mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Churn + Fixes
Fixes https://github.com/Divested-Mobile/DivestOS-Build/issues/338 Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
c6299eef89
commit
1245d6fad3
@ -1,150 +0,0 @@
|
|||||||
diff --git a/src/com/android/settings/search/SearchFeatureProvider.java b/src/com/android/settings/search/SearchFeatureProvider.java
|
|
||||||
index b14a4d7fbf..2fbaafd191 100644
|
|
||||||
--- a/src/com/android/settings/search/SearchFeatureProvider.java
|
|
||||||
+++ b/src/com/android/settings/search/SearchFeatureProvider.java
|
|
||||||
@@ -56,7 +56,7 @@ public interface SearchFeatureProvider {
|
|
||||||
* @throws IllegalArgumentException when caller is null
|
|
||||||
* @throws SecurityException when caller is not allowed to launch search result page
|
|
||||||
*/
|
|
||||||
- void verifyLaunchSearchResultPageCaller(Context context, @NonNull ComponentName caller)
|
|
||||||
+ void verifyLaunchSearchResultPageCaller(@NonNull Context context, @NonNull String callerPackage)
|
|
||||||
throws SecurityException, IllegalArgumentException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
diff --git a/src/com/android/settings/search/SearchFeatureProviderImpl.java b/src/com/android/settings/search/SearchFeatureProviderImpl.java
|
|
||||||
index 6f90970905..3a62ddfb67 100644
|
|
||||||
--- a/src/com/android/settings/search/SearchFeatureProviderImpl.java
|
|
||||||
+++ b/src/com/android/settings/search/SearchFeatureProviderImpl.java
|
|
||||||
@@ -17,13 +17,14 @@
|
|
||||||
|
|
||||||
package com.android.settings.search;
|
|
||||||
|
|
||||||
-import android.content.ComponentName;
|
|
||||||
import android.content.Context;
|
|
||||||
import android.content.Intent;
|
|
||||||
import android.net.Uri;
|
|
||||||
import android.provider.Settings;
|
|
||||||
import android.text.TextUtils;
|
|
||||||
|
|
||||||
+import androidx.annotation.NonNull;
|
|
||||||
+
|
|
||||||
import com.android.settingslib.search.SearchIndexableResources;
|
|
||||||
import com.android.settingslib.search.SearchIndexableResourcesMobile;
|
|
||||||
|
|
||||||
@@ -32,21 +33,18 @@ import com.android.settingslib.search.SearchIndexableResourcesMobile;
|
|
||||||
*/
|
|
||||||
public class SearchFeatureProviderImpl implements SearchFeatureProvider {
|
|
||||||
|
|
||||||
- private static final String TAG = "SearchFeatureProvider";
|
|
||||||
-
|
|
||||||
private SearchIndexableResources mSearchIndexableResources;
|
|
||||||
|
|
||||||
@Override
|
|
||||||
- public void verifyLaunchSearchResultPageCaller(Context context, ComponentName caller) {
|
|
||||||
- if (caller == null) {
|
|
||||||
+ public void verifyLaunchSearchResultPageCaller(@NonNull Context context,
|
|
||||||
+ @NonNull String callerPackage) {
|
|
||||||
+ if (TextUtils.isEmpty(callerPackage)) {
|
|
||||||
throw new IllegalArgumentException("ExternalSettingsTrampoline intents "
|
|
||||||
+ "must be called with startActivityForResult");
|
|
||||||
}
|
|
||||||
- final String packageName = caller.getPackageName();
|
|
||||||
- final boolean isSettingsPackage = TextUtils.equals(packageName, context.getPackageName())
|
|
||||||
- || TextUtils.equals(getSettingsIntelligencePkgName(context), packageName);
|
|
||||||
- final boolean isAllowlistedPackage =
|
|
||||||
- isSignatureAllowlisted(context, caller.getPackageName());
|
|
||||||
+ final boolean isSettingsPackage = TextUtils.equals(callerPackage, context.getPackageName())
|
|
||||||
+ || TextUtils.equals(getSettingsIntelligencePkgName(context), callerPackage);
|
|
||||||
+ final boolean isAllowlistedPackage = isSignatureAllowlisted(context, callerPackage);
|
|
||||||
if (isSettingsPackage || isAllowlistedPackage) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
diff --git a/src/com/android/settings/search/SearchResultTrampoline.java b/src/com/android/settings/search/SearchResultTrampoline.java
|
|
||||||
index 5e710293c2..2c6fd67a2f 100644
|
|
||||||
--- a/src/com/android/settings/search/SearchResultTrampoline.java
|
|
||||||
+++ b/src/com/android/settings/search/SearchResultTrampoline.java
|
|
||||||
@@ -20,7 +20,6 @@ import static com.android.settings.SettingsActivity.EXTRA_SHOW_FRAGMENT_ARGUMENT
|
|
||||||
import static com.android.settings.SettingsActivity.EXTRA_SHOW_FRAGMENT_TAB;
|
|
||||||
|
|
||||||
import android.app.Activity;
|
|
||||||
-import android.content.ComponentName;
|
|
||||||
import android.content.Intent;
|
|
||||||
import android.os.Bundle;
|
|
||||||
import android.provider.Settings;
|
|
||||||
@@ -51,11 +50,11 @@ public class SearchResultTrampoline extends Activity {
|
|
||||||
protected void onCreate(Bundle savedInstanceState) {
|
|
||||||
super.onCreate(savedInstanceState);
|
|
||||||
|
|
||||||
- final ComponentName callingActivity = getCallingActivity();
|
|
||||||
+ final String callerPackage = getLaunchedFromPackage();
|
|
||||||
// First make sure caller has privilege to launch a search result page.
|
|
||||||
FeatureFactory.getFactory(this)
|
|
||||||
.getSearchFeatureProvider()
|
|
||||||
- .verifyLaunchSearchResultPageCaller(this, callingActivity);
|
|
||||||
+ .verifyLaunchSearchResultPageCaller(this, callerPackage);
|
|
||||||
// Didn't crash, proceed and launch the result as a subsetting.
|
|
||||||
Intent intent = getIntent();
|
|
||||||
final String highlightMenuKey = intent.getStringExtra(
|
|
||||||
@@ -99,7 +98,7 @@ public class SearchResultTrampoline extends Activity {
|
|
||||||
|
|
||||||
if (!ActivityEmbeddingUtils.isEmbeddingActivityEnabled(this)) {
|
|
||||||
startActivity(intent);
|
|
||||||
- } else if (isSettingsIntelligence(callingActivity)) {
|
|
||||||
+ } else if (isSettingsIntelligence(callerPackage)) {
|
|
||||||
if (FeatureFlagUtils.isEnabled(this, FeatureFlags.SETTINGS_SEARCH_ALWAYS_EXPAND)) {
|
|
||||||
startActivity(SettingsActivity.getTrampolineIntent(intent, highlightMenuKey)
|
|
||||||
.setClass(this, DeepLinkHomepageActivityInternal.class)
|
|
||||||
@@ -132,9 +131,9 @@ public class SearchResultTrampoline extends Activity {
|
|
||||||
finish();
|
|
||||||
}
|
|
||||||
|
|
||||||
- private boolean isSettingsIntelligence(ComponentName callingActivity) {
|
|
||||||
- return callingActivity != null && TextUtils.equals(
|
|
||||||
- callingActivity.getPackageName(),
|
|
||||||
+ private boolean isSettingsIntelligence(String callerPackage) {
|
|
||||||
+ return TextUtils.equals(
|
|
||||||
+ callerPackage,
|
|
||||||
FeatureFactory.getFactory(this).getSearchFeatureProvider()
|
|
||||||
.getSettingsIntelligencePkgName(this));
|
|
||||||
}
|
|
||||||
diff --git a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
|
|
||||||
index f3496001d0..8a7419bb1b 100644
|
|
||||||
--- a/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
|
|
||||||
+++ b/tests/robotests/src/com/android/settings/search/SearchFeatureProviderImplTest.java
|
|
||||||
@@ -20,7 +20,6 @@ package com.android.settings.search;
|
|
||||||
import static com.google.common.truth.Truth.assertThat;
|
|
||||||
|
|
||||||
import android.app.settings.SettingsEnums;
|
|
||||||
-import android.content.ComponentName;
|
|
||||||
import android.content.Intent;
|
|
||||||
import android.content.pm.ActivityInfo;
|
|
||||||
import android.content.pm.ResolveInfo;
|
|
||||||
@@ -131,20 +130,22 @@ public class SearchFeatureProviderImplTest {
|
|
||||||
|
|
||||||
@Test(expected = SecurityException.class)
|
|
||||||
public void verifyLaunchSearchResultPageCaller_badCaller_shouldCrash() {
|
|
||||||
- final ComponentName cn = new ComponentName("pkg", "class");
|
|
||||||
- mProvider.verifyLaunchSearchResultPageCaller(mActivity, cn);
|
|
||||||
+ final String packageName = "pkg";
|
|
||||||
+
|
|
||||||
+ mProvider.verifyLaunchSearchResultPageCaller(mActivity, packageName);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void verifyLaunchSearchResultPageCaller_settingsCaller_shouldNotCrash() {
|
|
||||||
- final ComponentName cn = new ComponentName(mActivity.getPackageName(), "class");
|
|
||||||
- mProvider.verifyLaunchSearchResultPageCaller(mActivity, cn);
|
|
||||||
+ final String packageName = mActivity.getPackageName();
|
|
||||||
+
|
|
||||||
+ mProvider.verifyLaunchSearchResultPageCaller(mActivity, packageName);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void verifyLaunchSearchResultPageCaller_settingsIntelligenceCaller_shouldNotCrash() {
|
|
||||||
final String packageName = mProvider.getSettingsIntelligencePkgName(mActivity);
|
|
||||||
- final ComponentName cn = new ComponentName(packageName, "class");
|
|
||||||
- mProvider.verifyLaunchSearchResultPageCaller(mActivity, cn);
|
|
||||||
+
|
|
||||||
+ mProvider.verifyLaunchSearchResultPageCaller(mActivity, packageName);
|
|
||||||
}
|
|
||||||
}
|
|
@ -96,7 +96,7 @@ commentPatches android_kernel_samsung_msm8930-common.sh "CVE-2017-11015/prima" "
|
|||||||
commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463/ANY/0001.patch";
|
commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463/ANY/0001.patch";
|
||||||
commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
|
commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
|
||||||
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
|
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
|
||||||
commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305" "CVE-2021-3506/4.19" "CVE-2024-26934/4.19";
|
commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305" "CVE-2021-3506/4.19" "CVE-2024-26934/4.19" "CVE-2024-26934" "CVE-2024-44944";
|
||||||
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
|
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
|
||||||
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
|
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
|
||||||
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
|
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
|
||||||
@ -157,7 +157,7 @@ do
|
|||||||
done
|
done
|
||||||
|
|
||||||
#4.14
|
#4.14
|
||||||
declare -a fourDotFourteen=("${fourDotNine[@]}" "android_kernel_google_msm-4.14.sh" "android_kernel_xiaomi_sm6150.sh" "android_kernel_oneplus_sm8150.sh" "android_kernel_xiaomi_sm8150.sh");
|
declare -a fourDotFourteen=("${fourDotNine[@]}" "android_kernel_google_msm-4.14.sh" "android_kernel_xiaomi_sm6150.sh" "android_kernel_oneplus_sm8150.sh" "android_kernel_xiaomi_sm8150.sh" "android_kernel_xiaomi_vayu.sh");
|
||||||
for script in "${fourDotFourteen[@]}"
|
for script in "${fourDotFourteen[@]}"
|
||||||
do
|
do
|
||||||
commentPatches $script "CVE-2019-19252/4.19" "CVE-2021-46921/4.19" "CVE-2023-51043/4.19" "CVE-2024-38618" "CVE-2023-52486/^6.7" "CVE-2024-35910";
|
commentPatches $script "CVE-2019-19252/4.19" "CVE-2021-46921/4.19" "CVE-2023-51043/4.19" "CVE-2024-38618" "CVE-2023-52486/^6.7" "CVE-2024-35910";
|
||||||
|
@ -128,6 +128,7 @@ sed -i -e '22,24d;' androidtest/Android.bp; #fix compile under A12
|
|||||||
fi;
|
fi;
|
||||||
|
|
||||||
if enterAndClear "external/SecureCamera"; then
|
if enterAndClear "external/SecureCamera"; then
|
||||||
|
git revert --no-edit 36f2dd34e1d0c2b7d26153969cca56a7ff665329;
|
||||||
sed -i '/LOCAL_MODULE/s/Camera/SecureCamera/' Android.mk; #Change module name
|
sed -i '/LOCAL_MODULE/s/Camera/SecureCamera/' Android.mk; #Change module name
|
||||||
sed -i '11iLOCAL_OVERRIDES_PACKAGES := Camera Camera2 LegacyCamera Snap OpenCamera' Android.mk; #Replace the others
|
sed -i '11iLOCAL_OVERRIDES_PACKAGES := Camera Camera2 LegacyCamera Snap OpenCamera' Android.mk; #Replace the others
|
||||||
fi;
|
fi;
|
||||||
|
@ -912,7 +912,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.14/0009.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.14/0009.patch
|
||||||
@ -1064,7 +1064,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.19/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
|
||||||
|
@ -55,7 +55,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
|
||||||
@ -72,7 +72,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46998/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46998/4.19/0002.patch
|
||||||
@ -126,7 +126,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
|
||||||
@ -143,7 +143,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52477/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52477/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52478/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52478/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/^6.7/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/^6.7/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52510/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52510/4.14/0002.patch
|
||||||
@ -327,7 +327,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35910/4.14/0008.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35910/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35925/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35925/4.14/0008.patch
|
||||||
@ -386,7 +386,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.14/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.14/0008.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.14/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.14/0009.patch
|
||||||
|
@ -53,6 +53,8 @@ buildAll() {
|
|||||||
#frontloaded for testing
|
#frontloaded for testing
|
||||||
buildDevice bluejay avb;
|
buildDevice bluejay avb;
|
||||||
buildDevice taimen avb;
|
buildDevice taimen avb;
|
||||||
|
buildDevice fajita avb;
|
||||||
|
buildDevice flame avb;
|
||||||
#SD820
|
#SD820
|
||||||
buildDevice h830;
|
buildDevice h830;
|
||||||
buildDevice h850;
|
buildDevice h850;
|
||||||
@ -85,7 +87,6 @@ buildAll() {
|
|||||||
buildDevice kirin;
|
buildDevice kirin;
|
||||||
buildDevice mermaid;
|
buildDevice mermaid;
|
||||||
#SD845
|
#SD845
|
||||||
buildDevice fajita avb;
|
|
||||||
buildDevice enchilada avb;
|
buildDevice enchilada avb;
|
||||||
buildDevice aura avb;
|
buildDevice aura avb;
|
||||||
buildDevice beryllium avb;
|
buildDevice beryllium avb;
|
||||||
@ -107,7 +108,6 @@ buildAll() {
|
|||||||
buildDevice hotdog avb;
|
buildDevice hotdog avb;
|
||||||
buildDevice hotdogb avb;
|
buildDevice hotdogb avb;
|
||||||
buildDevice coral avb;
|
buildDevice coral avb;
|
||||||
buildDevice flame avb;
|
|
||||||
#buildDevice vayu avb; #XXX: no Wi-Fi
|
#buildDevice vayu avb; #XXX: no Wi-Fi
|
||||||
#SD730
|
#SD730
|
||||||
buildDevice sunfish avb;
|
buildDevice sunfish avb;
|
||||||
|
@ -313,7 +313,6 @@ applyPatch "$DOS_PATCHES/android_packages_apps_Nfc/0001-constify_JNINativeMethod
|
|||||||
fi;
|
fi;
|
||||||
|
|
||||||
if enterAndClear "packages/apps/Settings"; then
|
if enterAndClear "packages/apps/Settings"; then
|
||||||
applyPatch "$DOS_PATCHES/android_packages_apps_Settings/316891059-20.patch"; #x-asb_2024-05 Replace getCallingActivity() with getLaunchedFromPackage()
|
|
||||||
git revert --no-edit 41b4ed345a91da1dd46c00ee11a151c2b5ff4f43;
|
git revert --no-edit 41b4ed345a91da1dd46c00ee11a151c2b5ff4f43;
|
||||||
applyPatch "$DOS_PATCHES/android_packages_apps_Settings/0004-Private_DNS.patch"; #More 'Private DNS' options (heavily based off of a CalyxOS patch)
|
applyPatch "$DOS_PATCHES/android_packages_apps_Settings/0004-Private_DNS.patch"; #More 'Private DNS' options (heavily based off of a CalyxOS patch)
|
||||||
applyPatch "$DOS_PATCHES/android_packages_apps_Settings/0005-Automatic_Reboot.patch"; #Timeout for reboot (GrapheneOS)
|
applyPatch "$DOS_PATCHES/android_packages_apps_Settings/0005-Automatic_Reboot.patch"; #Timeout for reboot (GrapheneOS)
|
||||||
|
Loading…
Reference in New Issue
Block a user