Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 00f17fc0 authored by uazo's avatar uazo Committed by github-actions[bot]
Browse files

[AUTO][DOC] Generate patches doc for master branch

parent c65ef30a
Loading
Loading
Loading
Loading
+2 −1
Original line number Diff line number Diff line
@@ -51,7 +51,7 @@
|**Android fonts fingerprinting mitigation** <br><sub><nobr> Sat, 15 Feb 2025 16:25:31 +0000</nobr> <br>File: [Android-fonts-fingerprinting-mitigation.patch](/build/patches/Android-fonts-fingerprinting-mitigation.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> |Replaces system fonts with a predefined set downloaded from www.cromite.org|
|**Ask to restart on connection change** <br><sub><nobr> Tue, 18 Jun 2024 15:31:12 +0000</nobr> <br>File: [Ask-for-restart-on-connection-change.patch](/build/patches/Ask-for-restart-on-connection-change.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> |Experimental use of the OfflineDetector to identify network change, disabled by default.<br>If it is active, when the network change is detected by the android API,<br>the user is warned and asked to restart the browser.<br>Technically, blink's freeze mode is exploited, which allows javascript<br>execution and network calls to be blocked.<br>A preventive shutdown of all service workers is carried out, to inhibit the sending<br>of messages over the new ip, since the service workers have access<br>to the background fetch api.<br>The freeze and resume event of javascript is deliberately left, since the<br>page could deduct it in any case. In any case during the execution of<br>the javascript events, the page can only access the FetchLater api,<br>which is disabled by another patch.<br>The patch also changes the standard behaviour of the browser, allowing visible pages to freeze.<br>This could lead to the failure of some DCHECKS related to the handling of UI messages at unfreeze,<br>but since the goal is a reboot, this should not be the case.|
|**AudioBuffer, AnalyserNode: fp mitigations** <br><sub><nobr> Sun, 25 Mar 2018 21:49:37 +0200</nobr> <br>File: [AudioBuffer-AnalyserNode-fp-mitigations.patch](/build/patches/AudioBuffer-AnalyserNode-fp-mitigations.patch) <br><nobr>Author: csagan5</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |Truncate base latency precision to two digits|
|**Backport-v144-android-extensions-changes** <br><sub><nobr> Thu, 6 Nov 2025 13:22:24 +0000</nobr> <br>File: [Backport-v144-android-extensions-changes.patch](/build/patches/Backport-v144-android-extensions-changes.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: </nobr> |Enable support for anonymous browsing.<br>Backport of bugid 7089957 extensions Use BrowserWindowInterface in ExtensionViewHost<br>https://chromium-review.googlesource.com/c/chromium/src/+/7089957|
|**Backport-v144-android-extensions-changes** <br><sub><nobr> Thu, 6 Nov 2025 13:22:24 +0000</nobr> <br>File: [Backport-v144-android-extensions-changes.patch](/build/patches/Backport-v144-android-extensions-changes.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: </nobr> |Enable support for anonymous browsing.<br>Backport of bugid<br>7089957: extensions Use BrowserWindowInterface in ExtensionViewHost<br>https://chromium-review.googlesource.com/c/chromium/src/+/7089957<br>7126008: Destroy ExtensionWindowControllerBridge when its Profile is destroyed<br>https://chromium-review.googlesource.com/c/chromium/src/+/7126008|
|**Battery API: return nothing** <br><sub><nobr> Thu, 22 Mar 2018 22:11:57 +0100</nobr> <br>File: [Battery-API-return-nothing.patch](/build/patches/Battery-API-return-nothing.patch) <br><nobr>Author: csagan5</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |Include @thestinger's fix for correct charging/unknown values|
|**Block Intents While Locked** <br><sub><nobr> Tue, 31 Oct 2023 16:16:08 +0000</nobr> <br>File: [Block-Intents-While-Locked.patch](/build/patches/Block-Intents-While-Locked.patch) <br><nobr>Author: Your</nobr> <br><nobr>Context: </nobr> <br><nobr>License: </nobr> |see https://source.chromium.org/chromium/chromium/src/+/c5b50f4c2d42e7b808fd3e6fb3545cdb3f4d82c9|
|**Block gateway attacks via websockets** <br><sub><nobr> Tue, 28 Jul 2020 12:28:58 +0200</nobr> <br>File: [Block-gateway-attacks-via-websockets.patch](/build/patches/Block-gateway-attacks-via-websockets.patch) <br><nobr>Author: csagan5</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |This approach is not comprehensive, see also:<br>* https://bugs.chromium.org/p/chromium/issues/detail?id=590714|
@@ -264,6 +264,7 @@
|**Show NTP at startup** <br><sub><nobr> Tue, 27 Feb 2024 16:20:43 +0000</nobr> <br>File: [Show-NTP-at-startup.patch](/build/patches/Show-NTP-at-startup.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> |Adds an active option by default to automatically open the<br>NTP at each reboot and allows the user to continue the old browsing.<br>Until the real tab is opened, no data is retrieved.|
|**Show site settings for cookies, javascript and ads** <br><sub><nobr> Sat, 28 Dec 2019 10:23:04 +0100</nobr> <br>File: [Show-site-settings-for-cookies-javascript-and-ads.patch](/build/patches/Show-site-settings-for-cookies-javascript-and-ads.patch) <br><nobr>Author: csagan5</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |Avoid displaying info about intrusive ads|
|**Site setting for images** <br><sub><nobr> Tue, 5 Oct 2021 08:38:52 +0000</nobr> <br>File: [Site-setting-for-images.patch](/build/patches/Site-setting-for-images.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |Require: Content-settings-infrastructure.patch|
|**Supporting Dangling Ptr Detection via BackupRefPtr** <br><sub><nobr> Thu, 11 Dec 2025 09:53:13 +0000</nobr> <br>File: [Supporting-Dangling-Ptr-Detection-via-BackupRefPtr.patch](/build/patches/Supporting-Dangling-Ptr-Detection-via-BackupRefPtr.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> |Enable Dangling Ptr Detection (DPD) via BackupRefPtr (BRP) (disabled by default)<br>and additional safety checks that are too expensive to have on by default.<br>Enable checking raw_ptr do not become dangling during their lifetime.<br>Write a fixed cookie pattern at the end of each allocation to ensure there is no OOB write.<br>Enable MTE activation in Android for enabled devices (flag disabled by default)<br>BRP and MTE activate additional checks related to memory usage at the expense of<br>performance and increased memory usage, but guarantee the user that the browser<br>will not suffer from development errors related to memory management.|
|**Switch to -fstack-protector-strong** <br><sub><nobr> Wed, 26 Dec 2018 10:20:24 -0500</nobr> <br>File: [Switch-to-fstack-protector-strong.patch](/build/patches/Switch-to-fstack-protector-strong.patch) <br><nobr>Author: Daniel</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-3.0-only</nobr> |This compiler option is already used for ChromeOS, but not yet on other<br>platforms because there is push back against enabling an option resulting in<br>~1-2% lower performance and ~2-3% larger binaries.<br>The size increase on Android is something they care a lot about since some<br>devices have very little storage space. That also means ever so slightly<br>higher memory/cache usage but not by the full 2-3%.|
|**TEMP Add a log to track strange behavior** <br><sub><nobr> Fri, 19 May 2023 12:26:37 +0000</nobr> <br>File: [TEMP-Add-a-log-to-track-strange-behavior.patch](/build/patches/TEMP-Add-a-log-to-track-strange-behavior.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> ||
|**Temp PerformanceNavigationTiming privacy fix** <br><sub><nobr> Wed, 11 Oct 2023 09:40:53 +0000</nobr> <br>File: [Temp-PerformanceNavigationTiming-privacy-fix.patch](/build/patches/Temp-PerformanceNavigationTiming-privacy-fix.patch) <br><nobr>Author: uazo</nobr> <br><nobr>Context: </nobr> <br><nobr>License: GPL-2.0-or-later</nobr> ||