Compare commits
62 Commits
lineage-18
...
lineage-20
Author | SHA1 | Date | |
---|---|---|---|
6cf653fca7 | |||
47f59bc420 | |||
c2d7125184 | |||
e74c9fa94f | |||
a138eb6a0d | |||
82046ec9b1 | |||
d3d4c23cc0 | |||
820ace1a82 | |||
b532458443 | |||
a4caafbd4d | |||
ef892337b1 | |||
1e69ae3a1f | |||
04ab205c03 | |||
a731d0e3a3 | |||
0351de2fe9 | |||
f916711976 | |||
46518ac063 | |||
40b5b327b0 | |||
6309b72994 | |||
e9bf2125fd | |||
b6483242ac | |||
71dd2fd6bd | |||
3ed0ffc41a | |||
893946fe33 | |||
9eb9627de2 | |||
239c3806a5 | |||
ad6806e3f0 | |||
aee33e4be0 | |||
a3fa4c34f4 | |||
b7c0bc8e48 | |||
7d4ec17f3e | |||
d31c589001 | |||
847f486bf4 | |||
5ea8d2927c | |||
7e3c0d7829 | |||
4a9760ccf4 | |||
930fba2a76 | |||
7a031e81e4 | |||
e8386b7af7 | |||
563dc032aa | |||
dab441cb28 | |||
7263355146 | |||
9fbe3e7429 | |||
0cf6c5175a | |||
afb88771e0 | |||
cd2d9e7e80 | |||
3e37a2a02c | |||
64f500fbc3 | |||
7733ce720d | |||
96a0608f19 | |||
3159415c1d | |||
e447e2a5b9 | |||
9c0eb27736 | |||
5741a21938 | |||
1a542db826 | |||
f38da429fb | |||
9eed08ec86 | |||
6271df5f47 | |||
3941420208 | |||
41825856c6 | |||
410e393f97 | |||
9a97acb33a |
69
.drone.yml
69
.drone.yml
@ -1,69 +0,0 @@
|
|||||||
---
|
|
||||||
kind: pipeline
|
|
||||||
type: exec
|
|
||||||
name: mondrianwifi
|
|
||||||
|
|
||||||
platform:
|
|
||||||
os: linux
|
|
||||||
arch: amd64
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: sync
|
|
||||||
commands:
|
|
||||||
- source $DRONE_HOME/${DRONE_STAGE_NAME}.env
|
|
||||||
- cd $work
|
|
||||||
- repo init -u https://github.com/LineageOS/android.git -b lineage-$version
|
|
||||||
- mkdir -p .repo/local_manifests
|
|
||||||
- cp $DRONE_HOME/$device.xml .repo/local_manifests/roomservice.xml
|
|
||||||
- repo sync -q -c -j 6 --fail-fast --force-sync --no-tags
|
|
||||||
|
|
||||||
- name: build
|
|
||||||
shell: /bin/bash
|
|
||||||
commands:
|
|
||||||
- source $DRONE_HOME/${DRONE_STAGE_NAME}.env
|
|
||||||
- cd $work
|
|
||||||
- . build/envsetup.sh
|
|
||||||
- lunch lineage_$device-userdebug
|
|
||||||
- mka bacon -j6
|
|
||||||
|
|
||||||
- name: copy
|
|
||||||
commands:
|
|
||||||
- source $DRONE_HOME/${DRONE_STAGE_NAME}.env
|
|
||||||
- cd $work
|
|
||||||
- rm -f $httpdir/lineage-$version-*-UNOFFICIAL-$device.zip{,.sha256sum}
|
|
||||||
- mv -f out/target/product/$device/lineage-$version-*-UNOFFICIAL-$device.zip{,.sha256sum} $httpdir/
|
|
||||||
- ls -lh $httpdir/lineage-$version-*-UNOFFICIAL-$device.zip{,.sha256sum}
|
|
||||||
|
|
||||||
- name: clean
|
|
||||||
commands:
|
|
||||||
- source $DRONE_HOME/${DRONE_STAGE_NAME}.env
|
|
||||||
- cd $work
|
|
||||||
- rm -f out/target/product/$device/lineage-$version-*-UNOFFICIAL-$device.zip_* out/target/product/$device/lineage_$device-ota-eng.*.zip
|
|
||||||
|
|
||||||
trigger:
|
|
||||||
event:
|
|
||||||
- push
|
|
||||||
- custom
|
|
||||||
- cron
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
kind: pipeline
|
|
||||||
type: exec
|
|
||||||
name: mondrianwifi-publish
|
|
||||||
|
|
||||||
platform:
|
|
||||||
os: linux
|
|
||||||
arch: amd64
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: publish
|
|
||||||
commands:
|
|
||||||
- source $DRONE_HOME/mondrianwifi.env
|
|
||||||
- cd $httpdir
|
|
||||||
- mv lineage-$version-*-UNOFFICIAL-$device.zip{,.sha256sum} $publishdir/
|
|
||||||
- ls -lh $publishdir/
|
|
||||||
|
|
||||||
trigger:
|
|
||||||
event:
|
|
||||||
- promote
|
|
5
.vscode/settings.json
vendored
Normal file
5
.vscode/settings.json
vendored
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
{
|
||||||
|
"yaml.schemas": {
|
||||||
|
"https://raw.githubusercontent.com/woodpecker-ci/woodpecker/master/pipeline/schema/schema.json": "file:///home/nyyu/dev/lineage/build/.woodpecker/.build.yml"
|
||||||
|
}
|
||||||
|
}
|
33
.woodpecker/.build-lte.yml
Normal file
33
.woodpecker/.build-lte.yml
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
variables:
|
||||||
|
- &build_vol '/media/fast/lineage/lineage-20.0:/build'
|
||||||
|
- &tools_vol '/media/fast/lineage/tools:/tools'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrianlte
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
skip_clone: true
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
build:
|
||||||
|
pull: true
|
||||||
|
image: docker.nyyu.dev/lineage/android
|
||||||
|
environment:
|
||||||
|
- BUILD_HOSTNAME=docker
|
||||||
|
commands:
|
||||||
|
- export HOME=/build
|
||||||
|
- cd /build
|
||||||
|
- find /build/out/target/product/$device -type f -name '*.prop' -exec rm -vf {} + || true
|
||||||
|
- bash -c ". build/envsetup.sh && lunch lineage_$device-userdebug && (mka bacon -j6 || (cat out/build_error && exit 1))"
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
- *tools_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
||||||
|
|
||||||
|
depends_on:
|
||||||
|
- sync
|
||||||
|
- build-wifi
|
32
.woodpecker/.build-wifi.yml
Normal file
32
.woodpecker/.build-wifi.yml
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
variables:
|
||||||
|
- &build_vol '/media/fast/lineage/lineage-20.0:/build'
|
||||||
|
- &tools_vol '/media/fast/lineage/tools:/tools'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrianwifi
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
skip_clone: true
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
build:
|
||||||
|
pull: true
|
||||||
|
image: docker.nyyu.dev/lineage/android
|
||||||
|
environment:
|
||||||
|
- BUILD_HOSTNAME=docker
|
||||||
|
commands:
|
||||||
|
- export HOME=/build
|
||||||
|
- cd /build
|
||||||
|
- find /build/out/target/product/$device -type f -name '*.prop' -exec rm -vf {} + || true
|
||||||
|
- bash -c ". build/envsetup.sh && lunch lineage_$device-userdebug && (mka bacon -j6 || (cat out/build_error && exit 1))"
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
- *tools_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
||||||
|
|
||||||
|
depends_on:
|
||||||
|
- sync
|
24
.woodpecker/.changelog.yml
Normal file
24
.woodpecker/.changelog.yml
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
variables:
|
||||||
|
- &build_vol '/media/fast/lineage/lineage-20.0:/build'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrian
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
sync:
|
||||||
|
image: docker.nyyu.dev/lineage/android
|
||||||
|
commands:
|
||||||
|
- cd /build
|
||||||
|
- bash $CI_WORKSPACE/changelog.sh
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
||||||
|
|
||||||
|
depends_on:
|
||||||
|
- build-wifi
|
||||||
|
- build-lte
|
45
.woodpecker/.copy.yml
Normal file
45
.woodpecker/.copy.yml
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
variables:
|
||||||
|
- &build_vol '/media/fast/lineage/lineage-20.0:/build'
|
||||||
|
- &http_vol '/srv/http/drone:/http'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrianwifi
|
||||||
|
version: 20.0
|
||||||
|
- device: mondrianlte
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
skip_clone: true
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
copy:
|
||||||
|
pull: true
|
||||||
|
image: alpine
|
||||||
|
commands:
|
||||||
|
- rm -f /http/lineage-$version-*-UNOFFICIAL-$device.zip*
|
||||||
|
- mv -f /build/out/target/product/$device/lineage-$version-*-UNOFFICIAL-$device.zip* /http/
|
||||||
|
- cat /build/changelog-mondrian-$version.md >> /http/changelog-$device-$version.md
|
||||||
|
- ls -lh /http/lineage-$version-*-UNOFFICIAL-$device.zip*
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
- *http_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
||||||
|
clean:
|
||||||
|
pull: true
|
||||||
|
image: alpine
|
||||||
|
commands:
|
||||||
|
- rm -f /build/out/target/product/$device/lineage-$version-*-UNOFFICIAL-$device.zip_* /build/out/target/product/$device/lineage_$device-ota-eng.*.zip
|
||||||
|
- rm -rf /build/out/target/product/$device/obj/PACKAGING/target_files_intermediates/*
|
||||||
|
- rm -f /build/changelog-$device-$version.md
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
||||||
|
|
||||||
|
depends_on:
|
||||||
|
- changelog
|
28
.woodpecker/.publish.yml
Normal file
28
.woodpecker/.publish.yml
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
variables:
|
||||||
|
- &http_vol '/srv/http/drone:/http'
|
||||||
|
- &pub_vol '/mnt/android/lineage:/publish'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrianwifi
|
||||||
|
version: 20.0
|
||||||
|
- device: mondrianlte
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
skip_clone: true
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
publish:
|
||||||
|
pull: true
|
||||||
|
image: alpine
|
||||||
|
commands:
|
||||||
|
- mv /http/lineage-$version-*-UNOFFICIAL-$device.zip* /publish/$version/$device/
|
||||||
|
- cat /http/changelog-$device-$version.md >> /publish/$version/$device/changelog.md
|
||||||
|
- rm -f /http/changelog-$device-$version.md
|
||||||
|
- ls -lh /publish/$version/$device/
|
||||||
|
volumes:
|
||||||
|
- *http_vol
|
||||||
|
- *pub_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- deployment
|
32
.woodpecker/.sync.yml
Normal file
32
.woodpecker/.sync.yml
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
variables:
|
||||||
|
- &build_vol '/media/fast/lineage/lineage-20.0:/build'
|
||||||
|
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- device: mondrian
|
||||||
|
version: 20.0
|
||||||
|
|
||||||
|
pipeline:
|
||||||
|
sync:
|
||||||
|
pull: true
|
||||||
|
image: docker.nyyu.dev/lineage/android
|
||||||
|
commands:
|
||||||
|
- HOME=/home/drone
|
||||||
|
- git config --global user.email 'drone@nyyu.dev'
|
||||||
|
- git config --global user.name 'drone'
|
||||||
|
- cd /build
|
||||||
|
- rm -rf .repo/repo
|
||||||
|
- rm -f .repo/local_manifests/roomservice.xml
|
||||||
|
- repo init -u https://github.com/LineageOS-UL/android.git -b lineage-$version -g default,-darwin --git-lfs
|
||||||
|
- mkdir -p .repo/local_manifests
|
||||||
|
- cp -f $CI_WORKSPACE/$device.xml .repo/local_manifests/roomservice.xml
|
||||||
|
- repo forall -c 'git reset --hard --quiet' || true
|
||||||
|
- bash $CI_WORKSPACE/sync.sh
|
||||||
|
environment:
|
||||||
|
version: '20.0'
|
||||||
|
volumes:
|
||||||
|
- *build_vol
|
||||||
|
when:
|
||||||
|
event:
|
||||||
|
- manual
|
||||||
|
- cron
|
41
changelog.sh
Executable file
41
changelog.sh
Executable file
@ -0,0 +1,41 @@
|
|||||||
|
#!/bin/bash -e
|
||||||
|
# shellcheck disable=SC2154,SC2207,SC2016,SC2086,SC2250,SC2312,SC2162
|
||||||
|
|
||||||
|
TOPDIR=$(pwd)
|
||||||
|
|
||||||
|
changelog=${TOPDIR}/changelog-${device}-${version}.md
|
||||||
|
|
||||||
|
declare -A before
|
||||||
|
if [[ -f gitstate-${device}-${version}.txt ]]
|
||||||
|
then
|
||||||
|
read -a tmp < gitstate-${device}-${version}.txt
|
||||||
|
else
|
||||||
|
tmp=($(repo forall -c 'echo "${REPO_PATH}:$(git rev-parse --short HEAD)"'))
|
||||||
|
fi
|
||||||
|
for i in "${tmp[@]}"; do
|
||||||
|
IFS=: read -r folder commit <<<"${i}"
|
||||||
|
before[${folder}]=${commit}
|
||||||
|
done
|
||||||
|
|
||||||
|
echo -e "# Build $(date '+%Y-%m-%d %H:%M:%S %Z')\n" >>"${changelog}"
|
||||||
|
|
||||||
|
tmp=($(repo forall -c 'echo "${REPO_PATH}:$(git rev-parse --short HEAD)"'))
|
||||||
|
|
||||||
|
for i in "${tmp[@]}"; do
|
||||||
|
IFS=: read -r folder commit <<<"${i}"
|
||||||
|
if [[ "${folder}" != lineage/* && "${before[${folder}]}" != "${commit}" ]]; then
|
||||||
|
cd "${folder}" || continue
|
||||||
|
log=$(git --no-pager log --pretty=format:"- %s" "${before[${folder}]}".."${commit}" | grep -v XXXHIDEXXX)
|
||||||
|
if [[ $(echo -n "$log" | wc -c) != 0 ]]; then
|
||||||
|
{
|
||||||
|
echo "## ${folder} ${before[${folder}]}..${commit}"
|
||||||
|
echo "$log"
|
||||||
|
echo
|
||||||
|
} >>"${changelog}"
|
||||||
|
fi
|
||||||
|
cd "${TOPDIR}" || continue
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
cat "${changelog}"
|
||||||
|
|
||||||
|
echo "${tmp[@]}" > gitstate-${device}-${version}.txt
|
86
fix-NetworkStats-disable-BPF.patch
Normal file
86
fix-NetworkStats-disable-BPF.patch
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
From 50173432aab792769a56d2a7d451d1a65e831532 Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Sun, 25 Dec 2022 22:35:09 +0100
|
||||||
|
Subject: [PATCH] XXXHIDEXXX NetworkStats: disable BPF
|
||||||
|
|
||||||
|
---
|
||||||
|
.../native/libs/libnetworkstats/BpfNetworkStats.cpp | 10 +++++-----
|
||||||
|
.../com/android/server/net/NetworkStatsFactory.java | 2 +-
|
||||||
|
service/src/com/android/server/BpfNetMaps.java | 4 ++--
|
||||||
|
3 files changed, 8 insertions(+), 8 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/service-t/native/libs/libnetworkstats/BpfNetworkStats.cpp b/service-t/native/libs/libnetworkstats/BpfNetworkStats.cpp
|
||||||
|
index ee30f3db3..a68407044 100644
|
||||||
|
--- a/service-t/native/libs/libnetworkstats/BpfNetworkStats.cpp
|
||||||
|
+++ b/service-t/native/libs/libnetworkstats/BpfNetworkStats.cpp
|
||||||
|
@@ -104,13 +104,13 @@ int bpfGetIfaceStats(const char* iface, Stats* stats) {
|
||||||
|
int ret;
|
||||||
|
if (!ifaceStatsMap.isValid() || !ifaceStatsMap.isOk()) {
|
||||||
|
ret = -errno;
|
||||||
|
- ALOGE("get ifaceStats map fd failed: %s", strerror(errno));
|
||||||
|
+ //ALOGE("get ifaceStats map fd failed: %s", strerror(errno));
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
BpfMapRO<uint32_t, IfaceValue> ifaceIndexNameMap(IFACE_INDEX_NAME_MAP_PATH);
|
||||||
|
if (!ifaceIndexNameMap.isValid() || !ifaceStatsMap.isOk()) {
|
||||||
|
ret = -errno;
|
||||||
|
- ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
+ //ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
return bpfGetIfaceStatsInternal(iface, stats, ifaceStatsMap, ifaceIndexNameMap);
|
||||||
|
@@ -189,7 +189,7 @@ int parseBpfNetworkStatsDetail(std::vector<stats_line>* lines,
|
||||||
|
BpfMapRO<uint32_t, IfaceValue> ifaceIndexNameMap(IFACE_INDEX_NAME_MAP_PATH);
|
||||||
|
if (!ifaceIndexNameMap.isValid()) {
|
||||||
|
int ret = -errno;
|
||||||
|
- ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
+ //ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -266,14 +266,14 @@ int parseBpfNetworkStatsDev(std::vector<stats_line>* lines) {
|
||||||
|
BpfMapRO<uint32_t, IfaceValue> ifaceIndexNameMap(IFACE_INDEX_NAME_MAP_PATH);
|
||||||
|
if (!ifaceIndexNameMap.isValid()) {
|
||||||
|
ret = -errno;
|
||||||
|
- ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
+ //ALOGE("get ifaceIndexName map fd failed: %s", strerror(errno));
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
BpfMapRO<uint32_t, StatsValue> ifaceStatsMap(IFACE_STATS_MAP_PATH);
|
||||||
|
if (!ifaceStatsMap.isValid()) {
|
||||||
|
ret = -errno;
|
||||||
|
- ALOGE("get ifaceStats map fd failed: %s", strerror(errno));
|
||||||
|
+ //ALOGE("get ifaceStats map fd failed: %s", strerror(errno));
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
return parseBpfNetworkStatsDevInternal(lines, ifaceStatsMap, ifaceIndexNameMap);
|
||||||
|
diff --git a/service-t/src/com/android/server/net/NetworkStatsFactory.java b/service-t/src/com/android/server/net/NetworkStatsFactory.java
|
||||||
|
index 3b93f1a19..191400841 100644
|
||||||
|
--- a/service-t/src/com/android/server/net/NetworkStatsFactory.java
|
||||||
|
+++ b/service-t/src/com/android/server/net/NetworkStatsFactory.java
|
||||||
|
@@ -164,7 +164,7 @@ public class NetworkStatsFactory {
|
||||||
|
}
|
||||||
|
|
||||||
|
public NetworkStatsFactory(@NonNull Context ctx) {
|
||||||
|
- this(ctx, new File("/proc/"), true);
|
||||||
|
+ this(ctx, new File("/proc/"), false);
|
||||||
|
}
|
||||||
|
|
||||||
|
@VisibleForTesting
|
||||||
|
diff --git a/service/src/com/android/server/BpfNetMaps.java b/service/src/com/android/server/BpfNetMaps.java
|
||||||
|
index c006bc605..3d1fc9b71 100644
|
||||||
|
--- a/service/src/com/android/server/BpfNetMaps.java
|
||||||
|
+++ b/service/src/com/android/server/BpfNetMaps.java
|
||||||
|
@@ -67,9 +67,9 @@ public class BpfNetMaps {
|
||||||
|
}
|
||||||
|
|
||||||
|
private void maybeThrow(final int err, final String msg) {
|
||||||
|
- if (err != 0) {
|
||||||
|
+ /*if (err != 0) {
|
||||||
|
throw new ServiceSpecificException(err, msg + ": " + Os.strerror(err));
|
||||||
|
- }
|
||||||
|
+ }*/
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
45
fix-always-enable-taskbar-toggle.patch
Normal file
45
fix-always-enable-taskbar-toggle.patch
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
From 1b45884632a10093d455eb6aa09ebda35a0919f0 Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Sun, 18 Sep 2022 11:44:26 +0200
|
||||||
|
Subject: [PATCH] XXXHIDEXXX fix: always enable taskbar toggle
|
||||||
|
|
||||||
|
Change-Id: I247db667bec92fabcdbe7bd84946e79bae7e0bb6
|
||||||
|
---
|
||||||
|
.../lineageparts/input/ButtonSettings.java | 17 ++++++++---------
|
||||||
|
1 file changed, 8 insertions(+), 9 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/org/lineageos/lineageparts/input/ButtonSettings.java b/src/org/lineageos/lineageparts/input/ButtonSettings.java
|
||||||
|
index a6fa54f..4e326d3 100644
|
||||||
|
--- a/src/org/lineageos/lineageparts/input/ButtonSettings.java
|
||||||
|
+++ b/src/org/lineageos/lineageparts/input/ButtonSettings.java
|
||||||
|
@@ -475,15 +475,11 @@ public class ButtonSettings extends SettingsPreferenceFragment
|
||||||
|
|
||||||
|
mEnableTaskbar = findPreference(KEY_ENABLE_TASKBAR);
|
||||||
|
if (mEnableTaskbar != null) {
|
||||||
|
- if (!isTablet(getContext()) || !hasNavigationBar()) {
|
||||||
|
- mNavigationPreferencesCat.removePreference(mEnableTaskbar);
|
||||||
|
- } else {
|
||||||
|
- mEnableTaskbar.setOnPreferenceChangeListener(this);
|
||||||
|
- mEnableTaskbar.setChecked(LineageSettings.System.getInt(resolver,
|
||||||
|
- LineageSettings.System.ENABLE_TASKBAR,
|
||||||
|
- isTablet(getContext()) ? 1 : 0) == 1);
|
||||||
|
- toggleTaskBarDependencies(mEnableTaskbar.isChecked());
|
||||||
|
- }
|
||||||
|
+ mEnableTaskbar.setOnPreferenceChangeListener(this);
|
||||||
|
+ mEnableTaskbar.setChecked(LineageSettings.System.getInt(resolver,
|
||||||
|
+ LineageSettings.System.ENABLE_TASKBAR,
|
||||||
|
+ isTablet(getContext()) ? 1 : 0) == 1);
|
||||||
|
+ toggleTaskBarDependencies(mEnableTaskbar.isChecked());
|
||||||
|
}
|
||||||
|
|
||||||
|
List<Integer> unsupportedValues = new ArrayList<>();
|
||||||
|
@@ -867,6 +863,9 @@ public class ButtonSettings extends SettingsPreferenceFragment
|
||||||
|
return true;
|
||||||
|
} else if (preference == mDisableNavigationKeys) {
|
||||||
|
mDisableNavigationKeys.setEnabled(false);
|
||||||
|
+ mEnableTaskbar.setChecked(false);
|
||||||
|
+ LineageSettings.System.putInt(getContentResolver(),
|
||||||
|
+ LineageSettings.System.ENABLE_TASKBAR, 0);
|
||||||
|
mNavigationPreferencesCat.setEnabled(false);
|
||||||
|
if (!mDisableNavigationKeys.isChecked()) {
|
||||||
|
setButtonNavigationMode(NAV_BAR_MODE_3BUTTON_OVERLAY);
|
87
fix-bt-le.patch
Normal file
87
fix-bt-le.patch
Normal file
@ -0,0 +1,87 @@
|
|||||||
|
From 6ad0718fa87dfbaa2bd95ab23f60f485a896e84b Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Fri, 30 Sep 2022 22:40:43 +0200
|
||||||
|
Subject: [PATCH] XXXHIDEXXX bt: disable le
|
||||||
|
|
||||||
|
Change-Id: I5c258b1401fcd6fbfa98c98849db209688f52d3c
|
||||||
|
---
|
||||||
|
system/gd/hci/controller.cc | 13 +++++++------
|
||||||
|
system/gd/hci/hci_layer.cc | 4 ++--
|
||||||
|
system/stack/btm/btm_ble_gap.cc | 4 +++-
|
||||||
|
3 files changed, 12 insertions(+), 9 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/system/gd/hci/controller.cc b/system/gd/hci/controller.cc
|
||||||
|
index dbece21c6e..572df09bce 100644
|
||||||
|
--- a/system/gd/hci/controller.cc
|
||||||
|
+++ b/system/gd/hci/controller.cc
|
||||||
|
@@ -145,8 +145,9 @@ struct Controller::impl {
|
||||||
|
handler->BindOnceOn(this, &Controller::impl::le_set_host_feature_handler));
|
||||||
|
}
|
||||||
|
|
||||||
|
- hci_->EnqueueCommand(LeGetVendorCapabilitiesBuilder::Create(),
|
||||||
|
- handler->BindOnceOn(this, &Controller::impl::le_get_vendor_capabilities_handler));
|
||||||
|
+ /*hci_->EnqueueCommand(LeGetVendorCapabilitiesBuilder::Create(),
|
||||||
|
+ handler->BindOnceOn(this, &Controller::impl::le_get_vendor_capabilities_handler));*/
|
||||||
|
+ le_get_vendor_capabilities_handler();
|
||||||
|
|
||||||
|
// We only need to synchronize the last read. Make BD_ADDR to be the last one.
|
||||||
|
std::promise<void> promise;
|
||||||
|
@@ -400,8 +401,8 @@ struct Controller::impl {
|
||||||
|
le_periodic_advertiser_list_size_ = complete_view.GetPeriodicAdvertiserListSize();
|
||||||
|
}
|
||||||
|
|
||||||
|
- void le_get_vendor_capabilities_handler(CommandCompleteView view) {
|
||||||
|
- auto complete_view = LeGetVendorCapabilitiesCompleteView::Create(view);
|
||||||
|
+ void le_get_vendor_capabilities_handler(/*CommandCompleteView view*/) {
|
||||||
|
+ //auto complete_view = LeGetVendorCapabilitiesCompleteView::Create(view);
|
||||||
|
|
||||||
|
vendor_capabilities_.is_supported_ = 0x00;
|
||||||
|
vendor_capabilities_.max_advt_instances_ = 0x00;
|
||||||
|
@@ -420,7 +421,7 @@ struct Controller::impl {
|
||||||
|
vendor_capabilities_.a2dp_source_offload_capability_mask_ = 0x00;
|
||||||
|
vendor_capabilities_.bluetooth_quality_report_support_ = 0x00;
|
||||||
|
|
||||||
|
- if (complete_view.IsValid()) {
|
||||||
|
+ /*if (complete_view.IsValid()) {
|
||||||
|
vendor_capabilities_.is_supported_ = 0x01;
|
||||||
|
|
||||||
|
// v0.55
|
||||||
|
@@ -471,7 +472,7 @@ struct Controller::impl {
|
||||||
|
}
|
||||||
|
vendor_capabilities_.a2dp_source_offload_capability_mask_ = v98.GetA2dpSourceOffloadCapabilityMask();
|
||||||
|
vendor_capabilities_.bluetooth_quality_report_support_ = v98.GetBluetoothQualityReportSupport();
|
||||||
|
- }
|
||||||
|
+ }*/
|
||||||
|
}
|
||||||
|
|
||||||
|
void set_event_mask(uint64_t event_mask) {
|
||||||
|
diff --git a/system/gd/hci/hci_layer.cc b/system/gd/hci/hci_layer.cc
|
||||||
|
index b5a9d065be..fa0be65701 100644
|
||||||
|
--- a/system/gd/hci/hci_layer.cc
|
||||||
|
+++ b/system/gd/hci/hci_layer.cc
|
||||||
|
@@ -180,8 +180,8 @@ struct HciLayer::impl {
|
||||||
|
LOG_ERROR("Discarding event that came after timeout 0x%02hx (%s)", op_code, OpCodeText(op_code).c_str());
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
- ASSERT_LOG(waiting_command_ == op_code, "Waiting for 0x%02hx (%s), got 0x%02hx (%s)", waiting_command_,
|
||||||
|
- OpCodeText(waiting_command_).c_str(), op_code, OpCodeText(op_code).c_str());
|
||||||
|
+ /*ASSERT_LOG(waiting_command_ == op_code, "Waiting for 0x%02hx (%s), got 0x%02hx (%s)", waiting_command_,
|
||||||
|
+ OpCodeText(waiting_command_).c_str(), op_code, OpCodeText(op_code).c_str());*/
|
||||||
|
|
||||||
|
bool is_vendor_specific = static_cast<int>(op_code) & (0x3f << 10);
|
||||||
|
CommandStatusView status_view = CommandStatusView::Create(event);
|
||||||
|
diff --git a/system/stack/btm/btm_ble_gap.cc b/system/stack/btm/btm_ble_gap.cc
|
||||||
|
index 76f6c6f62c..4d7f10312c 100644
|
||||||
|
--- a/system/stack/btm/btm_ble_gap.cc
|
||||||
|
+++ b/system/stack/btm/btm_ble_gap.cc
|
||||||
|
@@ -619,7 +619,9 @@ static void btm_ble_vendor_capability_vsc_cmpl_cback(
|
||||||
|
BTM_TRACE_DEBUG("%s", __func__);
|
||||||
|
|
||||||
|
/* Check status of command complete event */
|
||||||
|
- CHECK(p_vcs_cplt_params->opcode == HCI_BLE_VENDOR_CAP);
|
||||||
|
+ if(p_vcs_cplt_params->opcode != HCI_BLE_VENDOR_CAP)
|
||||||
|
+ return;
|
||||||
|
+
|
||||||
|
CHECK(p_vcs_cplt_params->param_len > 0);
|
||||||
|
|
||||||
|
const uint8_t* p = p_vcs_cplt_params->p_param_buf;
|
59
fix-enable-more-grids-for-tablet.patch
Normal file
59
fix-enable-more-grids-for-tablet.patch
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
From 74d6bf5b114dfe94ca84e94d111d191ae5155a8e Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Sat, 10 Dec 2022 10:46:10 +0100
|
||||||
|
Subject: [PATCH] XXXHIDEXXX fix: enable more grids for tablet
|
||||||
|
|
||||||
|
Change-Id: I18c617760f5ad94d0baca06865525d7e73ee45ca
|
||||||
|
---
|
||||||
|
res/xml/device_profiles.xml | 10 +++++-----
|
||||||
|
1 file changed, 5 insertions(+), 5 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/res/xml/device_profiles.xml b/res/xml/device_profiles.xml
|
||||||
|
index 8105afaa24..eef99d49bb 100644
|
||||||
|
--- a/res/xml/device_profiles.xml
|
||||||
|
+++ b/res/xml/device_profiles.xml
|
||||||
|
@@ -103,7 +103,7 @@
|
||||||
|
launcher:dbFile="launcher_4_by_5.db"
|
||||||
|
launcher:inlineNavButtonsEndSpacing="@dimen/taskbar_button_margin_split"
|
||||||
|
launcher:defaultLayoutId="@xml/default_workspace_4x5"
|
||||||
|
- launcher:deviceCategory="phone|multi_display" >
|
||||||
|
+ launcher:deviceCategory="phone|tablet|multi_display" >
|
||||||
|
|
||||||
|
<display-option
|
||||||
|
launcher:name="Short Stubby"
|
||||||
|
@@ -167,7 +167,7 @@
|
||||||
|
launcher:dbFile="launcher.db"
|
||||||
|
launcher:inlineNavButtonsEndSpacing="@dimen/taskbar_button_margin_split"
|
||||||
|
launcher:defaultLayoutId="@xml/default_workspace_5x5"
|
||||||
|
- launcher:deviceCategory="phone|multi_display" >
|
||||||
|
+ launcher:deviceCategory="phone|tablet|multi_display" >
|
||||||
|
|
||||||
|
<display-option
|
||||||
|
launcher:name="Large Phone"
|
||||||
|
@@ -210,7 +210,7 @@
|
||||||
|
launcher:numHotseatIcons="5"
|
||||||
|
launcher:dbFile="launcher_5_by_6.db"
|
||||||
|
launcher:defaultLayoutId="@xml/default_workspace_5x6"
|
||||||
|
- launcher:deviceCategory="phone|multi_display" >
|
||||||
|
+ launcher:deviceCategory="phone|tablet|multi_display" >
|
||||||
|
|
||||||
|
<display-option
|
||||||
|
launcher:name="Large Phone"
|
||||||
|
@@ -233,7 +233,7 @@
|
||||||
|
launcher:numHotseatIcons="5"
|
||||||
|
launcher:dbFile="launcher_5_by_7.db"
|
||||||
|
launcher:defaultLayoutId="@xml/default_workspace_5x7"
|
||||||
|
- launcher:deviceCategory="phone|multi_display" >
|
||||||
|
+ launcher:deviceCategory="phone|tablet|multi_display" >
|
||||||
|
|
||||||
|
<display-option
|
||||||
|
launcher:name="Large Phone"
|
||||||
|
@@ -304,7 +304,7 @@
|
||||||
|
launcher:numHotseatIcons="6"
|
||||||
|
launcher:dbFile="launcher_6_by_6.db"
|
||||||
|
launcher:defaultLayoutId="@xml/default_workspace_6x6"
|
||||||
|
- launcher:deviceCategory="phone|multi_display" >
|
||||||
|
+ launcher:deviceCategory="phone|tablet|multi_display" >
|
||||||
|
|
||||||
|
<display-option
|
||||||
|
launcher:name="Large Phone"
|
22
fix-rear-camera-rotation.patch
Normal file
22
fix-rear-camera-rotation.patch
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
From d2022bc573e304388ec55b8f2ba710e8d960c18b Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Sun, 4 Dec 2022 10:25:36 +0100
|
||||||
|
Subject: [PATCH] XXXHIDEXXX fix: rear camera rotation
|
||||||
|
|
||||||
|
---
|
||||||
|
camera/CameraUtils.cpp | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/camera/CameraUtils.cpp b/camera/CameraUtils.cpp
|
||||||
|
index af3c492762..8967bfca77 100644
|
||||||
|
--- a/camera/CameraUtils.cpp
|
||||||
|
+++ b/camera/CameraUtils.cpp
|
||||||
|
@@ -69,7 +69,7 @@ status_t CameraUtils::getRotationTransform(const CameraMetadata& staticInfo,
|
||||||
|
flags = NATIVE_WINDOW_TRANSFORM_ROT_180;
|
||||||
|
break;
|
||||||
|
case 270:
|
||||||
|
- flags = NATIVE_WINDOW_TRANSFORM_ROT_270;
|
||||||
|
+ flags = NATIVE_WINDOW_TRANSFORM_ROT_90;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
ALOGE("%s: Invalid HAL android.sensor.orientation value: %d",
|
38
fix-store-build-prop-zip.patch
Normal file
38
fix-store-build-prop-zip.patch
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
From 497ae885d6a92d473ec3c603bd39e4510380240d Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Sat, 7 Jan 2023 10:54:05 +0100
|
||||||
|
Subject: [PATCH] XXXHIDEXXX releasetools: Store the build.prop file in the OTA zip
|
||||||
|
|
||||||
|
Change-Id: I81825a8a4633dff294a372ccf4de8e3aef99750c
|
||||||
|
---
|
||||||
|
tools/releasetools/non_ab_ota.py | 3 +++
|
||||||
|
tools/releasetools/ota_utils.py | 2 +-
|
||||||
|
2 files changed, 4 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/tools/releasetools/non_ab_ota.py b/tools/releasetools/non_ab_ota.py
|
||||||
|
index ad9cbcc82..91492ad76 100644
|
||||||
|
--- a/tools/releasetools/non_ab_ota.py
|
||||||
|
+++ b/tools/releasetools/non_ab_ota.py
|
||||||
|
@@ -308,6 +308,9 @@ endif;
|
||||||
|
script.AddToZip(input_zip, output_zip, input_path=OPTIONS.updater_binary)
|
||||||
|
metadata.required_cache = script.required_cache
|
||||||
|
|
||||||
|
+ common.ZipWriteStr(output_zip, "system/build.prop",
|
||||||
|
+ input_zip.read("SYSTEM/build.prop").decode())
|
||||||
|
+
|
||||||
|
# We haven't written the metadata entry, which will be done in
|
||||||
|
# FinalizeMetadata.
|
||||||
|
common.ZipClose(output_zip)
|
||||||
|
diff --git a/tools/releasetools/ota_utils.py b/tools/releasetools/ota_utils.py
|
||||||
|
index ff98ba9fb..1fb78db61 100644
|
||||||
|
--- a/tools/releasetools/ota_utils.py
|
||||||
|
+++ b/tools/releasetools/ota_utils.py
|
||||||
|
@@ -39,7 +39,7 @@ OPTIONS.boot_variable_file = None
|
||||||
|
|
||||||
|
METADATA_NAME = 'META-INF/com/android/metadata'
|
||||||
|
METADATA_PROTO_NAME = 'META-INF/com/android/metadata.pb'
|
||||||
|
-UNZIP_PATTERN = ['IMAGES/*', 'INSTALL/*', 'META/*', 'OTA/*', 'RADIO/*']
|
||||||
|
+UNZIP_PATTERN = ['IMAGES/*', 'INSTALL/*', 'META/*', 'OTA/*', 'RADIO/*', 'SYSTEM/build.prop']
|
||||||
|
SECURITY_PATCH_LEVEL_PROP_NAME = "ro.build.version.security_patch"
|
||||||
|
|
||||||
|
|
40
fix-trebuchet-taskbar.patch
Normal file
40
fix-trebuchet-taskbar.patch
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
From 6fde482e5b5d0dd0adc7617c334f0bb0c0482c7d Mon Sep 17 00:00:00 2001
|
||||||
|
From: nyyu <mail@nyyu.dev>
|
||||||
|
Date: Fri, 23 Dec 2022 19:20:55 +0100
|
||||||
|
Subject: [PATCH] XXXHIDEXXX fix: trebuchet taskbar
|
||||||
|
|
||||||
|
Change-Id: I566e6a3cf799cdd8ee5d4f07221b9d6bb80d41cb
|
||||||
|
---
|
||||||
|
src/com/android/launcher3/util/SettingsCache.java | 5 +++++
|
||||||
|
1 file changed, 5 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/src/com/android/launcher3/util/SettingsCache.java b/src/com/android/launcher3/util/SettingsCache.java
|
||||||
|
index 0c5b7225d3..0a8a0bdf09 100644
|
||||||
|
--- a/src/com/android/launcher3/util/SettingsCache.java
|
||||||
|
+++ b/src/com/android/launcher3/util/SettingsCache.java
|
||||||
|
@@ -33,6 +33,8 @@ import java.util.Map;
|
||||||
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
import java.util.concurrent.CopyOnWriteArrayList;
|
||||||
|
|
||||||
|
+import lineageos.providers.LineageSettings;
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* ContentObserver over Settings keys that also has a caching layer.
|
||||||
|
* Consumers can register for callbacks via {@link #register(Uri, OnChangeListener)} and
|
||||||
|
@@ -61,6 +63,7 @@ public class SettingsCache extends ContentObserver implements SafeCloseable {
|
||||||
|
Settings.System.getUriFor(ACCELEROMETER_ROTATION);
|
||||||
|
|
||||||
|
private static final String SYSTEM_URI_PREFIX = Settings.System.CONTENT_URI.toString();
|
||||||
|
+ private static final String LINEAGE_URI_PREFIX = LineageSettings.System.CONTENT_URI.toString();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Caches the last seen value for registered keys.
|
||||||
|
@@ -139,6 +142,8 @@ public class SettingsCache extends ContentObserver implements SafeCloseable {
|
||||||
|
boolean newVal;
|
||||||
|
if (keyUri.toString().startsWith(SYSTEM_URI_PREFIX)) {
|
||||||
|
newVal = Settings.System.getInt(mResolver, key, defaultValue) == 1;
|
||||||
|
+ } else if (keyUri.toString().startsWith(LINEAGE_URI_PREFIX)) {
|
||||||
|
+ newVal = LineageSettings.System.getInt(mResolver, key, defaultValue) == 1;
|
||||||
|
} else { // SETTING_SECURE
|
||||||
|
newVal = Settings.Secure.getInt(mResolver, key, defaultValue) == 1;
|
||||||
|
}
|
141
microg.patch
Normal file
141
microg.patch
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
From 437d7b1ee54df480d212ca97ddc3b8acd2944966 Mon Sep 17 00:00:00 2001
|
||||||
|
From: maxwen <max.weninger@gmail.com>
|
||||||
|
Date: Tue, 25 Sep 2018 09:44:26 +0200
|
||||||
|
Subject: [PATCH] XXXHIDEXXX base: use better solution for MicroG FAKE_PACKAGE_SIGNATURE
|
||||||
|
|
||||||
|
make it a privileged permission instead of a runtime one
|
||||||
|
to add extra safety dont trust the signature coming from the
|
||||||
|
package but limit to the microg signature and only allow
|
||||||
|
from FakeStore and GmsCore package names
|
||||||
|
|
||||||
|
https://github.com/microg/GmsCore/blob/master/play-services-core/src/main/res/values/signature.xml
|
||||||
|
|
||||||
|
thanks for the inspiration from Chirayu Desai <chirayudesai1@gmail.com>
|
||||||
|
|
||||||
|
Reference:
|
||||||
|
https://gitlab.com/CalyxOS/platform_frameworks_base/-/commit/ba8cff41aaaafec0982f29dcb1869c1ea61a6cb4
|
||||||
|
|
||||||
|
Only diff is that we keep original permission name so we can
|
||||||
|
continue to use upstream prebuilt microg for now
|
||||||
|
|
||||||
|
Change-Id: I394990d89ab427b94b04db7ca7e06206a476965b
|
||||||
|
---
|
||||||
|
core/res/AndroidManifest.xml | 5 +++
|
||||||
|
core/res/res/values/custom_strings.xml | 22 +++++++++++
|
||||||
|
.../com/android/server/pm/ComputerEngine.java | 37 ++++++++++++++++++-
|
||||||
|
3 files changed, 62 insertions(+), 2 deletions(-)
|
||||||
|
create mode 100644 core/res/res/values/custom_strings.xml
|
||||||
|
|
||||||
|
diff --git a/core/res/AndroidManifest.xml b/core/res/AndroidManifest.xml
|
||||||
|
index 7439b2f0921ff..9b89297348992 100644
|
||||||
|
--- a/core/res/AndroidManifest.xml
|
||||||
|
+++ b/core/res/AndroidManifest.xml
|
||||||
|
@@ -3534,6 +3534,11 @@
|
||||||
|
android:description="@string/permdesc_getPackageSize"
|
||||||
|
android:protectionLevel="normal" />
|
||||||
|
|
||||||
|
+ <!-- @hide Allows an application to change the package signature as
|
||||||
|
+ seen by applications -->
|
||||||
|
+ <permission android:name="android.permission.FAKE_PACKAGE_SIGNATURE"
|
||||||
|
+ android:protectionLevel="signature|privileged" />
|
||||||
|
+
|
||||||
|
<!-- @deprecated No longer useful, see
|
||||||
|
{@link android.content.pm.PackageManager#addPackageToPreferred}
|
||||||
|
for details. -->
|
||||||
|
diff --git a/core/res/res/values/custom_strings.xml b/core/res/res/values/custom_strings.xml
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000000..aa2d50b869fec
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/core/res/res/values/custom_strings.xml
|
||||||
|
@@ -0,0 +1,22 @@
|
||||||
|
+<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
+<!--
|
||||||
|
+/* //device/apps/common/assets/res/any/strings.xml
|
||||||
|
+**
|
||||||
|
+** Copyright 2006, The Android Open Source Project
|
||||||
|
+**
|
||||||
|
+** Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
+** you may not use this file except in compliance with the License.
|
||||||
|
+** You may obtain a copy of the License at
|
||||||
|
+**
|
||||||
|
+** http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
+**
|
||||||
|
+** Unless required by applicable law or agreed to in writing, software
|
||||||
|
+** distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
+** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
+** See the License for the specific language governing permissions and
|
||||||
|
+** limitations under the License.
|
||||||
|
+*/
|
||||||
|
+-->
|
||||||
|
+<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
|
||||||
|
+
|
||||||
|
+</resources>
|
||||||
|
diff --git a/services/core/java/com/android/server/pm/ComputerEngine.java b/services/core/java/com/android/server/pm/ComputerEngine.java
|
||||||
|
index 259ca655d2b9f..d029fbf30d37a 100644
|
||||||
|
--- a/services/core/java/com/android/server/pm/ComputerEngine.java
|
||||||
|
+++ b/services/core/java/com/android/server/pm/ComputerEngine.java
|
||||||
|
@@ -426,6 +426,15 @@ protected ApplicationInfo androidApplication() {
|
||||||
|
return mLocalAndroidApplication;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /**
|
||||||
|
+ * The Google signature faked by microG.
|
||||||
|
+ */
|
||||||
|
+ private static final String MICROG_FAKE_SIGNATURE = "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";
|
||||||
|
+ /**
|
||||||
|
+ * List of packages which require signature spoofing.
|
||||||
|
+ */
|
||||||
|
+ private static final List<String> MICROG_FAKE_SIGNATURE_PACKAGES = List.of("com.google.android.gms", "com.android.vending");
|
||||||
|
+
|
||||||
|
ComputerEngine(PackageManagerService.Snapshot args, int version) {
|
||||||
|
mVersion = version;
|
||||||
|
mSettings = new Settings(args.settings);
|
||||||
|
@@ -1619,15 +1628,26 @@ public final PackageInfo generatePackageInfo(PackageStateInternal ps,
|
||||||
|
// Compute GIDs only if requested
|
||||||
|
final int[] gids = (flags & PackageManager.GET_GIDS) == 0 ? EMPTY_INT_ARRAY
|
||||||
|
: mPermissionManager.getGidsForUid(UserHandle.getUid(userId, ps.getAppId()));
|
||||||
|
+
|
||||||
|
+ // Allow microG GmsCore and FakeStore to spoof signature
|
||||||
|
+ final boolean isMicroG = MICROG_FAKE_SIGNATURE_PACKAGES.contains(p.getPackageName());
|
||||||
|
+
|
||||||
|
// Compute granted permissions only if package has requested permissions
|
||||||
|
- final Set<String> permissions = ((flags & PackageManager.GET_PERMISSIONS) == 0
|
||||||
|
- || ArrayUtils.isEmpty(p.getRequestedPermissions())) ? Collections.emptySet()
|
||||||
|
+ // or we matched a microg package
|
||||||
|
+ final Set<String> permissions = (((flags & PackageManager.GET_PERMISSIONS) == 0
|
||||||
|
+ || ArrayUtils.isEmpty(p.getRequestedPermissions()))
|
||||||
|
+ && !isMicroG)
|
||||||
|
+ ? Collections.emptySet()
|
||||||
|
: mPermissionManager.getGrantedPermissions(ps.getPackageName(), userId);
|
||||||
|
|
||||||
|
PackageInfo packageInfo = PackageInfoUtils.generate(p, gids, flags,
|
||||||
|
state.getFirstInstallTime(), ps.getLastUpdateTime(), permissions, state, userId,
|
||||||
|
ps);
|
||||||
|
|
||||||
|
+ if (isMicroG) {
|
||||||
|
+ packageInfo = mayFakeSignature(p, packageInfo, permissions);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (packageInfo == null) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
@@ -1667,6 +1687,19 @@ public final PackageInfo generatePackageInfo(PackageStateInternal ps,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
+ private PackageInfo mayFakeSignature(AndroidPackage p, PackageInfo pi,
|
||||||
|
+ Set<String> permissions) {
|
||||||
|
+ try {
|
||||||
|
+ if (permissions.contains("android.permission.FAKE_PACKAGE_SIGNATURE")) {
|
||||||
|
+ pi.signatures = new Signature[] {new Signature(MICROG_FAKE_SIGNATURE)};
|
||||||
|
+ }
|
||||||
|
+ } catch (Throwable t) {
|
||||||
|
+ // We should never die because of any failures, this is system code!
|
||||||
|
+ Log.w("PackageManagerService.FAKE_PACKAGE_SIGNATURE", t);
|
||||||
|
+ }
|
||||||
|
+ return pi;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
public final PackageInfo getPackageInfo(String packageName,
|
||||||
|
@PackageManager.PackageInfoFlagsBits long flags, int userId) {
|
||||||
|
return getPackageInfoInternal(packageName, PackageManager.VERSION_CODE_HIGHEST,
|
13
mondrian.xml
Normal file
13
mondrian.xml
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<manifest>
|
||||||
|
<remote name="nyyu" fetch="https://git.nyyu.dev" />
|
||||||
|
<project name="lineage/android_device_samsung_mondrianwifi" path="device/samsung/mondrianwifi" remote="nyyu" revision="lineage-20" />
|
||||||
|
<project name="lineage/android_device_samsung_mondrianlte" path="device/samsung/mondrianlte" remote="nyyu" revision="lineage-20" />
|
||||||
|
<project name="lineage/android_kernel_samsung_msm8974" path="kernel/samsung/msm8974_tab" remote="nyyu" revision="lineage-20_pro" />
|
||||||
|
<project name="lineage/android_vendor_samsung_mondrianwifi" path="vendor/samsung/mondrianwifi" remote="nyyu" revision="lineage-20" />
|
||||||
|
<project name="lineage/android_vendor_samsung_mondrianlte" path="vendor/samsung/mondrianlte" remote="nyyu" revision="lineage-20" />
|
||||||
|
<project name="lineage/android_device_samsung_msm8974-common" path="device/samsung/msm8974-common" remote="nyyu" revision="lineage-20" />
|
||||||
|
<project name="LineageOS/android_device_samsung_qcom-common" path="device/samsung/qcom-common" remote="github" revision="lineage-20" />
|
||||||
|
<project name="LineageOS/android_hardware_samsung" path="hardware/samsung" remote="github" revision="lineage-20" />
|
||||||
|
<project name="lineage/proprietary_vendor_samsung" path="vendor/samsung" remote="nyyu" revision="lineage-20" />
|
||||||
|
</manifest>
|
@ -1,5 +0,0 @@
|
|||||||
version=18.1
|
|
||||||
work=/drone/lineage-$version
|
|
||||||
device=mondrianlte
|
|
||||||
httpdir=/srv/http/drone
|
|
||||||
publishdir=/mnt/android/lineage/$version/$device
|
|
@ -1,24 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<manifest>
|
|
||||||
<remote name="nyyu" fetch="https://git.nyyu.dev" />
|
|
||||||
|
|
||||||
<project name="lineage/android_device_samsung_mondrianlte" path="device/samsung/mondrianlte" remote="nyyu" />
|
|
||||||
<project name="lineage/android_device_samsung_mondrianwifi" path="device/samsung/mondrianwifi" remote="nyyu" />
|
|
||||||
<project name="lineage/android_kernel_samsung_msm8974" path="kernel/samsung/msm8974_tab" remote="nyyu" revision="lineage-18.1_pro" />
|
|
||||||
<project name="lineage/android_vendor_samsung_mondrianlte" path="vendor/samsung/mondrianlte" remote="nyyu" />
|
|
||||||
<project name="lineage/android_vendor_samsung_mondrianwifi" path="vendor/samsung/mondrianwifi" remote="nyyu" />
|
|
||||||
<project name="LineageOS/android_device_samsung_msm8974-common" path="device/samsung/msm8974-common" remote="github" />
|
|
||||||
<project name="LineageOS/android_device_samsung_qcom-common" path="device/samsung/qcom-common" remote="github" />
|
|
||||||
<project name="LineageOS/android_hardware_samsung" path="hardware/samsung" remote="github" />
|
|
||||||
<project name="LineageOS/android_hardware_sony_timekeep" path="hardware/sony/timekeep" remote="github" />
|
|
||||||
<project name="TheMuppets/proprietary_vendor_samsung" path="vendor/samsung" remote="github" />
|
|
||||||
|
|
||||||
<remove-project name="platform/prebuilts/clang/host/darwin-x86" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_aarch64_aarch64-linux-android-4.9" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_arm_arm-linux-androideabi-4.9" />
|
|
||||||
<remove-project name="platform/prebuilts/gcc/darwin-x86/host/i686-apple-darwin-4.2.1" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_x86_x86_64-linux-android-4.9" />
|
|
||||||
<remove-project name="platform/prebuilts/gdb/darwin-x86" />
|
|
||||||
<remove-project name="platform/prebuilts/go/darwin-x86" />
|
|
||||||
<remove-project name="platform/prebuilts/python/darwin-x86/2.7.5" />
|
|
||||||
</manifest>
|
|
@ -1,5 +0,0 @@
|
|||||||
version=18.1
|
|
||||||
work=/drone/lineage-$version
|
|
||||||
device=mondrianwifi
|
|
||||||
httpdir=/srv/http/drone
|
|
||||||
publishdir=/mnt/android/lineage/$version/$device
|
|
@ -1,22 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<manifest>
|
|
||||||
<remote name="nyyu" fetch="https://git.nyyu.dev" />
|
|
||||||
|
|
||||||
<project name="lineage/android_device_samsung_mondrianwifi" path="device/samsung/mondrianwifi" remote="nyyu" />
|
|
||||||
<project name="lineage/android_kernel_samsung_msm8974" path="kernel/samsung/msm8974_tab" remote="nyyu" revision="lineage-18.1_pro" />
|
|
||||||
<project name="lineage/android_vendor_samsung_mondrianwifi" path="vendor/samsung/mondrianwifi" remote="nyyu" />
|
|
||||||
<project name="LineageOS/android_device_samsung_msm8974-common" path="device/samsung/msm8974-common" remote="github" />
|
|
||||||
<project name="LineageOS/android_device_samsung_qcom-common" path="device/samsung/qcom-common" remote="github" />
|
|
||||||
<project name="LineageOS/android_hardware_samsung" path="hardware/samsung" remote="github" />
|
|
||||||
<project name="LineageOS/android_hardware_sony_timekeep" path="hardware/sony/timekeep" remote="github" />
|
|
||||||
<project name="TheMuppets/proprietary_vendor_samsung" path="vendor/samsung" remote="github" />
|
|
||||||
|
|
||||||
<remove-project name="platform/prebuilts/clang/host/darwin-x86" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_aarch64_aarch64-linux-android-4.9" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_arm_arm-linux-androideabi-4.9" />
|
|
||||||
<remove-project name="platform/prebuilts/gcc/darwin-x86/host/i686-apple-darwin-4.2.1" />
|
|
||||||
<remove-project name="LineageOS/android_prebuilts_gcc_darwin-x86_x86_x86_64-linux-android-4.9" />
|
|
||||||
<remove-project name="platform/prebuilts/gdb/darwin-x86" />
|
|
||||||
<remove-project name="platform/prebuilts/go/darwin-x86" />
|
|
||||||
<remove-project name="platform/prebuilts/python/darwin-x86/2.7.5" />
|
|
||||||
</manifest>
|
|
83
snet20-1.patch
Normal file
83
snet20-1.patch
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
From c9a37a5a5a9e63fda74f6fcf45bc9f164957f295 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Danny Lin <danny@kdrag0n.dev>
|
||||||
|
Date: Wed, 7 Oct 2020 00:24:54 -0700
|
||||||
|
Subject: [PATCH] XXXHIDEXXX init: Set properties to make SafetyNet pass
|
||||||
|
|
||||||
|
Google's SafetyNet integrity checks will check the values of these
|
||||||
|
properties when performing basic attestation. Setting fake values helps
|
||||||
|
us pass basic SafetyNet with no Magisk Hide or kernel patches necessary.
|
||||||
|
|
||||||
|
Note that these properties need to be set very early, before parsing the
|
||||||
|
kernel command-line, as they are read-only properties that the bootloader
|
||||||
|
sets using androidboot kernel arguments. The bootloader's real values
|
||||||
|
cause SafetyNet to fail with an unlocked bootloader and/or custom
|
||||||
|
software because the verified boot chain is broken in that case.
|
||||||
|
|
||||||
|
Change-Id: I66d23fd91d82906b00d5eb020668f01ae83ec31f
|
||||||
|
|
||||||
|
fastboot: Revert to Android 11 method of checking lock status
|
||||||
|
|
||||||
|
Now that we're setting system-wide properties for SafetyNet, which
|
||||||
|
includes ro.boot.verifiedbootstate=green, fastbootd always detects the
|
||||||
|
bootloader as being locked. Revert to the Android 11 method of reading
|
||||||
|
directly from the kernel cmdline to work arround the issue.
|
||||||
|
|
||||||
|
- Also don't set these in recovery
|
||||||
|
|
||||||
|
Change-Id: I57f6d48acddb29748778053edf354d7bd8994bd7
|
||||||
|
---
|
||||||
|
fastboot/device/utility.cpp | 7 ++++++-
|
||||||
|
init/property_service.cpp | 15 +++++++++++++++
|
||||||
|
2 files changed, 21 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/fastboot/device/utility.cpp b/fastboot/device/utility.cpp
|
||||||
|
index 3302c4310c9..a14eea37662 100644
|
||||||
|
--- a/fastboot/device/utility.cpp
|
||||||
|
+++ b/fastboot/device/utility.cpp
|
||||||
|
@@ -196,7 +196,12 @@ std::vector<std::string> ListPartitions(FastbootDevice* device) {
|
||||||
|
}
|
||||||
|
|
||||||
|
bool GetDeviceLockStatus() {
|
||||||
|
- return android::base::GetProperty("ro.boot.verifiedbootstate", "") != "orange";
|
||||||
|
+ std::string cmdline;
|
||||||
|
+ // Return lock status true if unable to read kernel command line.
|
||||||
|
+ if (!android::base::ReadFileToString("/proc/cmdline", &cmdline)) {
|
||||||
|
+ return true;
|
||||||
|
+ }
|
||||||
|
+ return cmdline.find("androidboot.verifiedbootstate=orange") == std::string::npos;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool UpdateAllPartitionMetadata(FastbootDevice* device, const std::string& super_name,
|
||||||
|
diff --git a/init/property_service.cpp b/init/property_service.cpp
|
||||||
|
index 9f7c21543e9..d1e802cca19 100644
|
||||||
|
--- a/init/property_service.cpp
|
||||||
|
+++ b/init/property_service.cpp
|
||||||
|
@@ -1282,6 +1282,13 @@ static void ProcessBootconfig() {
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
+static void SetSafetyNetProps() {
|
||||||
|
+ InitPropertySet("ro.boot.flash.locked", "1");
|
||||||
|
+ InitPropertySet("ro.boot.verifiedbootstate", "green");
|
||||||
|
+ InitPropertySet("ro.boot.veritymode", "enforcing");
|
||||||
|
+ InitPropertySet("ro.boot.vbmeta.device_state", "locked");
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
void PropertyInit() {
|
||||||
|
selinux_callback cb;
|
||||||
|
cb.func_audit = PropertyAuditCallback;
|
||||||
|
@@ -1296,6 +1303,14 @@ void PropertyInit() {
|
||||||
|
LOG(FATAL) << "Failed to load serialized property info file";
|
||||||
|
}
|
||||||
|
|
||||||
|
+ // Report a valid verified boot chain to make Google SafetyNet integrity
|
||||||
|
+ // checks pass. This needs to be done before parsing the kernel cmdline as
|
||||||
|
+ // these properties are read-only and will be set to invalid values with
|
||||||
|
+ // androidboot cmdline arguments.
|
||||||
|
+ if (!IsRecoveryMode()) {
|
||||||
|
+ SetSafetyNetProps();
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
// If arguments are passed both on the command line and in DT,
|
||||||
|
// properties set in DT always have priority over the command-line ones.
|
||||||
|
ProcessKernelDt();
|
138
snet20-2.patch
Normal file
138
snet20-2.patch
Normal file
@ -0,0 +1,138 @@
|
|||||||
|
From 3db46053ca0547c175fa591075a67b8d76c4b906 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Danny Lin <danny@kdrag0n.dev>
|
||||||
|
Date: Mon, 11 Oct 2021 19:59:51 -0700
|
||||||
|
Subject: [PATCH] XXXHIDEXXX Alter model name to avoid SafetyNet HW attestation
|
||||||
|
enforcement
|
||||||
|
|
||||||
|
As of September 2, Google is enforcing SafetyNet's previously
|
||||||
|
opportunistic hardware-backed attestation based on device information.
|
||||||
|
Append a space to the device model name in order to avoid such
|
||||||
|
enforcement.
|
||||||
|
|
||||||
|
Also contains:
|
||||||
|
Spoof build fingerprint for Google Play Services
|
||||||
|
|
||||||
|
SafetyNet's CTS profile attestation checks whether Build.FINGERPRINT
|
||||||
|
matches that of the device's stock OS, which has passed CTS testing.
|
||||||
|
Spoof the fingerprint for Google Play Services to help pass SafetyNet.
|
||||||
|
|
||||||
|
We used to set the real system build fingerprint to the stock one, but
|
||||||
|
Android relies on each build having a unique fingerprint in order to
|
||||||
|
clear the correct caches and update persistent state for system changes.
|
||||||
|
On devices that no longer receive updates from the OEM, the build
|
||||||
|
fingerprint never changes and Android doesn't account for updates
|
||||||
|
correctly, which causes issues when updating without wiping data.
|
||||||
|
Only spoofing the fingerprint for Google Play Services fixes this issue.
|
||||||
|
|
||||||
|
Corresponding vendor commit:
|
||||||
|
"Only use stock build fingerprint for Google Play Services"
|
||||||
|
|
||||||
|
NB: This code is under the gmscompat package, but it does not depend on
|
||||||
|
any code from gmscompat.
|
||||||
|
|
||||||
|
Change-Id: I26a2498eb2e2163933303b03f6d516e5fb30fe51
|
||||||
|
|
||||||
|
* We don't need to spoof the fingerprint here since we do it globally, but we
|
||||||
|
use the Build field spoofing code it added for model
|
||||||
|
|
||||||
|
Change-Id: Ib7779e0aae40cab3730a56785e9231896917ab0a
|
||||||
|
---
|
||||||
|
core/java/android/app/Instrumentation.java | 4 ++
|
||||||
|
.../internal/gmscompat/AttestationHooks.java | 59 +++++++++++++++++++
|
||||||
|
2 files changed, 63 insertions(+)
|
||||||
|
create mode 100644 core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
|
||||||
|
diff --git a/core/java/android/app/Instrumentation.java b/core/java/android/app/Instrumentation.java
|
||||||
|
index 8984c4292023..58258acaef97 100644
|
||||||
|
--- a/core/java/android/app/Instrumentation.java
|
||||||
|
+++ b/core/java/android/app/Instrumentation.java
|
||||||
|
@@ -57,6 +57,8 @@
|
||||||
|
|
||||||
|
import com.android.internal.content.ReferrerIntent;
|
||||||
|
|
||||||
|
+import com.android.internal.gmscompat.AttestationHooks;
|
||||||
|
+
|
||||||
|
import java.io.File;
|
||||||
|
import java.lang.annotation.Retention;
|
||||||
|
import java.lang.annotation.RetentionPolicy;
|
||||||
|
@@ -1231,6 +1233,7 @@ public Application newApplication(ClassLoader cl, String className, Context cont
|
||||||
|
Application app = getFactory(context.getPackageName())
|
||||||
|
.instantiateApplication(cl, className);
|
||||||
|
app.attach(context);
|
||||||
|
+ AttestationHooks.initApplicationBeforeOnCreate(app);
|
||||||
|
return app;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -1248,6 +1251,7 @@ static public Application newApplication(Class<?> clazz, Context context)
|
||||||
|
ClassNotFoundException {
|
||||||
|
Application app = (Application)clazz.newInstance();
|
||||||
|
app.attach(context);
|
||||||
|
+ AttestationHooks.initApplicationBeforeOnCreate(app);
|
||||||
|
return app;
|
||||||
|
}
|
||||||
|
|
||||||
|
diff --git a/core/java/com/android/internal/gmscompat/AttestationHooks.java b/core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000000..621156eb84b9
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
@@ -0,0 +1,59 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright (C) 2021 The Android Open Source Project
|
||||||
|
+ *
|
||||||
|
+ * Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
+ * you may not use this file except in compliance with the License.
|
||||||
|
+ * You may obtain a copy of the License at
|
||||||
|
+ *
|
||||||
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
+ *
|
||||||
|
+ * Unless required by applicable law or agreed to in writing, software
|
||||||
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
+ * See the License for the specific language governing permissions and
|
||||||
|
+ * limitations under the License.
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+package com.android.internal.gmscompat;
|
||||||
|
+
|
||||||
|
+import android.app.Application;
|
||||||
|
+import android.os.Build;
|
||||||
|
+import android.os.SystemProperties;
|
||||||
|
+import android.util.Log;
|
||||||
|
+
|
||||||
|
+import java.lang.reflect.Field;
|
||||||
|
+
|
||||||
|
+/** @hide */
|
||||||
|
+public final class AttestationHooks {
|
||||||
|
+ private static final String TAG = "GmsCompat/Attestation";
|
||||||
|
+ private static final String PACKAGE_GMS = "com.google.android.gms";
|
||||||
|
+
|
||||||
|
+ private AttestationHooks() { }
|
||||||
|
+
|
||||||
|
+ private static void setBuildField(String key, String value) {
|
||||||
|
+ try {
|
||||||
|
+ // Unlock
|
||||||
|
+ Field field = Build.class.getDeclaredField(key);
|
||||||
|
+ field.setAccessible(true);
|
||||||
|
+
|
||||||
|
+ // Edit
|
||||||
|
+ field.set(null, value);
|
||||||
|
+
|
||||||
|
+ // Lock
|
||||||
|
+ field.setAccessible(false);
|
||||||
|
+ } catch (NoSuchFieldException | IllegalAccessException e) {
|
||||||
|
+ Log.e(TAG, "Failed to spoof Build." + key, e);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ private static void spoofBuildGms() {
|
||||||
|
+ // Alter model name to avoid hardware attestation enforcement
|
||||||
|
+ setBuildField("MODEL", Build.MODEL + " ");
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ public static void initApplicationBeforeOnCreate(Application app) {
|
||||||
|
+ if (PACKAGE_GMS.equals(app.getPackageName())) {
|
||||||
|
+ spoofBuildGms();
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+}
|
91
snet20-3.patch
Normal file
91
snet20-3.patch
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
From ae57183500bb34032ec426fcae2b9a14e028ce12 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Danny Lin <danny@kdrag0n.dev>
|
||||||
|
Date: Mon, 11 Oct 2021 20:00:44 -0700
|
||||||
|
Subject: [PATCH] XXXHIDEXXX keystore: Block key attestation for SafetyNet
|
||||||
|
|
||||||
|
SafetyNet (part of Google Play Services) opportunistically uses
|
||||||
|
hardware-backed key attestation via KeyStore as a strong integrity
|
||||||
|
check. This causes SafetyNet to fail on custom ROMs because the verified
|
||||||
|
boot key and bootloader unlock state can be detected from attestation
|
||||||
|
certificates.
|
||||||
|
|
||||||
|
As a workaround, we can take advantage of the fact that SafetyNet's
|
||||||
|
usage of key attestation is opportunistic (i.e. falls back to basic
|
||||||
|
integrity checks if it fails) and prevent it from getting the
|
||||||
|
attestation certificate chain from KeyStore. This is done by checking
|
||||||
|
the stack for DroidGuard, which is the codename for SafetyNet, and
|
||||||
|
pretending that the device doesn't support key attestation.
|
||||||
|
|
||||||
|
Key attestation has only been blocked for SafetyNet specifically, as
|
||||||
|
Google Play Services and other apps have many valid reasons to use it.
|
||||||
|
For example, it appears to be involved in Google's mobile security key
|
||||||
|
ferature.
|
||||||
|
|
||||||
|
Change-Id: I5146439d47f42dc6231cb45c4dab9f61540056f6
|
||||||
|
---
|
||||||
|
.../internal/gmscompat/AttestationHooks.java | 16 ++++++++++++++++
|
||||||
|
.../security/keystore2/AndroidKeyStoreSpi.java | 3 +++
|
||||||
|
2 files changed, 19 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/core/java/com/android/internal/gmscompat/AttestationHooks.java b/core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
index 621156eb84b9..fe12dfe02a9f 100644
|
||||||
|
--- a/core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
+++ b/core/java/com/android/internal/gmscompat/AttestationHooks.java
|
||||||
|
@@ -22,12 +22,15 @@
|
||||||
|
import android.util.Log;
|
||||||
|
|
||||||
|
import java.lang.reflect.Field;
|
||||||
|
+import java.util.Arrays;
|
||||||
|
|
||||||
|
/** @hide */
|
||||||
|
public final class AttestationHooks {
|
||||||
|
private static final String TAG = "GmsCompat/Attestation";
|
||||||
|
private static final String PACKAGE_GMS = "com.google.android.gms";
|
||||||
|
|
||||||
|
+ private static volatile boolean sIsGms = false;
|
||||||
|
+
|
||||||
|
private AttestationHooks() { }
|
||||||
|
|
||||||
|
private static void setBuildField(String key, String value) {
|
||||||
|
@@ -53,7 +56,20 @@ private static void spoofBuildGms() {
|
||||||
|
|
||||||
|
public static void initApplicationBeforeOnCreate(Application app) {
|
||||||
|
if (PACKAGE_GMS.equals(app.getPackageName())) {
|
||||||
|
+ sIsGms = true;
|
||||||
|
spoofBuildGms();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+ private static boolean isCallerSafetyNet() {
|
||||||
|
+ return Arrays.stream(Thread.currentThread().getStackTrace())
|
||||||
|
+ .anyMatch(elem -> elem.getClassName().contains("DroidGuard"));
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ public static void onEngineGetCertificateChain() {
|
||||||
|
+ // Check stack for SafetyNet
|
||||||
|
+ if (sIsGms && isCallerSafetyNet()) {
|
||||||
|
+ throw new UnsupportedOperationException();
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
diff --git a/keystore/java/android/security/keystore2/AndroidKeyStoreSpi.java b/keystore/java/android/security/keystore2/AndroidKeyStoreSpi.java
|
||||||
|
index 33411e1ec5b9..133a4094d434 100644
|
||||||
|
--- a/keystore/java/android/security/keystore2/AndroidKeyStoreSpi.java
|
||||||
|
+++ b/keystore/java/android/security/keystore2/AndroidKeyStoreSpi.java
|
||||||
|
@@ -42,6 +42,7 @@
|
||||||
|
import android.util.Log;
|
||||||
|
|
||||||
|
import com.android.internal.annotations.VisibleForTesting;
|
||||||
|
+import com.android.internal.gmscompat.AttestationHooks;
|
||||||
|
|
||||||
|
import java.io.ByteArrayInputStream;
|
||||||
|
import java.io.IOException;
|
||||||
|
@@ -164,6 +165,8 @@ private KeyEntryResponse getKeyMetadata(String alias) {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Certificate[] engineGetCertificateChain(String alias) {
|
||||||
|
+ AttestationHooks.onEngineGetCertificateChain();
|
||||||
|
+
|
||||||
|
KeyEntryResponse response = getKeyMetadata(alias);
|
||||||
|
|
||||||
|
if (response == null || response.metadata.certificate == null) {
|
52
sync.sh
Executable file
52
sync.sh
Executable file
@ -0,0 +1,52 @@
|
|||||||
|
#!/bin/bash -e
|
||||||
|
# shellcheck disable=SC2250,SC2154,SC2086,SC2207,SC2016
|
||||||
|
|
||||||
|
TOPDIR=$(pwd)
|
||||||
|
|
||||||
|
repo sync -q -c -j 6 --fail-fast --force-sync --no-tags || repo sync -q -c -j 6 --fail-fast --force-sync --no-tags || exit 1
|
||||||
|
|
||||||
|
cd build/tools
|
||||||
|
git am $CI_WORKSPACE/fix-store-build-prop-zip.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
cd packages/apps/LineageParts
|
||||||
|
git am $CI_WORKSPACE/fix-always-enable-taskbar-toggle.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
cd packages/apps/Trebuchet
|
||||||
|
git am $CI_WORKSPACE/fix-enable-more-grids-for-tablet.patch || git am --abort
|
||||||
|
git am $CI_WORKSPACE/fix-trebuchet-taskbar.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
#bluetooth
|
||||||
|
cd packages/modules/Bluetooth
|
||||||
|
git am $CI_WORKSPACE/fix-bt-le.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
#connectivity
|
||||||
|
cd packages/modules/Connectivity
|
||||||
|
git am $CI_WORKSPACE/fix-NetworkStats-disable-BPF.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
#av
|
||||||
|
cd frameworks/av
|
||||||
|
git am $CI_WORKSPACE/fix-rear-camera-rotation.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
#safetynet
|
||||||
|
cd system/core
|
||||||
|
#334348
|
||||||
|
git am $CI_WORKSPACE/snet20-1.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
cd frameworks/base
|
||||||
|
#334343 334344
|
||||||
|
git am $CI_WORKSPACE/snet20-2.patch || git am --abort
|
||||||
|
git am $CI_WORKSPACE/snet20-3.patch || git am --abort
|
||||||
|
git am $CI_WORKSPACE/microg.patch || git am --abort
|
||||||
|
cd $TOPDIR
|
||||||
|
|
||||||
|
cd hardware/qcom-caf/wlan
|
||||||
|
git reset --hard e0f934b
|
||||||
|
cd $TOPDIR
|
||||||
|
#. build/envsetup.sh
|
||||||
|
#repopick
|
Loading…
Reference in New Issue
Block a user