Tad
2651f33e5c
ASB cherrypicks
...
Signed-off-by: Tad <tad@spotco.us>
2023-07-07 13:44:00 -04:00
Tad
e7b390d7e6
Picks
...
https://review.lineageos.org/q/topic:%22n-asb-2023-06%22
Signed-off-by: Tad <tad@spotco.us>
2023-06-09 21:59:53 -04:00
Tad
59bda0360e
Fixes
...
Signed-off-by: Tad <tad@spotco.us>
2023-05-30 13:59:28 -04:00
Tad
0004c224cf
Picks
...
Signed-off-by: Tad <tad@spotco.us>
2023-05-06 00:15:27 -04:00
Tad
a3807ca12d
Picks + churn
...
Signed-off-by: Tad <tad@spotco.us>
2023-04-12 20:47:31 -04:00
Tad
ed25b69f5f
Pull in n-asb-2023-04
...
Signed-off-by: Tad <tad@spotco.us>
2023-04-12 15:30:59 -04:00
Tad
750f244304
Updates, logging, and churn
...
also add an extra March ASB patch for 17.1
Signed-off-by: Tad <tad@spotco.us>
2023-03-31 12:38:46 -04:00
Tad
790eeebc90
14/15 extra March patch
...
Signed-off-by: Tad <tad@spotco.us>
2023-03-25 20:35:40 -04:00
Tad
38626e1b0c
Picks + Fixes
...
Signed-off-by: Tad <tad@spotco.us>
2023-03-14 16:58:27 -04:00
Tad
046f35c66c
Picks
...
Signed-off-by: Tad <tad@spotco.us>
2023-02-08 15:00:42 -05:00
Tad
efa31534a9
Picks
...
Signed-off-by: Tad <tad@spotco.us>
2023-01-07 10:52:03 -05:00
Tad
63cbd1f483
14.1 December ASB, thanks to @syphyr
...
Signed-off-by: Tad <tad@spotco.us>
2022-12-10 20:17:48 -05:00
Tad
9d1efb33c3
More 14.1 picks + 15.1 November ASB work
...
Signed-off-by: Tad <tad@spotco.us>
2022-11-13 23:21:41 -05:00
Tad
14f7f1db32
Updates + Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-11-13 02:06:05 -05:00
Tad
8d4d73d65c
Picks
...
Signed-off-by: Tad <tad@spotco.us>
2022-11-09 18:11:48 -05:00
Tad
fe95f700d8
Remove the CNE and DPM blobs + churn
...
Just say no!
Signed-off-by: Tad <tad@spotco.us>
2022-10-12 01:23:45 -04:00
Tad
e7968e1269
Picks + Churn
...
Signed-off-by: Tad <tad@spotco.us>
2022-10-09 16:35:12 -04:00
Tad
202033c013
Pull in old cherrypicks + 5 missing patches from syphyr
...
This adds 3 expat patches for n-asb-2022-09
from https://github.com/syphyr/android_external_expat/commits/cm-14.1
and also applies 2 of them to 15.1
Signed-off-by: Tad <tad@spotco.us>
2022-09-11 14:02:35 -04:00
Tad
59c28bc022
Better ensure extra keys are included
...
Signed-off-by: Tad <tad@spotco.us>
2022-05-12 10:15:03 -04:00
Tad
a9e250afd9
Cleanup
...
Signed-off-by: Tad <tad@spotco.us>
2022-04-07 00:37:20 -04:00
Tad
de764885b3
Fixup
...
Signed-off-by: Tad <tad@spotco.us>
2022-03-08 12:56:52 -05:00
Tad
bda848a0a1
Fixup 057bedb6
...
Sadly this means the option was never enabled :(
Note: these options are only available on 4.4+ kernels
Signed-off-by: Tad <tad@spotco.us>
2022-03-06 23:05:13 -05:00
Tad
9a6c3f99ed
Verify authorship and Change-Id of all contained patches
...
- No patches were found with incorrect authorship/From: lines
- The older AndroidHardening patch repos are no longer available to verify CID.
- New GrapheneOS patches do not include a CID.
- *Signature_Spoofing.patch CID could not be found.
- Fixed CID of *Harden_Sig_Spoofing.patch to match 14.1
- Fixed CID of *LGE_Fixes.patch to match 14.1
- Fixed CID of *Harden.patch to match 14.1
- Added edit note to *Harden.patch
- Fixed CID of *PREREQ_Handle_All_Modes.patch to match 14.1
- Fixed CID of *More_Preferred_Network_Modes.patch to match 14.1
- Fixed CID of *AES256.patch to match 14.1
- Fixed CID of *0001-OTA_Keys.patch to match 18.1
- Fixed CID of *Camera_Fix.patch to match 15.1
- Fixed CID of *Connectivity.patch to match 14.1
- Fixed CID of *Fix_Calling.patch to match 14.1
- Fixed CID of *Remove_Analytics.patch to match 14.1
- Fixed CID of Unused-*.patch/audio_extn to match original
Signed-off-by: Tad <tad@spotco.us>
2022-03-05 13:13:30 -05:00
Tad
bfcf6b18b7
Fixup
...
Signed-off-by: Tad <tad@spotco.us>
2022-01-12 05:57:08 -05:00
Tad
8b3beeb9fd
More analytics disablement
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 23:24:03 -05:00
Tad
ee1f466211
Fixup
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 18:16:42 -05:00
Tad
2c1d8d5e78
Hamper analytics improvements
...
Signed-off-by: Tad <tad@spotco.us>
2021-12-27 17:35:53 -05:00
Tad
621441349e
Fixup the sensors permission patches on 7, 8, and 9.
...
Switch these patches to MODE_ALLOWED from MODE_ASK to fix breakage
of system services.
Also remove some code that adds a likely security issue.
Will need some extra regression testing.
Signed-off-by: Tad <tad@spotco.us>
2021-11-04 10:24:06 -04:00
Tad
b6575a362e
Small tweaks
...
Signed-off-by: Tad <tad@spotco.us>
2021-11-02 22:47:34 -04:00
Tad
042b9063d1
More fixes
...
Signed-off-by: Tad <tad@spotco.us>
2021-10-16 17:12:13 -04:00
Tad
4ce35a3c60
Refresh most branch specific patches
...
Fixed up:
LineageOS-16.0/android_packages_apps_Backgrounds/308977.patch
LineageOS-16.0/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
LineageOS-17.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
Must review again:
LineageOS-14.1/android_packages_apps_PackageInstaller/64d8b44.patch
Signed-off-by: Tad <tad@spotco.us>
2021-10-16 15:19:55 -04:00
Tad
0ac035a48e
Fixup e4a4e7f8
...
Signed-off-by: Tad <tad@spotco.us>
2021-10-06 05:31:40 -04:00
Tad
e4a4e7f8de
Fix BT on apollo/thor
...
Closes https://github.com/Divested-Mobile/DivestOS-Build/issues/16
Signed-off-by: Tad <tad@spotco.us>
2021-10-06 04:52:14 -04:00
Tad
84c7d230ab
Permission for sensors access patches from @MSe1969
...
Signed-off-by: Tad <tad@spotco.us>
2021-09-24 23:35:33 -04:00
Tad
a9f44dee41
Fix hamper analytics patches
...
These must all be strings.
Sadly meant this likely hasn't worked for years.
:\
Signed-off-by: Tad <tad@spotco.us>
2021-09-13 15:27:29 -04:00
Tad
bdccb5fb39
Hamper ad_personalization_signals
...
Signed-off-by: Tad <tad@spotco.us>
2021-08-27 13:46:11 -04:00
Tad
27d55efdff
Hamper ssaid collection
...
Signed-off-by: Tad <tad@spotco.us>
2021-08-27 13:41:57 -04:00
Tad
050da06eba
Move n_asb_09-2018-qcom in tree
2021-07-09 21:04:08 -04:00
Tad
f3e672fb18
Failed attempt at fixing signing
...
PRODUCT_OTA_PUBLIC_KEYS is meant to be set by a vendor tree, something
we don't use.
Override it at the source and set it explicitely as well.
This ensures that the compiled recovery.img and the one generated by
sign_target_files_apks.py includes the real public keys for verification.
11.0 signing is ignored.
This will need to be extensively tested as breakage can mean brick on locked
devices.
Although in failure cases it seems test-keys are accepted.
--
After much testing there appears to be a deeper issue with how keys
are inserted into the recovery and handled
2021-04-06 04:07:18 -04:00
Tad
5d14e4b4f7
Small changes
...
- Add m7 and avicii (untested)
- Use low_ram target on <2GB devices
Silly me, this never did anything due to the git reset...
- Update Chromium WebView cherrypick
2021-03-24 14:43:12 -04:00
Tad
c23646ebd5
More cleanup
2021-03-20 16:37:15 -04:00
Tad
a3fbed9da5
Update cherrypicks and small tweaks
2021-03-07 03:04:44 -05:00
Tad
d53a4f4e41
Update CVE patchers
...
- Drop tcp_sack=0 sysctl, as most devices are now patched
2020-10-12 18:38:07 -04:00
Tad
d16a362141
ASB cherry picks + Fixup 2f83043c
...
TODO: rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk
2020-09-12 08:29:09 -04:00
Tad
2f83043c68
14.1+15.1: GPS week rollover fix
...
16.0: 279492
17.1: 278135
also switch to alternate Xtra servers
https://developer.gemalto.com/threads/gps-time-info-error
2020-08-09 12:30:47 -04:00
Tad
a6a59309ed
More small fixes
2020-07-13 21:28:17 -04:00
Tad
2675404f86
14.1: move n-netd cherry picks in tree
2020-07-13 20:15:08 -04:00
Tad
f5462dd23c
Minor tweaks
2020-05-13 17:38:39 -04:00
Tad
7ef8a2726d
Minor tweaks
2019-11-28 12:03:40 -05:00
Tad
a8cc390c3d
14.1: cherrypicks
2019-11-24 20:14:23 -05:00