Hard fail on error

Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
Tad 2021-10-16 15:28:15 -04:00
parent a5cdb9ab58
commit 256b1db98b
29 changed files with 105 additions and 65 deletions

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -uo pipefail;
if [ -d "$DOS_SIGNING_KEYS" ]; then
echo "Copying verity/avb public keys to kernels...";
@ -104,7 +105,7 @@ cp -v "$DOS_SIGNING_KEYS/vayu/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm81
cp -v "$DOS_SIGNING_KEYS/walleye/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_walleye_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/z2_plus/verifiedboot_relkeys.der.x509" "kernel/zuk/msm8996/verifiedboot_z2_plus_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/zenfone3/verifiedboot_relkeys.der.x509" "kernel/asus/msm8953/verifiedboot_zenfone3_dos_relkeys.der.x509";
echo "Copied keys to kernels!";
echo -e "\e[0;32m[SCRIPT COMPLETE] Copied keys to kernels\e[0m";
else
echo -e "\e[0;31mSigning keys unavailable, NOT copying public keys to kernels!\e[0m";
echo -e "\e[0;31mSigning keys unavailable, NOT copying public keys to kernels\e[0m";
fi;

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -uo pipefail;
#Goal: Remove as many proprietary blobs without breaking core functionality
#Outcome: Increased battery/performance/privacy/security, Decreased ROM size
@ -806,4 +807,4 @@ rm -rf vendor/samsung/nodevice;
cd "$DOS_BUILD_BASE";
echo "Deblobbing complete!";
echo -e "\e[0;32m[SCRIPT COMPLETE] Deblobbing complete\e[0m";

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -euo pipefail;
commentPatches() {
file="$1";
@ -83,3 +84,4 @@ commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/
commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima";
commentPatches android_kernel_zte_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-13162" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166";
commentPatches android_kernel_zuk_msm8996.sh "0008-Graphene-Kernel_Hardening/4.4/0011.patch" "0008-Graphene-Kernel_Hardening/4.4/0012.patch" "0008-Graphene-Kernel_Hardening/4.4/0014.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-1616";
echo -e "\e[0;32m[SCRIPT COMPLETE] Fixed CVE patchers\e[0m";

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -euo pipefail;
#Attempts to increase performance and battery life
#Last verified: 2018-04-27
@ -35,4 +36,4 @@ sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/in
fi;
cd "$DOS_BUILD_BASE";
echo "Optimizing complete!";
echo -e "\e[0;32m[SCRIPT COMPLETE] Optimizing complete\e[0m";

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -uo pipefail;
#Attempts to patch kernels to be more secure
@ -37,4 +38,4 @@ for patcher in "$DOS_SCRIPTS_CVES"/*.sh; do
done;
cd "$DOS_BUILD_BASE";
echo "Patched CVEs!";
echo -e "\e[0;32m[SCRIPT COMPLETE] Patched CVEs\e[0m";

View file

@ -14,6 +14,7 @@
#
#You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>.
set -euo pipefail;
echo "Post tweaks...";
@ -37,4 +38,4 @@ sed -i 's/static bool slab_nomerge __ro_after_init = !IS_ENABLED(CONFIG_SLAB_MER
cd "$DOS_BUILD_BASE";
echo "Post tweaks complete!";
echo -e "\e[0;32m[SCRIPT COMPLETE] Post tweaks complete\e[0m";