mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-25 07:29:24 -05:00
Small tweaks
This commit is contained in:
parent
1e5df6f42e
commit
143bec97a9
@ -125,10 +125,12 @@ echo "Deblobbing...";
|
||||
makes=$makes"|DxHDCP.cfg";
|
||||
|
||||
#Display Color Tuning [Qualcomm]
|
||||
#blobs=$blobs"|mm-pp-daemon|mm-pp-dpps";
|
||||
blobs=$blobs"|mm-pp-daemon|mm-pp-dpps";
|
||||
blobs=$blobs"|colorservice.apk|PPPreference.apk|CABLService.apk|QdcmFF.apk";
|
||||
#blobs=$blobs"|libdisp-aba.so|libmm-abl-oem.so|libmm-abl.so|libmm-als.so|libmm-color-convertor.so|libmm-disp-apis.so|libmm-qdcm.so|libsd_sdk_display.so|libdpps.so";
|
||||
#blobs=$blobs"|vendor.display.color.*|vendor.display.postproc.*|vendor.qti.hardware.qdutils_disp.*|com.qti.snapdragon.sdk.display.*";
|
||||
blobs=$blobs"|libmm-color-convertor.so|libsd_sdk_display.so|libdpps.so";
|
||||
#blobs=$blobs"|libdisp-aba.so|libmm-abl-oem.so|libmm-abl.so|libmm-als.so|libmm-disp-apis.so|libmm-qdcm.so"; #XXX: needed for hwcomposer(?)
|
||||
blobs=$blobs"|vendor.display.color.*|vendor.display.postproc.*|vendor.qti.hardware.qdutils_disp.*|com.qti.snapdragon.sdk.display.*";
|
||||
makes=$makes"|vendor.lineage.livedisplay.*service-legacymm";
|
||||
|
||||
#DivX (DRM) [DivX]
|
||||
blobs=$blobs"|libDivxDrm.so|libSHIMDivxDrm.so";
|
||||
@ -594,6 +596,9 @@ deblobDevice() {
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_RENDERSCRIPT" = true ] || [ "$DOS_DEBLOBBER_REMOVE_GRAPHICS" = true ]; then
|
||||
awk -i inplace '!/RS_DRIVER/' BoardConfig*.mk &>/dev/null || true;
|
||||
fi;
|
||||
if [ -f device-common.mk ]; then
|
||||
awk -i inplace '!/'"$makes"'/' device-common.mk; #Remove references from common makefile
|
||||
fi;
|
||||
if [ -f common.mk ]; then
|
||||
awk -i inplace '!/'"$makes"'/' common.mk; #Remove references from common makefile
|
||||
fi;
|
||||
|
@ -70,7 +70,7 @@ patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/248649.patch"; #msm_irqba
|
||||
patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on user builds XXX: REMOVE THIS TRASH
|
||||
|
||||
enterAndClear "external/chromium-webview";
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/1; #update webview
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/2; #update webview
|
||||
|
||||
enterAndClear "external/sqlite";
|
||||
patch -p1 < "$DOS_PATCHES/android_external_sqlite/0001-Secure_Delete.patch"; #Enable secure_delete by default (AndroidHardening-13.0)
|
||||
|
@ -71,7 +71,7 @@ enterAndClear "device/qcom/sepolicy";
|
||||
patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH
|
||||
|
||||
enterAndClear "external/chromium-webview";
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/1; #update webview
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/2; #update webview
|
||||
|
||||
enterAndClear "external/svox";
|
||||
git revert --no-edit 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles
|
||||
|
@ -73,7 +73,7 @@ patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.pa
|
||||
echo "SELINUX_IGNORE_NEVERALLOWS := true" >> sepolicy.mk; #necessary for -user builds of legacy devices
|
||||
|
||||
enterAndClear "external/chromium-webview";
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/1; #update webview
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/2; #update webview
|
||||
|
||||
enterAndClear "external/svox";
|
||||
git revert --no-edit 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles
|
||||
|
@ -70,7 +70,7 @@ patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.pa
|
||||
echo "SELINUX_IGNORE_NEVERALLOWS := true" >> sepolicy.mk; #necessary for -user builds of legacy devices
|
||||
|
||||
enterAndClear "external/chromium-webview";
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/1; #update webview
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/2; #update webview
|
||||
|
||||
enterAndClear "external/svox";
|
||||
git revert --no-edit 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles
|
||||
@ -260,7 +260,6 @@ echo "allow mm-qcamerad self:tcp_socket { bind create setopt };" >> sepolicy/mm-
|
||||
echo "allow mm-qcamerad camera_prop:file read;" >> sepolicy/mm-qcamerad.te;
|
||||
echo "set_prop(mm-qcamerad, camera_prop)" >> sepolicy/mm-qcamerad.te;
|
||||
|
||||
|
||||
enterAndClear "device/oneplus/sm8150-common";
|
||||
enableVerity; #Resurrect dm-verity
|
||||
|
||||
|
@ -97,9 +97,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
|
||||
editKernelLocalversion "-dos.p101"
|
||||
editKernelLocalversion "-dos.p97"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -103,7 +103,10 @@ export -f buildAll;
|
||||
patchWorkspace() {
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
||||
|
||||
#source build/envsetup.sh;
|
||||
source build/envsetup.sh;
|
||||
repopick -it a2dp-master-fixes;
|
||||
repopick -i 311606 311607; #intent security fix
|
||||
repopick -i 311514; #mata 4.4.271
|
||||
|
||||
source "$DOS_SCRIPTS/Patch.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh";
|
||||
|
@ -65,7 +65,7 @@ patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.pa
|
||||
echo "SELINUX_IGNORE_NEVERALLOWS := true" >> sepolicy.mk; #necessary for -user builds of legacy devices
|
||||
|
||||
enterAndClear "external/chromium-webview";
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/1; #update webview
|
||||
git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/2; #update webview
|
||||
|
||||
enterAndClear "frameworks/base";
|
||||
hardenLocationConf services/core/java/com/android/server/location/gps_debug.conf;
|
||||
@ -197,6 +197,7 @@ sed -i 's/messaging/Silence/' config/telephony.mk; #Switch to Silence
|
||||
|
||||
enter "vendor/divested";
|
||||
awk -i inplace '!/EtarPrebuilt/' packages.mk; #lineage-17.1 calendar is Etar fork
|
||||
awk -i inplace '!/_lookup/' overlay/common/lineage-sdk/packages/LineageSettingsProvider/res/values/defaults.xml;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> packages.mk; fi;
|
||||
if [ "$DOS_HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += $DOS_HOSTS_BLOCKING_APP" >> packages.mk; fi;
|
||||
echo "PRODUCT_PACKAGES += vendor.lineage.trust@1.0-service" >> packages.mk; #All of our kernels have deny USB patch added
|
||||
|
Loading…
Reference in New Issue
Block a user