Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: ReloadedOS/frameworks_base
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: u
Choose a base ref
...
head repository: ReloadedOS/frameworks_base
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: wip
Choose a head ref
Checking mergeability… Don’t worry, you can still create the pull request.
  • 11 commits
  • 112 files changed
  • 8 contributors

Commits on Feb 26, 2024

  1. Introduce PropImitationHooks

    This is a squash of the following commits.
    
      Author: Omkar Chandorkar <[email protected]>
      Date:   Thu Sep 1 17:18:58 2022 +0530
    
          Introduce PropImitationHooks
    
          - A minimal implementation to pass CTS and Play Integrity while
            loading correct ARCore profiles if existing
    
          - Loosely inspired by PixelPropUtils from
            https://github.com/PixelExperience/frameworks_base/blob/twelve/core/java/com/android/internal/util/custom/PixelPropsUtils.java
    
          - Thanks Danny for original idea at
            https://github.com/ProtonAOSP/android_frameworks_base/blob/sc-qpr3/core/java/com/android/internal/gmscompat/AttestationHooks.java
    
          - Thanks Dyneteve for fixing Play Integrity API at
            hentaiOS/platform_frameworks_base@c9a086f
    
          Change-Id: I6937258c8297aa909fcdb3b40195cbd6dc0f869b
          Co-authored-by: Chris Crawford <[email protected]>
          Co-authored-by: jhenrique09 <[email protected]>
          Co-authored-by: Danny Lin <[email protected]>
          Co-authored-by: Adithya R <[email protected]>
          Signed-off-by: Omkar Chandorkar <[email protected]>
    
      Author: Danny Lin <[email protected]>
      Date:   Fri Oct 14 09:53:12 2022 +0200
    
          PIHooks: Alter model name to avoid SafetyNet HW attestation
    
          As of September 2, Google is enforcing SafetyNet's previously
          opportunistic hardware-backed attestation based on device information.
          Append a space to the device model name in order to avoid such
          enforcement.
    
          Change-Id: Ib7779e0aae40cab3730a56785e9231896917ab0a
          [ghostrider-reborn: adapt to PIHooks, use invisible space]
          Signed-off-by: Adithya R <[email protected]>
    
      Author: jhenrique09 <[email protected]>
      Date:   Fri Nov 4 15:40:04 2022 -0300
    
          PIHooks: Get package name from context instead of app
    
          11-04 08:48:39.039 11637 11637 E AndroidRuntime: FATAL EXCEPTION: main
          11-04 08:48:39.039 11637 11637 E AndroidRuntime: Process: com.NextFloor.DestinyChild, PID: 11637
          11-04 08:48:39.039 11637 11637 E AndroidRuntime: java.lang.RuntimeException: Unable to get provider androidx.startup.InitializationProvider: androidx.startup.StartupException: android.content.pm.PackageManager$NameNotFoundException: ComponentInfo{/androidx.startup.InitializationProvider}
          11-04 08:48:39.039 11637 11637 E AndroidRuntime:   at android.app.ActivityThread.installProvider(ActivityThread.java:7488)
    
          Change-Id: Icb12f938fe0fca710f8f9d29182d0134ba3c63eb
          [ghostrider-reborn: adapt to PIHooks]
          Signed-off-by: Adithya R <[email protected]>
    
      Author: Adithya R <[email protected]>
      Date:   Thu Feb 9 11:41:44 2023 +0530
    
          PIHooks: Make CTS/Play Integrity pass again
    
          The logic behind SafetyNet CTS and Play Integrity has been updated today
          it now checks the product and model names against the fingerprint and if
          they do not match the CTS profile will fail.
    
          Based on hentaiOS/platform_frameworks_base@32cd021
    
          Co-authored-by: Dyneteve <[email protected]>
          Change-Id: If3a865849c7c99a9c7080114ba94a8f8878bb4f2
    
      Author: Adithya R <[email protected]>
      Date:   Thu Jun 8 16:55:44 2023 +0530
    
          PIHooks: Un-spoof GMS while adding google account
    
          GMS uses its DroidGuard service (the same that's used for safetynet)
          to get the device name from the build fingerprint, which from our
          current certified props, is Pixel XL. The device name after Google
          login shows up in the login alert accordingly as Pixel XL, which is
          inconvenient especially when you have multiple devices on the same ROM.
    
          By restarting the DroidGuard service process (gms.unstable) as soon as
          the user starts adding Google account (i.e when the GMS add account
          activity is started and moved to the top of the task stack), we can
          skip spoofing to certified props in this instance. When the user
          stops/finishes adding account (GMS add account activity is no longer
          at the top of the task stack), restart the process again, this time
          spoofing to certified props in order to be ready for safetynet.
    
          This ensures while adding a Google account, GMS reads the original
          properties of the device and labels the device with its original name,
          while in any other situation GMS reads certified properties required
          to pass SafetyNet/Play Integrity.
    
          Test:
          - Add google account from setup wizard, settings, any other app
          - Observe correct device name in gmail login alert
          - SafetyNet (basic, CTS), Play Integrity (basic, device) passes.
    
          Change-Id: Ia5463f220a8262f7963fc5b2640a7a5311a73210
    
      Author: Adithya R <[email protected]>
      Date:   Mon Sep 19 17:33:34 2022 +0530
    
          PIHooks: Allow spoofing device model for Netflix
    
          It can be used to unlock HDR for devices that don't
          have it by default.
    
          Set config_netflixSpoofModel to the desired model in
          device overlay.
    
          Change-Id: I5d520de143c16e9c6fd10978244f598bd64b4d0a
    
    Change-Id: I7844dc9ac8e2f927e6bb565ee218210b194e6ef0
    gotenksIN authored and madmax7896 committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    37d527f View commit details
    Browse the repository at this point in the history
  2. PIHooks: Allow setting any field in certified build props

    Brand and manufacturer may also be used for attestation checks, as seen
    by _FOR_ATTESTATION fields added in Android 14 [1]. Refactor certified
    properties to allow setting any Build or Build.VERSION string or integer
    field, to make it more scalable for future.
    
    [1]: https://cs.android.com/android/_/android/platform/frameworks/base/+/fb32aac1ea60bf267ff013f6e1023641736c6de5
    
    Change-Id: I16dc8e18a67ffd8fdba8eb9c6928447f82b7d810
    adithya2306 authored and madmax7896 committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    4fa6131 View commit details
    Browse the repository at this point in the history
  3. PIHooks: Get resources from context

    Allows updating overlays on the fly.
    
    Change-Id: Idb85918af06400559e3b17317b3ab88a25828fae
    adithya2306 authored and madmax7896 committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    d8b4091 View commit details
    Browse the repository at this point in the history
  4. PIHooks: Set system props for native hook

    Relay the spoofed (or not) first API and security patch level to
    native PIHooks.
    
    Change-Id: I11a9e9c13a33c1f9962844abba7c83bd040d7a62
    adithya2306 authored and madmax7896 committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    e32249f View commit details
    Browse the repository at this point in the history

Commits on Feb 29, 2024

  1. Configuration menu
    Copy the full SHA
    78a248c View commit details
    Browse the repository at this point in the history
  2. base: Add minimal support for Richtap vibrations

    This implementation of Richtap is highly inspired by Nothings but stripped down to its essentials to match our needs.
    
    If your device supports Richtap vibrations set "config_usesRichtapVibration" to true and enjoy!
    
    Co-Authored-By: Chris Crump <[email protected]>
    Co-Authored-By: Jake Weinstein <[email protected]>
    Co-Authored-By: UP5468-GE-ES44AC <[email protected]>
    Co-Authored-By: Anay Wadhera <[email protected]>
    
    Change-Id: I4f8b5deb7b303a3adf388335aa1ee8b1e048af24
    33bca authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    2261b3e View commit details
    Browse the repository at this point in the history
  3. SystemUI: Implement Reverse-engineered Smartspace

    From SQ3A.220605.009.A1
    
    [ghostrider-reborn]
    - Adapt to aosp, fix crash on click, misc cleanup
    
    This squashes the following commits:
    Author: Jake Weinstein <[email protected]>
    Date:   Sat Jun 17 05:29:07 2023 +0900
    
        SystemUI: Apply "Remove smartspace flag" to KeyguardSmartspaceController
    
        Change-Id: I7bbd0767d69d54854db691f6c90188a33373f529
    
    Author: Adithya R <[email protected]>
    Date:   Thu May 18 10:40:11 2023 +0530
    
        fixup! SystemUI: Open google weather on tapping smartspace
    
        Add null check for smartspaceTarget before hijacking the intent.
    
        Fixes AOSPA/Tracker#5
    
        Change-Id: I1cf9057589f88ba1571a5068fb639cbe011f7a67
    
    Author: Adithya R <[email protected]>
    Date:   Thu Jan 26 12:32:39 2023 +0530
    
        SystemUI: Open google weather on tapping smartspace
    
        Since smartspace weather activity won't open due to
        caller package (Launcher3) not being google signed,
        hijack the intent to open the google app's exported
        weather activity, which behaves in the same fashion.
    
        Change-Id: Ic01ede73ab6253bcb301ac794985c3720c5beda3
    
    Author: Ido Ben-Hur <[email protected]>
    Date:   Wed Mar 15 11:21:00 2023 +0200
    
        SystemUI: smartspace: Adapt to 13-QPR2
    
        Change-Id: I142ee24fb02d2234fc1aec50b8d7ff03eba3d5cf
        Signed-off-by: aswin7469 <[email protected]>
    
    Author: Adithya R <[email protected]>
    Date:   Wed Jan 25 18:24:21 2023 +0530
    
        [WIP] SystemUI: Update smartspace to 13-QPR1
    
        Credits to https://github.com/BenzoRom/frameworks_packages_SystemUIGoogle (Jason Edson <[email protected]>) for SystemUIGoogle jar and resources.
    
        Change-Id: I82c310ca72a5b4ae33b414fda223d127abd0d8d2
    
    Author: Adithya R <[email protected]>
    Date:   Sat Oct 15 15:04:25 2022 +0000
    
        SystemUI: BcSmartspaceView: Allow setting current page
    
        Required by launcher smartspace.
    
        Change-Id: I51d7728b6b2d3d7dfb06e39d1c9363f89795b54f
    
    Author: jhenrique09 <[email protected]>
    Date:   Wed Oct 5 12:26:30 2022 +0900
    
        SystemUI: Smartspace: Fix music indication on doze/aod
    
        Change-Id: If375051a6bf44c67344ad05a4366b6cc663f15d9
        Signed-off-by: Omkar Chandorkar <[email protected]>
    
    Author: Adithya R <[email protected]>
    Date:   Thu Aug 18 19:11:14 2022 +0530
    
        SystemUI: Forward-port smartspace to Android 13
    
        Change-Id: Iddf5c22562b1858e3159fd939c54890e23b29063
    
    Author: SahilSonar <[email protected]>
    Date:   Mon Oct 16 16:01:54 2023 +0200
    
        SystemUI: Forward-port smartspace to Android 14
    
        Change-Id: Ie408c347613af96cf271735071c93e374ae9e06e
    
    Change-Id: I39444dd95621ccfbe1dfd737e357145014e440d0
    Co-authored-by: Anay Wadhera <[email protected]>
    Co-authored-by: Adithya R <[email protected]>
    3 people authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    42d20bf View commit details
    Browse the repository at this point in the history
  4. SystemUI: Set launcher activity name to ReloadedLauncher

    This should perhaps be an overlay.
    
    Change-Id: Iaf272b461ffa36873f9baef82aca099068e5146a
    adithya2306 authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    9c53ee7 View commit details
    Browse the repository at this point in the history
  5. CameraManager: Handle NPE with ActivityThread.currentOpPackageName()

    Arguably we should get the package name from context instead of
    ActivityThread, but passing context to these static functions
    is a pain in the ass.
    
    11-18 22:51:36.468 W/Binder  (10072): Caught a RuntimeException from the binder stub implementation.
    11-18 22:51:36.468 W/Binder  (10072): java.lang.NullPointerException: Attempt to invoke virtual method 'boolean java.lang.String.equals(java.lang.Object)' on a null object reference
    11-18 22:51:36.468 W/Binder  (10072): 	at android.hardware.camera2.CameraManager$CameraManagerGlobal.onTorchStatusChangedLocked(CameraManager.java:2401)
    11-18 22:51:36.468 W/Binder  (10072): 	at android.hardware.camera2.CameraManager$CameraManagerGlobal.onTorchStatusChanged(CameraManager.java:2542)
    11-18 22:51:36.468 W/Binder  (10072): 	at android.hardware.ICameraServiceListener$Stub.onTransact(ICameraServiceListener.java:167)
    11-18 22:51:36.468 W/Binder  (10072): 	at android.os.Binder.execTransactInternal(Binder.java:1285)
    11-18 22:51:36.468 W/Binder  (10072): 	at android.os.Binder.execTransact(Binder.java:1244)
    
    Change-Id: I2ef1aac1a594d16f11cbc7a6adef82d5e8ee747c
    adithya2306 authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    807dce7 View commit details
    Browse the repository at this point in the history
  6. SystemUI: Grant additional permissions for smartspace

    Change-Id: I55df836bf545554eda95085bc71c7cbfca4cfcc5
    Signed-off-by: Andrzej Perczak <[email protected]>
    Signed-off-by: Pranav Vashi <[email protected]>
    Signed-off-by: Omkar Chandorkar <[email protected]>
    xNombre authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    2efecca View commit details
    Browse the repository at this point in the history
  7. SystemUI: Add missing permission for Smartspace.

    11-19 10:05:22.800  3994  3994 W BcSmartspaceView: Unable to register Doze Always on content observer.
    11-19 10:05:22.800  3994  3994 W BcSmartspaceView: java.lang.SecurityException: No access to content://settings/secure/doze_always_on: Neither user 10209 nor current process has android.permission.INTERACT_ACROSS_USERS_FULL.
    
    Change-Id: Ibaf64b2e19ee5010a1e58317ede8aa8498bd4ff0
    spezi77 authored and madmax7896 committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    ef2f049 View commit details
    Browse the repository at this point in the history
Loading