diff --git a/Manifests/Manifest_LAOS-19.1.xml b/Manifests/Manifest_LAOS-19.1.xml index ed887700..9f46c089 100644 --- a/Manifests/Manifest_LAOS-19.1.xml +++ b/Manifests/Manifest_LAOS-19.1.xml @@ -75,8 +75,8 @@ - - + + diff --git a/Patches/LineageOS-19.1/android_frameworks_base/0025-Monet_Toggle.patch b/Patches/LineageOS-19.1/android_frameworks_base/0025-Monet_Toggle.patch index d83c6763..12238469 100644 --- a/Patches/LineageOS-19.1/android_frameworks_base/0025-Monet_Toggle.patch +++ b/Patches/LineageOS-19.1/android_frameworks_base/0025-Monet_Toggle.patch @@ -41,7 +41,7 @@ index d7cc36ff4ae2..72e6362c0a96 100644 * Control whether to enable adaptive sleep mode. * @hide diff --git a/packages/SystemUI/src/com/android/systemui/theme/ThemeOverlayController.java b/packages/SystemUI/src/com/android/systemui/theme/ThemeOverlayController.java -index 02632cb3fc17..ea97abd4c423 100644 +index b732ef6b873a..d500270464c3 100644 --- a/packages/SystemUI/src/com/android/systemui/theme/ThemeOverlayController.java +++ b/packages/SystemUI/src/com/android/systemui/theme/ThemeOverlayController.java @@ -117,7 +117,6 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { @@ -89,7 +89,7 @@ index 02632cb3fc17..ea97abd4c423 100644 mConfigurationController = configurationController; mDeviceProvisionedController = deviceProvisionedController; mBroadcastDispatcher = broadcastDispatcher; -@@ -441,10 +452,6 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -468,10 +479,6 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { }, UserHandle.USER_ALL); @@ -100,7 +100,7 @@ index 02632cb3fc17..ea97abd4c423 100644 mUserTracker.addCallback(mUserTrackerCallback, mMainExecutor); mConfigurationController.addCallback(mConfigurationListener); -@@ -452,8 +459,8 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -479,8 +486,8 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { // Upon boot, make sure we have the most up to date colors Runnable updateColors = () -> { @@ -111,7 +111,7 @@ index 02632cb3fc17..ea97abd4c423 100644 Runnable applyColors = () -> { if (DEBUG) Log.d(TAG, "Boot colors: " + systemColor); mCurrentColors.put(mUserTracker.getUserId(), systemColor); -@@ -479,7 +486,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -506,7 +513,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { @Override public void onFinishedGoingToSleep() { final int userId = mUserTracker.getUserId(); @@ -120,7 +120,7 @@ index 02632cb3fc17..ea97abd4c423 100644 if (colors != null) { int flags = mDeferredWallpaperColorsFlags.get(userId); -@@ -490,10 +497,27 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -517,10 +524,27 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { } } }); @@ -149,7 +149,7 @@ index 02632cb3fc17..ea97abd4c423 100644 final int mainColor; final int accentCandidate; if (currentColors == null) { -@@ -512,14 +536,12 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -539,14 +563,12 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { mMainWallpaperColor = mainColor; mWallpaperAccentColor = accentCandidate; @@ -170,7 +170,7 @@ index 02632cb3fc17..ea97abd4c423 100644 } updateThemeOverlays(); -@@ -593,7 +615,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -620,7 +642,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { // Let's generate system overlay if the style picker decided to override it. OverlayIdentifier systemPalette = categoryToPackage.get(OVERLAY_CATEGORY_SYSTEM_PALETTE); @@ -179,7 +179,7 @@ index 02632cb3fc17..ea97abd4c423 100644 try { String colorString = systemPalette.getPackageName().toLowerCase(); if (!colorString.startsWith("#")) { -@@ -607,20 +629,11 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -634,20 +656,11 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { // Color.parseColor doesn't catch any exceptions from the calls it makes Log.w(TAG, "Invalid color definition: " + systemPalette.getPackageName(), e); } @@ -201,7 +201,7 @@ index 02632cb3fc17..ea97abd4c423 100644 try { String colorString = accentPalette.getPackageName().toLowerCase(); if (!colorString.startsWith("#")) { -@@ -634,7 +647,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -661,7 +674,7 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { // Color.parseColor doesn't catch any exceptions from the calls it makes Log.w(TAG, "Invalid color definition: " + accentPalette.getPackageName(), e); } @@ -210,7 +210,7 @@ index 02632cb3fc17..ea97abd4c423 100644 try { Integer.parseInt(accentPalette.getPackageName().toLowerCase(), 16); categoryToPackage.remove(OVERLAY_CATEGORY_ACCENT_COLOR); -@@ -692,7 +705,6 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { +@@ -719,7 +732,6 @@ public class ThemeOverlayController extends SystemUI implements Dumpable { pw.println("mWallpaperAccentColor=" + Integer.toHexString(mWallpaperAccentColor)); pw.println("mSecondaryOverlay=" + mSecondaryOverlay); pw.println("mNeutralOverlay=" + mNeutralOverlay); diff --git a/Patches/LineageOS-19.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch b/Patches/LineageOS-19.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch index 2b207d26..e9d29a05 100644 --- a/Patches/LineageOS-19.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch +++ b/Patches/LineageOS-19.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch @@ -76,10 +76,10 @@ index a3ee437..c4532c5 100644 The array should be sorted in the same order as the touchscreen gestures advertised by the device's LineageHW impl. --> diff --git a/res/values/strings.xml b/res/values/strings.xml -index 9d88587..7ce522a 100644 +index 02a5316..a806a7c 100644 --- a/res/values/strings.xml +++ b/res/values/strings.xml -@@ -532,28 +532,6 @@ +@@ -533,28 +533,6 @@ Total commits: %2$s

Last update: %3$s]]> diff --git a/Patches/LineageOS-19.1/android_packages_apps_Settings/0004-Private_DNS.patch b/Patches/LineageOS-19.1/android_packages_apps_Settings/0004-Private_DNS.patch index 73795557..e6a29d1a 100644 --- a/Patches/LineageOS-19.1/android_packages_apps_Settings/0004-Private_DNS.patch +++ b/Patches/LineageOS-19.1/android_packages_apps_Settings/0004-Private_DNS.patch @@ -81,7 +81,7 @@ index 12e29e693b..b6745806b5 100644 android:id="@+id/private_dns_mode_opportunistic" layout="@layout/preference_widget_dialog_radiobutton"/> diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml -index e89ab77edd..925a386cd9 100644 +index 14d88d1960..9994318ef6 100644 --- a/res/values/cm_strings.xml +++ b/res/values/cm_strings.xml @@ -78,6 +78,21 @@ diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sm7225.sh index bf05acc4..185eee95 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -82,7 +82,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch @@ -122,10 +121,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.19/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.19/0003.patch @@ -156,7 +151,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14-^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22600/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26401/4.19/0007.patch @@ -223,13 +217,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38300/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.19/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.19/0002.patch @@ -251,7 +238,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0812/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.19/0003.patch @@ -278,16 +264,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/4.19/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20154/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.19/0004.patch @@ -298,8 +274,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/^5.19/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.19/0003.patch @@ -322,5 +296,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch -editKernelLocalversion "-dos.p322" +editKernelLocalversion "-dos.p296" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/Functions.sh b/Scripts/LineageOS-19.1/Functions.sh index 0e85c56c..fbdc1fbc 100644 --- a/Scripts/LineageOS-19.1/Functions.sh +++ b/Scripts/LineageOS-19.1/Functions.sh @@ -81,7 +81,7 @@ buildAll() { #SD632 buildDevice FP3 avb; #SD750 - buildDevice FP4 avb; + buildDevice FP4 avb; #unb #SD855 buildDevice guacamole avb; #unb buildDevice guacamoleb avb; #unb @@ -89,7 +89,7 @@ buildAll() { buildDevice hotdogb avb; #unb buildDevice coral avb; buildDevice flame avb; - buildDevice vayu avb; #unb + buildDevice vayu avb; #SD865 buildDevice instantnoodle avb; #unb buildDevice instantnoodlep avb; #unb @@ -118,6 +118,7 @@ patchWorkspace() { source build/envsetup.sh; repopick -it S_asb_2022-08; + repopick -i 335090 335091; #FP4 Bluetooth fixes sh "$DOS_SCRIPTS/Patch.sh"; sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";