diff --git a/Patches/LineageOS-16.0/android_system_netd/0001-Fix_DNS_leaks-relaxed.patch b/Patches/LineageOS-16.0/android_system_netd/0001-Fix_DNS_leaks-relaxed.patch index 02b69e28..7b8d56c8 100644 --- a/Patches/LineageOS-16.0/android_system_netd/0001-Fix_DNS_leaks-relaxed.patch +++ b/Patches/LineageOS-16.0/android_system_netd/0001-Fix_DNS_leaks-relaxed.patch @@ -27,7 +27,7 @@ index e2467709..fbf136ce 100644 *netId = mDefaultNetId; fwmark.netId = *netId; fwmark.explicitlySelected = true; -+ fwmark.protectedFromVpn = canProtectLocked(uid); ++ fwmark.protectedFromVpn = canProtectLocked(uid); return fwmark.intValue; } diff --git a/Patches/LineageOS-17.1/android_system_netd/0003-Fix_DNS_leaks-relaxed.patch b/Patches/LineageOS-17.1/android_system_netd/0003-Fix_DNS_leaks-relaxed.patch index 1092dc95..5545bdb9 100644 --- a/Patches/LineageOS-17.1/android_system_netd/0003-Fix_DNS_leaks-relaxed.patch +++ b/Patches/LineageOS-17.1/android_system_netd/0003-Fix_DNS_leaks-relaxed.patch @@ -27,7 +27,7 @@ index 13921e92..4c424dc0 100644 *netId = mDefaultNetId; fwmark.netId = *netId; fwmark.explicitlySelected = true; -+ fwmark.protectedFromVpn = canProtectLocked(uid); ++ fwmark.protectedFromVpn = canProtectLocked(uid); return fwmark.intValue; } diff --git a/Patches/LineageOS-18.1/android_system_netd/0002-Fix_DNS_leaks-relaxed.patch b/Patches/LineageOS-18.1/android_system_netd/0002-Fix_DNS_leaks-relaxed.patch index 7614b023..d4181dc5 100644 --- a/Patches/LineageOS-18.1/android_system_netd/0002-Fix_DNS_leaks-relaxed.patch +++ b/Patches/LineageOS-18.1/android_system_netd/0002-Fix_DNS_leaks-relaxed.patch @@ -27,7 +27,7 @@ index 93ccf202..c7a8a132 100644 *netId = mDefaultNetId; fwmark.netId = *netId; fwmark.explicitlySelected = true; -+ fwmark.protectedFromVpn = canProtectLocked(uid); ++ fwmark.protectedFromVpn = canProtectLocked(uid); return fwmark.intValue; }