Robotnix | 245 Members | |
| Build Android (AOSP) using Nix | https://github.com/danielfullmer/robotnix | 75 Servers |
| Sender | Message | Time |
|---|---|---|
| 25 Nov 2024 | ||
| If I'd buy a new Android phone right now, I'd probably go for 256GB model of Pixel 9 Pro | 21:00:39 | |
| I have instantnoodlep which is OnePlus 8 Pro, it's also a bit old at this point, the last officially supported update came out few months ago. (OnePlus usually supports their devices for 4 years.) Then I used my even older OnePlus 5T (dumpling) as a test phone, even that seems to run LineageOS 21. But I think that's because that LineageOS developer luk1337 puts quite much effort to supporting those devices | 21:03:52 | |
| https://github.com/melontini/bootloader-unlock-wall-of-shame | 21:06:14 | |
| What is cool about Pixel 8 and Pixel 9 is that they support the new ARM Memory Tagging Extensions | 21:10:25 | |
| https://googleprojectzero.blogspot.com/2023/11/first-handset-with-mte-on-market.html | 21:13:35 | |
| 26 Nov 2024 | ||
| samueldr: oak Thanks for the info! | 14:45:40 | |
| 20:40:37 | ||
| Hi. Anyone here know how to compare pvmfw.img between two AOSP (Android 15) builds? It is an unusual file structure and I don't know how to unpack this before comparing with diffoscope. | 20:41:42 | |
What is the file type? | 20:42:25 | |
| pvmfw.img is an Android boot image (according to the | 20:44:55 | |
| 20:49:37 | |
| It's a really weird couple of files and I really don't know how to make diffoscope compare them properly. | 20:51:38 | |
| The pvmfw.img file itself has this type:
| 20:53:22 | |
| Maybe I should try checking if platform/build/+/master/tools/extract_kernel.py can make some sense out of it. | 20:54:16 | |
| Yeah, not even AOSP's extract_kernel.py can make some sense out of pvmfw.img.unpacked/kernel. | 21:06:33 | |
| * Yeah, not even AOSP's | 21:06:41 | |
| * Maybe I should try checking if | 21:06:48 | |
| Aside from this, I've also used | 21:14:19 | |
| * Aside from this, I've also used | 21:14:29 | |
| jack: when I hit a weird filetype, especially when it's likely others have it it, searching its filename in github code search helps... when you know how to use it, which is non-obvious: use a regex to search | 21:14:54 | |
In reply to @samueldr:matrix.orgThat's a good idea. Thanks. | 21:15:32 | |
| given I see Protected VM firmware image along it, maybe that's not "just" a linux kernel | 21:16:05 | |
| even though it's packaged within the "container" of an android boot image | 21:16:24 | |
In reply to @jack:unredacted.orgAny idea on this one? | 21:16:48 | |
| https://github.com/GrapheneOS/platform_packages_modules_Virtualization/tree/9ec1c44084125875aa9619635e4e6fdf3172b57c/pvmfw#integration | 21:17:07 | |
In reply to @jack:unredacted.orgnope | 21:17:27 | |
In reply to @jack:unredacted.orgboot.img unpacked perfectly and has a perfect ARM64 kernel image, but I personally don't know how to compare different kernel images, maybe I have to strip signatures like I successfully did with the kernel modules before. | 21:18:06 | |
In reply to @jack:unredacted.org* | 21:18:20 | |
| 21:18:41 | ||
| 21:18:52 | |