I guess what I mean is the Changelog from the Official LineageOS site. I see the odd fixes here & there and did not know if these changes would be merged with your ROM.
That is just lineageOS trying to fix stuff that isn't broken, breaking it in the process and then trying to fix it backI guess what I mean is the Changelog from the Official LineageOS site. I see the odd fixes here & there and did not know if these changes would be merged with your ROM.
Wasn't this fixed with the October security patch?Fixed krack vulnerability
Only partially. Follow-up patches were released for the Linux kernel quite laterWasn't this fixed with the October security patch?
Cuz EAScpu is alwais on max freq althoug there is no load
---------- Post added at 17:57 ---------- Previous post was at 17:38 ----------
or, maybe ex kernel manager shows incorectly
echo "cp /cache/su.img /data/ && chmod 777 /data/su.img" >> /system/etc/init.d/supersu.sh && chmod 777 /system/etc/init.d/supersu.sh
cd /sdcard
su
dd if=twrp.img of=/dev/block/bootdevice/by-name/recovery
Oh what the sources were never uploaded fully as far as I was aware. Or atleast compiledHaruhirom will be rebranded to glassrom
We now have 3 developers
The source has been moved to https://github.com/GlassROM
I still remain the main developer for, uh, this ROM, this one, right here. (Yeah there's a bit of confusion on the name)
Roles:
@anupritaisno1, me will be in charge of quality control, OMS, upstreaming, security patches and kernel work
@PDesire will be maintaining yoga time. It's an aicp feature and for all you perverts out there we're adding it
@Aaahh is going to do whatever the hell he wants
The next build will have (op2-specific)
Kernel: June security patch
WiFi driver from June
Linux 3.10.107
To manage permissions effectively, the signing keys used on this ROM will be switched to release-keys. This increases security a lot but it unfortunately is going to require you to clean flash the ROM.
Have a titanium backup ready.
Remember to have fun
You can go ahead and do soOh what the sources were never uploaded fully as far as I was aware. Or atleast compiled
in any case shake it up and support more devices
looking to fork for a overnight android session, stable?
I have plans to add a separate verity key that actually doesn't enable verity but fools the bootloader in order for you to lock it. That will very soon make it 5 keys instead of 4Small announcement
You can safely ignore this if not interested
So some people might not know how to use these files to verify integrity
The .md5sum file is the md5sum has. Place this file in the same directory as the ROM before flashing and twrp will verify the integrity for you. Note that md5sum is very weak so false negatives in verification are possible
Any .shaxxxsum where x can be 1, 256, 512, 224 are sha{1,256,512,224} sums of the files. Pick whichever is convenient for you to verify
The .cert.txt is the signature of the zip file. To verify this, it's the same as verifying an application signature
keytool -list-printcert-jarfile *zip should do the trick. This isn't for beginners
The .sig file is the gpg detached signature of the ROM zip. It is complicated for a beginner to set up gpg verification but once it is done all you gotta do is gpg --verify <name_of_sig_file_with_extension> The gpg public key is in the same folder. It is gpg.key
The ROM signature is divided into 4 keys. Only the release-key fingerprint is disclosed.
All signing keys are sha256withrsa, 2048-bit and public exponent 3
The gpg key is 4096-bit with RSA
Avoid md5sum digest and sha1sum digests. They are weak and you should only use them if you have a proper reason to do so