We did not have early access to Android 16 QPR1 and have not been able to start porting yet. We should have early access prior to Android 16 QPR2.
We're going to need to make private repositories for working on this stuff internally. We can potentially make special preview releases based on these.
@GrapheneOS So just to check my understanding here, you'd make a special release, binaries only for the patches. Someone outside the project decompiles the binary, uses it to discover the vulnerability, which they then report to you. Then you fix it for regular Graphene users.
If I'm understanding correctly, then is there a chance the regular Graphene users don't get the patches if nobody outside the project does the decompiling? I would love to contribute, and maybe this is a reason to get good at doing this kind of thing. But I don't think my technical skills are up to scratch yet.
@BucciaBuccia Nearly all OEMs were failing to ship the monthly security patch backports despite how straightforward it is. The backports alone are not even particularly complete patches. They're only the High and Critical severity Android patches and a small subset of external patches for the Linux kernel, etc. Getting the full Android patches requires the latest stable releases.
They changed the system to make OEMs look better. It's due to pressure from some OEMs and Google marketing Android.