Download in Post #2
- don't send IMSI / Phone number to SUPL server when SUPL is enabled (note: using SUPL is always an optional choice in APN configuration on GrapheneOS, unlike AOSP and the stock OS)
- SELinux policy: drop auditing for apk_data_file execute/execute_no_trans (research is done)
- SELinux policy: add back apk_data_file execute/execute_no_trans for adb shell for debugging use cases (removing it isn't really useful for hardening and we plan on hardening ADB for the verified boot model another way)
- Settings: revert to standard Android 13 minimum threshold of 10% for automatic battery saver since lowering it below 10% doesn't work as intended without more invasive changes outside the scope of GrapheneOS
- fully disallow installing instant apps instead of permitting ADB shell and system apps to do it (this will simplify future work)
- extend self app-op spoofing used for Network permission compatibility to unsafeCheckOpRaw()
- fix upstream bug causing crash from isServiceTokenValidLocked() being called without holding the lock
- Sandboxed Google Play compatibility layer: support enabling compatibility layer for any package on debuggable builds to help with development
- Sandboxed Google Play compatibility layer: coerce Play Store into not attempting to auto install AR services
- Sandboxed Google Play compatibility layer: fix issues with Play Store updates of Play services
- Sandboxed Google Play compatibility layer: avoid our implementation of the Play services location API returning null for getCurrentLocation() to avoid crashes in apps not handling it
- Sandboxed Google Play compatibility layer: increment compatibility layer version to 1001
- Sandboxed Google Play compatibility layer: use the most recent available version map in GmsCompatConfig to simplify defining configuration
- Sandboxed Google Play compatibility layer: improve stack trace parser used for dynamic exception shims
- Sandboxed Google Play compatibility layer: add shim for making Bluetooth adapter discoverable
- Sandboxed Google Play compatibility layer: improve UX for "Action required in Play Store" notification
- Sandboxed Google Play compatibility layer: add new shims to support requesting temporary screen capture from the user via the standard unprivileged approach for Chromecast screen casting (currently lacks shims to support audio capture)
- GmsCompatConfig: add stub for LocationManager.registerGnssStatusCallback()
- GmsCompatConfig: update max supported version of Play services and Play Store
- stop re-enabling deprecated 2-button navigation option since Android no longer has official support for it and is gradually breaking support for it including making changes knowingly introducing bugs with it since it's not meant to be used (traditional 3-button navigation is still fully supported)
- Settings: add GrapheneOS Camera to list of mandatory components since only system camera apps can provide the media capture intents required by other apps on Android 11 and above (can still be disabled via ADB but we want to avoid easy ways to break the OS in the UI)
- kernel (Generic 5.15): update to latest GKI LTS branch revision including update to 5.15.80
- extend the install available apps feature (allows Owner user to install apps in other users) to apps only installed in secondary profiles
- Apps: update to version 13
- add GrapheneOS fs-verity public key as a supported key
- require fs-verity for installing system app updates (will be enforced at boot for verified boot enhancement in a future release due to the need to phase in the feature properly because of future out-of-band app updates on earlier OS releases)
- Vanadium: update Chromium base to 109.0.5414.118
- SettingsIntelligence: drop no longer required QUERY_ALL_PACKAGES permission now that more precise queries are defined upstream providing the necessary package visibility for Settings app search
I am glad you appreciate it, so to answer your questionsHi,
First, thank you for your dedication releasing all these patched version of the ROM.
I'm actually using ProtonAOSP but I'm highly thinking about switching to GrapheneOS and I need Root.
If I flash your GrapheneOS build but one day you will stop updating your rooted release, will I be able to update it with my own version or does it change something about the signing of the ROM ?
Kind regards
Download in Post #2
- Settings: fix issue preventing users from re-enabling system apps they previously disabled which can no longer be disabled
- fix upstream Android bug causing out-of-band updates to system components using original-package to be rolled back after reboot if they're still using the old package name, which will allow us to ship Vanadium updates out-of-band without the browser package updates being rolled back for users with an older install where it's still org.chromium.chrome instead of app.vanadium.browser
- SELinux policy: drop base OS apk_data_file restrictions to avoid blocking out-of-band updates to APK-based system components (this was a minor security feature that's being replaced with our recent and ongoing improvements to package manager and verified boot security to close major weaknesses in the standard Android verified boot security model)
- disable package parser cache since it provides a verified boot bypass for system component updates for regular boots while saving less than a second of boot time
- perform additional boot-time checks on system package updates in order to extend verified boot to out-of-band system package updates including enforcing having valid signed fs-verity metadata for continuous verification (Android does not even provide working boot-time verification for out-of-band APK updates for non-APEX components)
- reimplement requiring fs-verity when installing system package updates in a better way
- remove unnecessary warning for failed virtual A/B sideloaded updates since it's atomic just like A/B updates
- drop our extension to the install available apps feature (which is still available, without this extension) making it work for apps not installed in Owner since this is risky in a situation where there are actually separate people using secondary users and while we want to provide this feature, we'd need to come up with a way to address this to add it back
- SetupWizard: stop enabling Wi-Fi automatically
- SetupWizard: stop sending unused sticky broadcast
- kernel (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Generic 5.10): update to latest GKI LTS branch revision
- kernel (Generic 5.15): update to latest GKI LTS branch revision including update to 5.15.89
- kernel (Pixel 7, Pixel 7 Pro): update Mali GPU driver to QPR2 Beta 3 release
- kernel (Pixel 4, Pixel 4 XL, Pixel 4a, Pixel 4a (5G), Pixel 5, Pixel 5a): update base kernel to Android 13 QPR2 Beta 3 providing 2023-02-05 security patch level for the kernel
- Apps: update to version 14
- Auditor: update to version 68
- Camera: update to version 59
- Vanadium: update Chromium base to 110.0.5481.61
Download in Post #2
- full 2023-02-01 security patch level
- full 2023-02-05 security patch level
- rebased onto TQ1A.230205.002 release
- kernel (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Generic 5.10): update to latest GKI LTS branch revision including update to 5.10.162
- kernel (Generic 5.15): update to latest GKI LTS branch revision including update to 5.15.91
- Seedvault: update to latest revision (we plan on replacing this with a new backup implementation since Seedvault is buggy/unreliable, has consistently needed security fixes applied downstream, has failed to provide the originally planned core features and despite being initially created by a GrapheneOS community member for GrapheneOS was taken over by a group hostile towards it)
- Seedvault: require lock method to enable backups to prevent accessing internal app data for a device that has been unlocked without the lock method for the user profile, similar to how enabling developer options requires the lock method
- SetupWizard: update GrapheneOS string branding
- fix renaming of original-package Vanadium provider authorities regressed in the previous release due to the fix for an upstream Android 13 bug
- Dialer: add dark mode to call UI dial pad
- Pixel 4, Pixel 4 XL: switch to TP1A.221005.002.B2 (February 2022) vendor files
- GmsCompatConfig: update max supported version of Play services and Play Store
Hi, thank you for the answer and sorry for answering so lately, I was on holiday.I am glad you appreciate it, so to answer your questions
You will be able to update it with your own build of grapheneOS if you didn't lock the bootloader
But if you did lock the bootloader, to my understanding you will either need to unlock the bootloader or build your version of the rom signed with the same keys I used. it's possible for you to easily backup everything on your phone with a thing like Swift Backup if your phone is rooted, so you could perform a full backup in order to switch to your build
when you lock the bootloader, everything you flash will need to be signed correctly with the correct keys
which is why I use AVBRoot to patch and sign the OTA files
not a problem, and well basically if you keep the bootloader unlockedHi, thank you for the answer and sorry for answering so lately, I was on holiday.
If i keep the bootloader unlocked, can I just manually sideload the updates, patch the boot with Magisk Manager and flash it and do it like that every month or is there something else special to do ?
I have not tried, it would be fairly easy to try for yourselfA question. Is this rom suitable for running aosp mod and project theme?
My Pleasure
How Can i contact you?I have not tried, it would be fairly easy to try for yourself
I may try using AOSPMods but Project Themer costs money so I am not able to test that
My Pleasure
Sure, not a problem
you need to use that command in the location you have that fileI tried to install but it shows for ./flash as invalid and tried just flash without ./ and it says fastboot missing... When tried fastboot --version its showing a valid fastboot, tried to reinstall and all
Nothing worked
So its not via command in adb... Unzip tha file and open command line and proceed rightyou need to use that command in the location you have that file
like open the terminal in the location of the flash.sh or flash.bat so that using ./ will point it to the right file
yes exactly, follow the installation instructions https://grapheneos.org/install/cli#flashing-factory-imagesSo its not via command in adb... Unzip tha file and open command line and proceed right
Download in Post #2
- kernel (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Generic 5.10): update to latest GKI LTS branch revision including update to 5.10.168
- kernel (Generic 5.15): update to latest GKI LTS branch revision including update to 5.15.94
- HTTPS-based network time: switch to custom X-Time header with UTC time in milliseconds to improve precision
- HTTPS-based network time: establish HTTPS connection with another request in advance and then reuse it to improve accuracy
- HTTPS-based network time: set clock offset field used by tests
- HTTPS-based network time: improve logging
- HTTPS-based network time: simplify implementation
- reduce time update threshold to 50ms from Android's default 2000ms instead of allowing the clock to get up to 2s out-of-date
- reduce system clock drift warning to 250ms from Android's default 2000ms
- simplify our implementation of disabling cellular-based automatic time by using the standard permitted origin configuration
- simplify our implementation of disabling network time refresh when automatic time is disabled (unlike GrapheneOS, Android always performs network time checks and the user only controls whether the results from any of the automatic time methods are used)
- Messaging: avoid crash caused by upstream bug when forwarding a message
- Seedvault: add back restore action in settings without marking it experimental
- Settings: fix accessibility settings links for SetupWizard
- add shared infrastructure for GrapheneOS settings and port the settings to it (improves UI of Settings)
- Settings: only allow Owner to control our added toggle for camera availability on lockscreen since it's global
- hardened_malloc: preserve errno for free calls (future POSIX requirement)
- simplify infrastructure for special runtime permissions (Network, Sensors)
- Sandboxed Google Play compatibility layer: remove obsolete shim now handled by GmsCompatConfig
- GmsCompatConfig: update to version 33
- GmsCompatConfig: update to version 34
- Vanadium: update to version 110.0.5481.65
- Vanadium: update to version 110.0.5481.154
- use C.UTF-8 locale for build environment to avoid dependency of the en_US.UTF-8 locale being available
- ---- 2023020600 release changes ----
- add toggle to Settings ➔ Location for force disabling SUPL as a carrier-independent replacement for editing APN configuration since editing APN configuration is unintuitive, not fully respected on Tensor SoC devices and users with no carrier should be able to disable it without using airplane mode
- Vanadium: update Chromium base to 110.0.5481.64
- GmsCompatConfig: update max supported version of Play Store
- Apps: update to version 15
ah sorry I did mean 25.2, and I don't really know, I think it could be different for different roms on the same device15.2 or 25.2 for Magisk ?
If I'm not worng, all oriole will have same partition name? I thought it was unique for each oriole device.
I don't really understand exactly what you are doing or not doing to have that issueThanks for the knowledge, I'm struggling with setting up Magisk patched GrapheneOS for a Pixel 4a (sunfish).
I'm using Magisk 26.0, tried Magisk 25.2 also.
Everything goes fine. But at the end, I don't have a writable system partition. Tried Root Explorer and nothing happens when I mount rw.
Tried adb to remount as rw, getting: 'sysfs' not user mountable in fstab .
Could you help in this?
Full system install builds for clean and new installs
Build based on release#2023050100 (2023-05-01)
SourceForge_Download
Build based on release#2023041100 (2023-04-11)
SourceForge_Download
Build based on release#2023032000 (2023-03-20)
SourceForge_Download
Build based on release#2023022300 (2023-02-23)
SourceForge_Download
Build based on release#2023020600 (2023-02-06)
SourceForge_Download
Build based on release#2023020200 (2023-02-02)
SourceForge_Download
Build based on release#2023012500 (2023-01-25)
SourceForge_Download
Build based on release#2023011000 (2023-01-10)
SourceForge_Download
Build based on release#2023010300 (2023-01-03)
Anonfiles Download | 1fichier Download | SourceForge_Download
Build based on release#2022122000 (2022-12-20)
Anonfiles Download | 1fichier Download
Build based on release#2022121400 (2022-12-14)
Anonfiles Download | 1fichier Download
Build based on release#2022121100 (2022-12-11)
Anonfiles Download | 1fichier Download
Build based on release#2022120300 (2022-12-03)
Anonfiles Download | 1fichier Download
Build based on release#2022113000 (2022-11-30)
Anonfiles Download
Build based on release#2022112500 (2022-11-25)
Anonfiles Download
Build based on release#2022111800 (2022-11-18)
Anonfiles Download
Build based on release#2022111000 (2022-11-10)
Anonfiles Download
Build based on release#2022101800 (2022-10-18)
Anonfiles Download
Full OTA Builds will let you update from any older version
Patched OTA based on release#2023050100 (2023-05-01)
SourceForge_Download
Patched OTA based on release#2023041100 (2023-04-11)
SourceForge_Download
Patched OTA based on release#2023032000 (2023-03-20)
SourceForge_Download
Patched OTA based on release#2023022300 (2023-02-23)
SourceForge_Download
Patched OTA based on release#2023020600 (2023-02-06)
SourceForge_Download
Patched OTA based on release#2023020200 (2023-02-02)
SourceForge_Download
Patched OTA based on release#2023012500 (2023-01-25)
SourceForge_Download
Patched OTA based on release#2023011000 (2023-01-10)
SourceForge_Download
Patched OTA based on release#2023010300 (2023-01-03)
Anonfiles Download | 1fichier_Download | SourceForge_Download
Patched OTA based on release#2022122000 (2022-12-20)
Anonfiles Download | 1fichier_Download
Patched OTA based on release#2022121400 (2022-12-14)
Anonfiles Download | 1fichier Download
Patched OTA based on release#2022121100 (2022-12-11)
Anonfiles Download | 1fichier Download
Patched OTA based on release#2022120300 (2022-12-03)
Anonfiles Download | 1fichier Download
Patched OTA based on release#2022113000 (2022-11-30)
Anonfiles Download
Patched OTA based on release#2022112500 (2022-11-25)
Anonfiles Download
Patched OTA based on release#2022111800 (2022-11-18)
Anonfiles Download
Patched OTA based on release#2022111000 (2022-11-10)
Anonfiles Download
Patched OTA based on release#2022110800 (2022-11-08)
Anonfiles Download
Sorry but I am not interested in arguing about this stuffI don't see a real value in locking the bootloader. In theory, the only thing it protects is undetectable modification being made when the device is out of your direct control. However, strong security practices require you to assume that *anything* could have been done to the device when it is outside of your direct control, so the "security" you get from the locked bootloader is artificial.
ANY time a device leaves your physical control, you have to assume it to be compromised. No exceptions.
I would also like to point out that, no offense to OP, but using a "high security" operating system that *HAS* been modified by an unknown 3rd party.... is insane. I'd recommend that anyone interested in this actually take the time to understand the process and reproduce it on their own.
I am offering this as a free feature, not a donate feature and I have also created a guide so that anyone is able to build the rom and sign it using their own keys for even greater security than trusting me.The rom could be used on locked bootloader with ROOT (donate feature) with or without Gapps.
The benefits of LOCKED BOOTLOADER combined with WORKING AVB-2 protection are:
Get back your DRM L1 certificate. Most banking apps will work regardless of Magisk.
Security: Nobody and nothing can modify Kernel, Recovery and Virtual Partitions without triggering a red screen of death with the message 'your device is corrupted and cannot boot'.
At that point, the only option is to unlock bootloader. But, if a user had previously disabled OEM unlock in Developer settings, then unlocking becomes unavailable, and so does flashing via fastboot. In other words, if your phone gets into the hands of an adversary, their only option is to use MSM tool to make the phone work again, but no access to your data or any other partition.
Why prebuilt Magisk? Because you can't modify kernel or recovery on locked bootloader post installation, and that's exactly what Magisk does.
Thank you for pointing this outCan i flash the raven image on oriole too isn't it?
The Pixel 6's link to buids redirect to the raven post