22 00:09:02 -05:00
Tad
ad466bd3e4
Various changes
...
- 17.1: Add more captive portal server options like 18.1+, disabled: needs fixes
- 17.1: Add the hosts toggle like 18.1+
- 18.1: fix junk in patch
- 17.1+: hosts toggle: bugfix: fixup localhost handling by switching to strcmp
- 15.1: fixes to get hmalloc to compile, does NOT boot
Signed-off-by: Tad <tad@spotco.us>
2023-01-20 18:59:02 -05:00
Tad
57d951ccb5
Missing patches for 16.0 + Churn
...
Signed-off-by: Tad <tad@spotco.us>
2023-01-08 13:22:50 -05:00
Tad
10c1d825c2
Revert e10d4b17
...
17.1 is plagued with the same issue, no reason to use it
Signed-off-by: Tad <tad@spotco.us>
2023-01-07 11:17:21 -05:00
Tad
e10d4b1799
17.1: restore m8
...
18.1 has some display artifacting issues and hangs
Signed-off-by: Tad <tad@spotco.us>
2022-12-28 14:38:05 -05:00
Tad
06254708be
Many fixes to get bluejay booting & working proper
...
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-25 13:21:37 -05:00
Tad
b5bc269743
SBC dualchannel picks
...
Signed-off-by: Tad <tad@spotco.us>
2022-12-18 21:47:22 -05:00
Tad
abb616d2f3
Updates
...
Signed-off-by: Tad <tad@spotco.us>
2022-12-09 17:23:20 -05:00
Tad
27395374e1
Fixup + Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-11-11 13:54:57 -05:00
Tad
e7968e1269
Picks + Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-10-09 16:35:12 -04:00
Tad
ec42acceb6
Various fixes from GrapheneOS
...
Signed-off-by: Tad <tad@spotco.us>
2022-09-13 10:24:26 -04:00
Tad
e2b314da3c
15.1+16.0: September 2022 ASB picks
...
16.0 backports thanks to MSe1969 as usual:
https://github.com/lin16-microg/android_system_bt/commits/lineage-16.0 - last 3 commits
https://github.com/lin16-microg/android_frameworks_base/commits/lineage-16.0 - last 4 commits
https://github.com/lin16-microg/android_external_expat/commits/lineage-16.0 - last 4 commits
Signed-off-by: Tad <tad@spotco.us>
2022-09-10 18:32:25 -04:00
Tad
65df2c1a53
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-06-12 10:38:06 -04:00
Tad
8a59c7948f
Partially revert 59c28bc0
...
Signed-off-by: Tad <tad@spotco.us>
2022-05-27 23:38:31 -04:00
Tad
05930af014
Various changes
2022-05-14 21:40:50 -04:00
Tad
59c28bc022
Better ensure extra keys are included
...
Signed-off-by: Tad <tad@spotco.us>
2022-05-12 10:15:03 -04:00
Tad
df398fd6f5
Various
...
Signed-off-by: Tad <tad@spotco.us>
2022-05-07 20:22:49 -04:00
Tad
c5b1cc9a35
Simplify 8e3f0438
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-19 20:23:53 -04:00
Tad
8e3f043820
Warn when running activity from 32 bit app on ARM64 devices.
...
https://android-review.googlesource.com/c/platform/frameworks/base/+/2003790/
https://github.com/GrapheneOS/platform_frameworks_base/pull/182
Signed-off-by: Tad <tad@spotco.us>
2022-04-19 12:00:22 -04:00
Tad
be6b03fe96
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-13 14:54:08 -04:00
Tad
42c9d22de9
Default disable exec spawning
...
Change the property too, so it takes effect next update.
Since 16.0 lacks a toggle, this effectively disables the feature for it.
Even devices with 4GB of RAM have usability severely impacted.
Plus some other tweaks/churn
Signed-off-by: Tad <tad@spotco.us>
2022-04-12 17:58:04 -04:00
Tad
d50a3a043b
Switch 16.0/17.1/18.1 to the more robust GrapheneOS sensors permission patchset
...
Like done for 19.1
Signed-off-by: Tad <tad@spotco.us>
2022-04-10 21:12:03 -04:00
Tad
a9e250afd9
Cleanup
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-07 00:37:20 -04:00
Tad
e1f5d99e51
Fixes
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-01 08:16:28 -04:00
Tad
987122f99e
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-01 02:12:34 -04:00
Tad
8dbdc0f31e
Enable Clang's -ftrivial-auto-var-init=zero on 17.1
...
Just like Android 11+
Signed-off-by: Tad <tad@spotco.us>
2022-03-31 22:04:50 -04:00
Tad
f481055ae9
Add the GrapheneOS always randomize MAC option to 17.1 and 18.1
...
The DHCP state patch was backported to 17.1
Signed-off-by: Tad <tad@spotco.us>
2022-03-29 22:27:09 -04:00
Tad
8a03e46c7e
Add the exec-spawning toggle from GrapheneOS
...
Tested working on 18.1/klte
TODO: backport to 16.0
Signed-off-by: Tad <tad@spotco.us>
2022-03-28 16:14:37 -04:00
Tad
a53062ca0b
Backports
...
Adds ptrace_scope and timeout options to 17.1, tested working
Also adds hardened_malloc to 15.1, but failing to compile:
external/hardened_malloc/h_malloc.c:1688:18: error: use of undeclared identifier 'M_PURGE'
if (param == M_PURGE) {
^
external/hardened_malloc/h_malloc.c:1743:30: error: missing field 'ordblks' initializer [-Werror,-Wmissing-field-initializers]
struct mallinfo info = {0};
^
Signed-off-by: Tad <tad@spotco.us>
2022-03-21 18:06:49 -04:00
Tad
c9765fc883
Tweak tweak
...
Signed-off-by: Tad <tad@spotco.us>
2022-03-16 18:38:30 -04:00
Tad
a9f6672fed
hardened_malloc fixes for broken devices
...
- enable the patchset for 18.1
- add an ugly patch that extends the Pixel 3* camera workaround to all camera executables
Signed-off-by: Tad <tad@spotco.us>
2022-03-16 02:01:19 -04:00
Tad
1df7c7f1d4
Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-03-15 19:16:19 -04:00
Tad
181519cf38
Add bionic hardening patchsets from GrapheneOS
...
11 b3a0c2c5db
11 5412c37195
#explicit zero
11 31456ac632
#brk
11 58ebc243ea
#random
11 5323b39f7e
#undefined
11 6a91d9dddb
#merge
11 a042b5a0ba
#vla formatting
11 9ec639de1b
#pthread
11 49571a0a49
#read only
11 149cc5ccb8
#zero
11 2e613ccbe7
#fork mmap
11 e239c7dff8
#memprot pthread
11 0b03d92b7f
#xor
11 de08419b82
#junk
11 897d4903e2
#guard
11 648cd68ca3
#ptrhread guard
11 0bc4dbcbd2
#stack rand
10 aa9cc05d07
10 a8cdbb6352
#explicit zero
10 b28302c668
#brk
10 9f8be7d07c
#random
10 cb91a7ee3a
#undefined
10 08279e2fdd
#merge
10 6a18bd565d
#vla formatting
10 2f392c2d08
#pthread
10 8bbce1bc50
#read only
10 725f61db82
#zero
10 4cd257135f
#fork mmap
10 9220cf622b
#memprot pthread
10 8ef71d1ffd
#memprot exit
10 0eaef1abbd
#xor
10 64f1cc2148
#junk
10 5c42a527cf
#guard
10 5cc8c34e60
#pthread guard
10 7f61cc8a1c
#stack rand
9 abdf523d26
9 e4b9b31e6f
#explicit zero
9 a3a22a63d2
#brk
9 7444dbc3cf
#random
9 dcd3b72ac9
#undefined
9 543e1df342
#merge
9 611e5691f7
#vla formatting
9 8de97ce864
#pthread
9 a475717042
#read only
9 7f0947cc0e
#zero
9 e9751d3370
#fork mmap
9 83cd86d0d5
#memprot pthread
9 1ebb165455
#memprot exit
9 488ba483cf
#xor
9 f9351d884b
#junk
9 85e5bca0a5
#move
Signed-off-by: Tad <tad@spotco.us>
2022-03-15 16:56:46 -04:00
Tad
209481c53e
Fix/Add exec based spawning patchsets from GrapheneOS
...
11 14c3c1d4cd
ac1943345e
1abb805041
2e07ab8c24
0044836677
c561811fad
7a848373ef
89646bdeb1
2a70bbac4a
d414dcaa35
b4cd877e3a
98634286bb
11 4c2635390c
11 add34a4bc6
11 a2b51906de
10 527787f3c8
ffde474ad7
aa87e487c4
c906fe9722
c69c3eecd4
b2303adccc
5bb05db6f7
536b497688
24802a832b
ce6dcc2368
3d3d5c4d38
2eda592b79
10 29f28b53c0
10 13a992c716
9 750efbf6bc
ed563b6f26
aad3c7d750
da3180f9a8
68773a29b7
283b3fa09c
f133136b65
01a01ce5f6
17c309c098
8806ec3ef1
Signed-off-by: Tad <tad@spotco.us>
2022-03-15 15:55:13 -04:00
Tad
f015dd348f
Add the JNINativeMethod table constification patchsets from GrapheneOS
...
11 63b9f96a12
11 d8a62b5156
11 e3a4d64f29
11 e41f1d7f8e
11 c34b037486
11 dce2d0f64f
11 c99c35cb2a
10 07071814db
10 a48ba29b98
10 157fa78115
10 b914409e05
10 20a51f508b
10 b8afb8af37
10 e1b6653db7
9 ff688b68a7
9 866f0df315
9 77c9fa981a
9 fbf620e59c
9 ceaf63c790
9 253247fc39
9 76bf4c46f0
Signed-off-by: Tad <tad@spotco.us>
2022-03-15 15:26:48 -04:00
Tad
07bd5a3a0e
Automatic reboot and Bluetooth/Wi-Fi shutoff from GrapheneOS and CalyxOS
...
Closes https://github.com/Divested-Mobile/DivestOS-Build/issues/59
Tested on 18.1
Untested on 17.1
Signed-off-by: Tad <tad@spotco.us>
2022-03-15 01:27:08 -04:00
Tad
de764885b3
Fixup
...
Signed-off-by: Tad <tad@spotco.us>
2022-03-08 12:56:52 -05:00
Tad
bda848a0a1
Fixup 057bedb6
...
Sadly this means the option was never enabled :(
Note: these options are only available on 4.4+ kernels
Signed-off-by: Tad <tad@spotco.us>
2022-03-06 23:05:13 -05:00
Tad
9a6c3f99ed
Verify authorship and Change-Id of all contained patches
...
- No patches were found with incorrect authorship/From: lines
- The older AndroidHardening patch repos are no longer available to verify CID.
- New GrapheneOS patches do not include a CID.
- *Signature_Spoofing.patch CID could not be found.
- Fixed CID of *Harden_Sig_Spoofing.patch to match 14.1
- Fixed CID of *LGE_Fixes.patch to match 14.1
- Fixed CID of *Harden.patch to match 14.1
- Added edit note to *Harden.patch
- Fixed CID of *PREREQ_Handle_All_Modes.patch to match 14.1
- Fixed CID of *More_Preferred_Network_Modes.patch to match 14.1
- Fixed CID of *AES256.patch to match 14.1
- Fixed CID of *0001-OTA_Keys.patch to match 18.1
- Fixed CID of *Camera_Fix.patch to match 15.1
- Fixed CID of *Connectivity.patch to match 14.1
- Fixed CID of *Fix_Calling.patch to match 14.1
- Fixed CID of *Remove_Analytics.patch to match 14.1
- Fixed CID of Unused-*.patch/audio_extn to match original
Signed-off-by: Tad <tad@spotco.us>
2022-03-05 13:13:30 -05:00
Tad
bbdfcdc2a2
Tiny fix
...
Signed-off-by: Tad <tad@spotco.us>
2022-02-26 11:47:52 -05:00
Tad
5e1521700f
Port the GrapheneOS NETWORK permission to 17.1 and 18.1
...
Some patches were ported from 12 to 10/11
Some patches from 11 were ported to 10
This 10/11 port should be very close to 12
BOUNS: 16.0 patches, disabled
Signed-off-by: Tad <tad@spotco.us>
2022-02-25 16:52:51 -05:00
Tad
8a45dc4696
18.1: Device additions
...
h910
lavender
pioneer, voyager, discovery
akari, aurora, xz2c
Signed-off-by: Tad <tad@spotco.us>
2022-01-06 21:04:17 -05:00
Tad
8b3beeb9fd
More analytics disablement
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 23:24:03 -05:00
Tad
ee1f466211
Fixup
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 18:16:42 -05:00
Tad
2c1d8d5e78
Hamper analytics improvements
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 17:35:53 -05:00
Tad
20e1023627
Small changes
...
- 16.0: drop wallpaper optimization patch, questionable source
- deblobber: don't remove libmmparser_lite.so, potentially used by camera
- 17.1: pick Q_asb_2021-12, excluding a broken patch
- clark 17.1: some camera denial fixes
- alioth: unmark broken
- 17.1: switch to upstream glibc fix
- 17.1/18.1: disable per app sensors permission patchset, potential camera issues
Signed-off-by: Tad <tad@spotco.us>
2021-12-13 20:28:54 -05:00
Tad
f2b9eb8e8b
Small tweaks
...
Signed-off-by: Tad <tad@spotco.us>
2021-11-06 11:22:43 -04:00
Tad
fdd549ee98
16.0: add kccat6 and lentislte
...
Signed-off-by: Tad <tad@spotco.us>
2021-11-05 14:16:18 -04:00
Tad
ecc4688ce0
Denial fixes for clark, osprey, surnia, and g3-common
...
Signed-off-by: Tad <tad@spotco.us>
2021-10-28 00:47:59 -04:00
Tad
0c793835da
Expand the available Private DNS options
...
Signed-off-by: Tad <tad@spotco.us>
2021-10-22 18:33:06 -04:00
Tad
fe8e8201a9
Add more 'Private DNS' options
...
Based off of patches from CalyxOS as noted in each included patch.
Tested and verified working on klte and mata 18.1
Signed-off-by: Tad <tad@spotco.us>
2021-10-21 23:39:46 -04:00
Tad
4ce35a3c60
Refresh most branch specific patches
...
Fixed up:
LineageOS-16.0/android_packages_apps_Backgrounds/308977.patch
LineageOS-16.0/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
LineageOS-17.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
Must review again:
LineageOS-14.1/android_packages_apps_PackageInstaller/64d8b44.patch
Signed-off-by: Tad <tad@spotco.us>
2021-10-16 15:19:55 -04:00
Tad
c6df37ca23
Expose the Sensors Off tile
...
This removes the hidden development 'Sensors off' tile from Settings app,
adds it back to SystemUI, and enables it by default.
Tested working on 18.1
Signed-off-by: Tad <tad@spotco.us>
2021-09-26 16:36:15 -04:00
Tad
84c7d230ab
Permission for sensors access patches from @MSe1969
...
Signed-off-by: Tad <tad@spotco.us>
2021-09-24 23:35:33 -04:00
Tad
a9f44dee41
Fix hamper analytics patches
...
These must all be strings.
Sadly meant this likely hasn't worked for years.
:\
Signed-off-by: Tad <tad@spotco.us>
2021-09-13 15:27:29 -04:00
Tad
bdccb5fb39
Hamper ad_personalization_signals
...
Signed-off-by: Tad <tad@spotco.us>
2021-08-27 13:46:11 -04:00
Tad
27d55efdff
Hamper ssaid collection
...
Signed-off-by: Tad <tad@spotco.us>
2021-08-27 13:41:57 -04:00
Tad
c2b2aa5830
16.0+: Add captive portal toggle from @MSe1969
...
Source:
0045a97cb4
b483b4e9ab
18.1 is the 17.1 patch rebased
Wording was altered.
Already included in 14.1+15.1
2021-07-10 22:48:45 -04:00
Tad
ef8573b29c
Small fixes
2021-06-26 22:59:46 -04:00
Tad
881c24d8b2
Various patches from GrapheneOS
2021-06-26 18:57:46 -04:00
Tad
94b91c6afd
Incall privacy warning from CalyxOS
2021-06-08 12:11:13 -04:00
Tad
f3e672fb18
Failed attempt at fixing signing
...
PRODUCT_OTA_PUBLIC_KEYS is meant to be set by a vendor tree, something
we don't use.
Override it at the source and set it explicitely as well.
This ensures that the compiled recovery.img and the one generated by
sign_target_files_apks.py includes the real public keys for verification.
11.0 signing is ignored.
This will need to be extensively tested as breakage can mean brick on locked
devices.
Although in failure cases it seems test-keys are accepted.
--
After much testing there appears to be a deeper issue with how keys
are inserted into the recovery and handled
2021-04-06 04:07:18 -04:00
Tad
553299c409
Small updates
2021-02-08 18:49:01 -05:00
Tad
820c637f20
Move many old cherry picks in tree for archival/support purposes
2021-02-05 20:00:43 -05:00
Tad
d53a4f4e41
Update CVE patchers
...
- Drop tcp_sack=0 sysctl, as most devices are now patched
2020-10-12 18:38:07 -04:00
Tad
46c1a74ef3
17.1: Fixup TTS
2020-09-25 11:38:26 -04:00
Tad
a9812ba729
17.1: Rebase microG patches
2020-09-24 08:02:27 -04:00
Tad
bca6af1516
Small updates
...
- recovery: abort on serial number specific updates, credit: GrapheneOS
- Add lists of missing CVEs
- Update cherrypicks
2020-09-02 14:20:51 -04:00
Tad
b2b9eb7ffc
Potential fix for phone call audio on shamu and others
2020-06-17 15:20:02 -04:00
Tad
694f270d75
Initial bringup of many devices to 17.1
2020-05-31 15:10:32 -04:00
Tad
31d6ab5299
Update CVE patchers
2020-05-28 23:06:53 -04:00
Tad
7af3c42325
Minor fixes
2020-05-23 23:31:05 -04:00
Tad
4c1577724f
Small changes
...
- hardenDefconfig: more options from Alexander Popov's checker
- 17.1: A2DP fix from GrapheneOS when hardened_malloc is in use
2020-05-23 18:06:22 -04:00
Tad
7343973b1d
Minor updates
...
- Update cherrypicks
- 17.1: mata fix usb
- 16.0: whitelist open camera for aux support
2020-05-17 10:04:48 -04:00
Tad
f5462dd23c
Minor tweaks
2020-05-13 17:38:39 -04:00
Tad
84300d6611
Small fixes
2020-04-19 13:19:55 -04:00
Tad
98a45b1ee6
Build fixes
2020-04-15 21:38:46 -04:00
Tad
8012903ba1
17.1: Initial bringup
...
- See items marked with '17REBASE'
2020-04-14 21:21:13 -04:00