Commit Graph

4637 Commits

Author SHA1 Message Date
Joey Huab
d9a39a25f4 Revert "Revert "Add product_launched_with_j{,_mr1,mr2}.mk""
This reverts commit e1e121bea4.
2025-12-05 01:37:40 +09:00
Joey Huab
163c0f77be Revert "bootanimation: Convert to Android.bp"
This reverts commit 3b29ed3826.
2025-12-05 01:37:40 +09:00
Joey Huab
af993abe8e Revert "charger: Convert to Android.bp"
This reverts commit b3e6f3ad7e.
2025-12-05 01:37:35 +09:00
Michael Bestas
d3ff888605 Disable yet another gms update component
Change-Id: If8104a9e75a6fdd46a7fb4da164c81fbdd5f748b
2025-12-04 16:20:38 +00:00
Thomas Makin
d31ef2798e kernel: Prevent creating any files in kernel platform source tree
Original command redirected output to the android build out. However, a
handful of configs were still generated in the source tree. Set the
bazel flag output_root to redirect these configs to the android build
out as well.

Change-Id: I5181270b773a49d74eab00b89eaaf1187471a144
2025-12-03 05:25:57 +00:00
Michael Bestas
d7666177e8 config: Add libzstd.so to artifact path requirement allowlist
Change-Id: Iddfde0fa355562c4d7f9596d4fc55eeeb0523888
2025-11-29 19:09:37 +02:00
Thomas Turner
2fad9fba44 soong: generator: Update for BP3A
Co-authored-by: ExtremeXT <extremextdev@gmail.com>
Change-Id: I9eea06a508d46d698e73cb27ef30b463acafacd6
Signed-off-by: ExtremeXT <extremextdev@gmail.com>
2025-11-29 19:09:37 +02:00
Michael Bestas
5052a73964 release: Drop remaining Pixel flags
These will just be moved to device trees.

Change-Id: I6892c3a6c79dc009e22a45a8917a0bfd5ca6bfb0
2025-11-29 19:09:37 +02:00
Michael Bestas
de0a1a1e67 vars: November 2025 Pixel Update
Change-Id: Icd39c36593a9b8be6cf69b982cdbbaa0b34938f2
2025-11-29 17:08:46 +00:00
Michael Bestas
137876a2aa vars: October 2025 Pixel Update
Change-Id: I335dd28820dacb90b005411524e16722864bb2d8
2025-11-29 17:08:46 +00:00
Michael Bestas
8d47278bd3 LineageOS 23.1
Change-Id: I8c50811d9e0871a5608e7296ee40ce71ed63b469
2025-11-29 17:08:46 +00:00
Michael Bestas
1bea6247d5 release: Bump aconfig flags extension to BP3A
Change-Id: I02ec4e8fec2946c6991b897337e59de01c01224f
2025-11-29 17:08:46 +00:00
Michael Bestas
412f513e14 vars: September 2025 Pixel Update
Change-Id: Id530a09f7ebcc9a255ec093f542943189e1163d3
2025-11-29 17:08:46 +00:00
Michael Bestas
026d9994ff vars: Update to BP3A
Change-Id: Ie845de380baccf4a580d51601f0c083caacb58c8
2025-11-29 17:08:46 +00:00
Nick Reuter
60444c0dcd lineage: Move device_framework_matrix.xml to hardware/lineage/interfaces
Follows AOSP structure that exists in hardware/interfaces.

Change-Id: I3ebbd53d4e9920e8a56afd78e18022b06a7b3826
2025-11-28 23:00:41 +00:00
Michael Bestas
c4e86b6e4a build: Fix sourcing envsetup from anywhere
Change-Id: Id1ee24e89a554c8de42366f9f0f5da03d3c86143
2025-11-17 19:26:41 +02:00
Yumi Yukimura
5d46082839 config: tablet: Bring back android.software.freeform_window_management feature
* desktop windowing mode depends on it

Change-Id: Iffdab6b268a3a3ac0fb78027c4900a3fef1eeac5
2025-11-12 08:03:46 +00:00
Jared Duke
00d7786f61 lineage: Enable R8 code shrinking and optimizations
Squashed commit of the following:

commit b11f60fd9b601caa10f8caec5c9f3a10c5082d68
Author: Jared Duke <jdduke@google.com>
Date:   Wed Feb 16 15:43:55 2022 -0800

    Enable R8 code shrinking for system_server on Pixel

    Opt in to whole-program Java optimizations via R8 for Pixel devices.
    This can be explicitly disabled during builds via
    `SYSTEM_OPTIMIZE_JAVA=false m`.

    Note that this change only enables code shrinking for system_server,
    and should not impact stack traces. Additional R8 optimizations
    will be enabled after broader improvements to retracing infrastructure.
    See go/aperf-system-r8-faq for additional details and guidance. Also
    note that R8 shrinking optimizations are implicitly disabled in ENG builds.

    Enabling for non-Pixel devices will proceed in stages as we flesh
    out infrastructure and validate with test populations.

    Results: services.jar (20MB -> 17MB)

    Bug: 210510433
    Test: m + atest FrameworksServicesTests + manual testing on Raven
    Change-Id: I13c0674105aa2cab7722f52344486e86e3bde26b

commit ecc5901ee57253edb0fdde5d5099c4e1078f7b6f
Author: Jared Duke <jdduke@google.com>
Date:   Tue Jan 4 15:21:39 2022 -0800

    Enable SystemUI R8 optimizations for Pixel

    Opt in to whole-program Java optimizations via R8 for Pixel devices.
    This can be explicitly disabled during builds via
    `SYSTEMUI_OPTIMIZE_JAVA=false m`.

    Note that this change does introduce changes to stack traces that
    may require retracing for fully accurate debugging and diagonstics.
    See go/aperf-system-r8-faq for additional details and guidance. Also
    note that optimizations are implicitly disabled in ENG builds.

    Enabling for non-Pixel devices will proceed in stages as we flesh
    out infrastructure and validate with test populations.

    Results:
     * SystemUIGoogle.apk (40MB -> 35MB)
     * SystemUIGoogle.odex (32MB -> 25MB)

    Test: m + atest SystemUITests + presubmit + manual testing on Raven
    Bug: 203472868
    Change-Id: I67ff2c06885b21164a3034e9922163337e8787f3

Change-Id: Ib89500d70780fdf8485aaf04976d4cc607b4ccf7
2025-11-12 08:01:42 +00:00
LuK1337
3d4d384139 Move APNs data to vendor/apn
Change-Id: I4b939bf232a33d82664f890e33f47e22c1f72cee
2025-11-10 10:31:29 +01:00
Michael Bestas
52a3abe132 vars: Update qcom tags
Change-Id: I7df87e633571f337ac42fff4a515bbbbefbe81f4
2025-11-08 17:32:15 +00:00
Michael Bestas
d40f38d6c0 release: Bump Security String to 2025-11-01
Implemented:
============
None

Previously Implemented:
================
CVE:            References:    Type:  Severity:  Updated AOSP versions:
CVE-2025-48581  A-428945391    EoP    High       16
CVE-2025-48593  A-374746961    RCE    Critical   13, 14, 15, 16

Not Implemented:
================
None

Not Applicable (platform source):
=================================
None

Change-Id: I1d0884060451ac9106b046ea6619f64310f5ff9b
2025-11-08 15:40:16 +02:00
LuK1337
0f3d6ea1b2 config: Set ro.debuggable=0 for userdebug builds
Change-Id: I138c6dabea1c42e820a9ad1cba69cf585f62ee4b
2025-11-08 08:40:15 +00:00
Aryan
c84fb58d74 Revert "overlay: Don't allow toggling camera"
Software based camera blocking is always supported.

This reverts commit 4339301f25.

Change-Id: If43612b23e326e77d0058ff132201d4136b7d874
2025-11-08 08:22:35 +00:00
_
5216d728d9 apns: Revert US Mobile Warp changes
This reverts part of
https://review.lineageos.org/c/LineageOS/android_vendor_lineage/+/450430,
which broke my mobile data. See
https://gitlab.com/LineageOS/issues/android/-/issues/9217 for more
details. Manually deleting this line from /product/etc/apns-conf.xml on my
device fixed mobile data for me.

Change-Id: I6d1b81f3ab1eee552d73de504cbab302f67d73d8
2025-11-06 18:22:31 -08:00
Hridaya Prajapati
4339301f25 overlay: Don't allow toggling camera
Not all devices support this feature.
If a device supports this feature, enable overlay in the device tree.

This partially reverts commit 7b6521c8a4.

Change-Id: Iece2b092d0fdcbb94c41c7727de799a0b7baa700
2025-11-06 15:54:54 +00:00
LuK1337
d18624129c wipe-frp: Allow overriding FRP_BLOCK
Change-Id: I2fed7f088541667fc53d75d841a8af1903edff3d
2025-11-04 12:24:20 +01:00
Doğancan yılmazer
45094fbaa3 apns: Add APN for Netgsm
Provides services in Turkey.

https://www.netgsm.com.tr/gsm/mobil-hat
https://www.netgsm.com.tr/dist/images/netgsm-apn-ayarlari.jpg?v1

Change-Id: If7080da334da33c76f741195add206d817f6224a
2025-11-03 23:25:24 +00:00
Sebastiano Barezzi
2426bf9c88 kernel: Satisfy Rust bindgen for v6.12
Change-Id: I793e2426f5b697c3c33c6d43729721ac1109abcd
2025-11-03 16:21:01 +00:00
Michael Bestas
751459e70c envsetup: Add build_kernel function for Pixel OOT kernel build
Change-Id: Ib2840cb2bf236a6d25906b60256ef521dd6a2c8a
2025-11-03 00:19:00 +01:00
Arian
a13626ad89 apn: Add finetwork
From https://blog.finetwork.com/configurar-apn-finetwork-movil and MIUI

Fixes: https://gitlab.com/LineageOS/issues/android/-/issues/6065
Change-Id: I6ea99da32e4f688cab2dc43335393c07caf9e275
2025-10-27 08:32:45 +00:00
Atakan
13c54044ba apns: Add KKTCell APNs
Northern Cyprus version of Turkcell.

Change-Id: Ib7457577ff5954937d3e06e2720e34af2ef7a13c
2025-10-25 06:53:52 +00:00
Atakan
7f2f42fc11 apns: Update APNs of Turkish carriers
Reference for Turkcell: https://www.turkcell.com.tr/yardim/cihazlar/samsung-galaxy-s25-ultra-yardim#internet-ayarlari

Other carriers were obtained by comparing APN configs from various OEMs.

Change-Id: I70292b3e0163532bd6ecadda7e27b13121b16f1d
2025-10-25 06:53:52 +00:00
tejas101k
327eacafd3 apns: Add Altel and Tele2
Carrier documentation:
[1]https://altel.kz/new/helps/settings
[2]https://tele2.kz/help/d/11

Third-party ref:
https://apn.how/kz/tele2-altel

Change-Id: I94ceef2d10aff5573946827736644578ad625273
Signed-off-by: tejas101k <tejassingh649@rediffmail.com>
2025-10-24 15:35:20 +00:00
Tim Zimmermann
48692af52c apns: Update Vodafone DE
https://www.vodafone.de/hilfe/google/pixel-10-pro.html?tab=geraete-einstellungen&accordion=2337221

Change-Id: I7158f4c53b88d6929d8043d833f960ba3a3040c7
2025-10-23 18:26:48 +00:00
Michael Bestas
8bf652f46f Revert "tools: getb64key - print the base64 version of a PEM public key file"
Reason for revert: This has been unused since lineage-16.0

This reverts commit 0a656b6446.

Change-Id: Ib804efa52b1af444be1de68066be48c30ea4d22b
2025-10-21 03:56:53 +03:00
pnguyen879
1e320a9489 bootanimation: Drop CleanSpec.mk
Change-Id: I1208dbada3d161feafd2c712381694e30f79ed26
2025-10-20 00:02:19 +00:00
Nolen Johnson
402f7e3adb lineage: targets: car*: Refactor and update artifact list
Change-Id: I0bc8aa03ed854f7e770ce32e0fe8df8f97e3929f
2025-10-19 03:18:16 +00:00
LuK1337
88d6306ea0 lineage: products: Disable EPPE for cuttlefish targets
Change-Id: Ie448ab0fa840289707e2505b68681ed1f9a72eda
2025-10-19 03:18:07 +00:00
Flicker372
79db56317b apns: Update for CTM(Macau)
* Enable IPv6

Ref:
[1]https://android.googlesource.com/device/sample/+/main/etc/apns-full-conf.xml
[2]https://www.ctm.net/en-US/person/T31-010010230170/202010/f92bf17b7e184c2db8d4b809b2d1ec3b.html

Change-Id: I72a1fad8742ac1f8007398f9c6920923c728c152
2025-10-10 20:36:18 +00:00
Michael Bestas
99fed8e4d9 release: Bump Security String to 2025-10-01
Implemented:
============
None

Previously Implemented:
================
None

Not Implemented:
================
None

Not Applicable (platform source):
=================================
None

Change-Id: I3aa454d3fff7f5517a69e3c290e7460fbe0aa75e
2025-10-08 16:38:26 +03:00
Aaron Kling
665b11d8b1 kernel: Set scmversion for kernel platform
By default, the version control information isn't checked to save time.
The normal version check uses repo, which is blocked by the aosp build
system. So the manifest is generated separately and passed to bazel.

Change-Id: I2232903af6b6b7869aef3f66d836236a041887cc
2025-09-26 07:54:17 +00:00
Aaron Kling
88858796a2 kernel: Fix building kernel platform with in-tree out
This was originally verified against out-of-tree, which is already an
absolute path. With in-tree out, the path is relative. Since pwd is
changed to the root of the kernel platform tree, the dist path needs to
be absolute.

Fixes: 7cd90ecd (kernel: Support building from kernel platform)
Change-Id: Ib9cecdc5f8bfd3345afc73c050ab6214ac4c48d6
2025-09-26 07:54:17 +00:00
Yumi Yukimura
9e079ba3c1 lineage_generic_*target: Disable soong defined system image for now
We don't support it yet.

Change-Id: Ic5cfa50ff66bfee723b74d4e5511582b42a2eeca
2025-09-24 15:12:23 +00:00
Michael Bestas
c0fe4cb798 Bump Security String to 2025-09-01
Implemented:
============
CVE:            References:    Type:  Severity:  Updated AOSP versions:
CVE-2025-32321  A-378902342    EoP    High       13, 14, 15, 16
CVE-2025-32323  A-397216537    EoP    High       13, 14, 15, 16
CVE-2025-32324  A-406763872    EoP    High       15, 16
CVE-2025-32325  A-402319736    EoP    High       13, 14, 15, 16
CVE-2025-32326  A-365739560    EoP    High       13, 14, 15, 16
CVE-2025-32331  A-404252173    EoP    High       15, 16
CVE-2025-32345  A-409318132    EoP    High       15, 16
CVE-2025-32346  A-337785563    EoP    High       16
CVE-2025-32347  A-388528350    EoP    High       13, 14, 15, 16
CVE-2025-32349  A-408215749    EoP    High       13, 14, 15, 16
CVE-2025-32350  A-404256832    EoP    High       14, 15, 16
CVE-2025-48522  A-418773283    EoP    High       13, 14, 15, 16
CVE-2025-48523  A-388032224    EoP    High       13, 14, 15, 16
CVE-2025-48524  A-399885815    DoS    High       13, 14, 15, 16
CVE-2025-48526  A-407764858    EoP    High       13, 14, 15, 16
CVE-2025-48527  A-378088320    ID     High       13, 14, 15, 16
CVE-2025-48528  A-384727394    EoP    High       15, 16
CVE-2025-48529  A-325030433    ID     High       13, 14, 15, 16
CVE-2025-48531  A-389681530    EoP    High       13, 14, 15, 16
CVE-2025-48532  A-417194323    EoP    High       16
CVE-2025-48535  A-353680402    EoP    High       13, 14, 15, 16
CVE-2025-48537  A-391894257    ID     High       13, 14, 15, 16
CVE-2025-48538  A-328182084    DoS    High       13, 14, 15, 16
CVE-2025-48539  A-406785684    RCE    Critical   15, 16
CVE-2025-48540  A-416734088    EoP    High       13, 14, 15, 16
CVE-2025-48541  A-411418366    EoP    High       13, 14, 15, 16
CVE-2025-48542  A-273501008    DoS    High       13, 14, 15, 16
CVE-2025-48543  A-421834866    EoP    High       13, 14, 15, 16
CVE-2025-48544  A-415783046    EoP    High       13, 14, 15, 16
CVE-2025-48545  A-397438392    ID     High       13, 14, 15, 16
CVE-2025-48546  A-388029380    EoP    High       13, 14, 15, 16
CVE-2025-48547  A-419105158    EoP    High       13, 14, 15, 16
CVE-2025-48550  A-401256328    DoS    High       13, 14, 15, 16
CVE-2025-48551  A-407991863    ID     High       13, 14, 15, 16
CVE-2025-48552  A-365975561    EoP    High       13, 14, 15, 16
CVE-2025-48553  A-384514657    EoP    High       13, 14, 15, 16
CVE-2025-48554  A-414603411    DoS    High       13, 14, 15, 16
CVE-2025-48556  A-419014146    EoP    High       15, 16
CVE-2025-48558  A-380885270    EoP    High       13, 14, 15, 16
CVE-2025-48559  A-416491779    DoS    High       13, 14, 15, 16
CVE-2025-48560  A-419110583    ID     High       15, 16
CVE-2025-48561  A-399120953    ID     High       13, 14, 15, 16
CVE-2025-48562  A-423815728    ID     High       13, 14, 15, 16
CVE-2025-48563  A-401545800    EoP    High       13, 14, 15, 16

Previously Implemented:
=======================
None

Not Implemented:
================
None

Not Applicable (platform source):
=================================
CVE:            References:    Type:  Severity:  Updated AOSP versions:
CVE-2021-39810  A-212610736    EoP    High       13
CVE-2023-24023  A-255601934    EoP    High       13, 14, 15
CVE-2024-49714  A-271962784    EoP    High       13, 14
CVE-2025-0076   A-366403307    ID     High       13, 14, 15
CVE-2025-0089   A-378505461    EoP    High       13, 14, 15
CVE-2025-26454  A-299928772    EoP    High       13, 14, 15
CVE-2025-26464  A-392614489    EoP    High       15 (release)
CVE-2025-32327  A-389681152    EoP    High       14, 15
CVE-2025-32330  A-389127608    ID     High       13, 14, 15
CVE-2025-32333  A-409780975    EoP    High       14
CVE-2025-48534  A-381419370    DoS    High       13, 14, 15
CVE-2025-48548  A-293603271    EoP    High       13, 14, 15
CVE-2025-48549  A-325912429    EoP    High       13, 14, 15

Change-Id: I6217b4e09b01d606e78d21acf8b7bf1ef2fb65a3
2025-09-15 07:55:27 +00:00
Michael Bestas
1c6299cff2 vars: Update qcom tags
Change-Id: I9765bc16fa4b1158fe992072301e32cb511d2658
2025-09-14 05:58:36 +00:00
Michael Bestas
c7a3e36e9d vars: Point sunfish to archive.org
Change-Id: I36d875e35a3a6d5a55804c3b21b28e520360d2e5
2025-09-11 16:31:08 +00:00
Inhishonor
616c2ae5ec audio: Add Plasma Mobile alarms & notifications
In the interest of customization, here are a bunch more alarms and notifications sounds. The code is taken from ProtonAOSP, and adapted to Lineage.
Cherry-picked from: 629b35007c
Cherry-picked from: 6f203a966f

Change-Id: Iaacb0d2e94d2dda1cf90cabb9368cea1a4cf0a7f
Authored-by: Danny Lin <danny@kdrag0n.dev>
Co-Authored-by: Inhishonor <inhishonor@protonmail.com>
2025-09-10 18:38:52 +00:00
Aaron Kling
7cd90ecd34 kernel: Support building from kernel platform
This expects a few build variables to be set:

* TARGET_KERNEL_PLATFORM_TARGET: The base target name. For example,
  'tegra' will indicate that the dist target is tegra_dist, abi is
  tegra_abi, etc.
* TARGET_KERNEL_VERSION: Used to determine the kernel checkout path. For
  example, a value of 6.6 will expect the kernel platform repo to be
  checked out to $BUILD_TOP/../kernel-6.6.
* TARGET_KERNEL_SOURCE: Relative to the top of the kernel platform
  checkout, the path to the kernel build rules. For example,
  vendor/nvidia/tegra.
* BOARD_KERNEL_IMAGE_NAME: The kernel image to use. For example, Image.

Using the examples above, this will run bazel in the kernel-6.6
directory on the target //vendor/nvidia/tegra:tegra_dist, then source
the output from $OUT/tegra/dist, with the prebuilt kernel image being
Image.

Change-Id: If96e96dffa2c0bfd9bd824bb3d8064eb861c9d00
2025-09-10 18:37:57 +00:00
inferno0230
e9f9f3902d merge_dtbs: Use DeviceTreeInfo's hash in get_name()
Fixes duplicate output filename collision:

INFO: Saving to: benz-23871-crow-overlay-DVT1-camera-0x46232744d57254d9.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
Reloading overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
INFO: Saving to: benz-23871-crow-overlay-DVT1-23061-audio-23061-display-camera-0x46232744d57254d9.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/audio/oplus/benz-23061-audio-crow-overlay.dtbo
Reloading overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/audio/oplus/benz-23061-audio-crow-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/audio/oplus/benz-23061-audio-crow-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/display/oplus/benz-23061-display-crow-overlay.dtbo
Reloading overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/display/oplus/benz-23061-display-crow-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/display/oplus/benz-23061-display-crow-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
Reloading overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
Merging overlay blob out/target/product/benz/obj/DTB_OBJ/arch/arm64/boot/dts/vendor/qcom/camera/oplus/benz-camera-overlay.dtbo
INFO: Saving to: benz-23871-crow-overlay-DVT1-23061-audio-23061-display-camera-0x46232744d57254d9.dtbo
Traceback (most recent call last):
  File "/sauce/los/vendor/lineage/build/tools/merge_dtbs.py", line 567, in
    main()
    ~~~~^^
  File "/sauce/los/vendor/lineage/build/tools/merge_dtbs.py", line 551, in main
    created.extend(dt.save(args.out))
    ~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^
  File "/sauce/los/vendor/lineage/build/tools/merge_dtbs.py", line 469, in save
    yield mdt.save(name, out_dir)
          ~~~~~~~~^^^^^^^^^^^^^^^
  File "/sauce/los/vendor/lineage/build/tools/merge_dtbs.py", line 361, in save
    assert not os.path.exists(out_file), "Cannot overwrite: {}".format(out_file)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
AssertionError: Cannot overwrite: out/target/product/benz/obj/DTB_OBJ/out/benz-23871-crow-overlay-DVT1-23061-audio-23061-display-camera-0x46232744d57254d9.dtbo

Change-Id: Ia7817e91da7bde1e3a4d577c3b45d5805b0b9938
Signed-off-by: inferno0230 <mail@inferno0230.in>
2025-09-09 10:00:51 +02:00
dianlujitao
165ebd3033 apns: Add BICS
Change-Id: I57a0be0c242a7d4b7c6498d56637095070c58a9e
2025-09-08 06:10:06 +00:00