diff --git a/Manifests/Manifest_LAOS-16.0.xml b/Manifests/Manifest_LAOS-16.0.xml
index aebc0ecb..20765bb8 100644
--- a/Manifests/Manifest_LAOS-16.0.xml
+++ b/Manifests/Manifest_LAOS-16.0.xml
@@ -96,15 +96,6 @@
-
-
-
-
-
-
-
-
-
diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh
index 997bbb6a..05d9f18a 100644
--- a/Scripts/LineageOS-15.1/Patch.sh
+++ b/Scripts/LineageOS-15.1/Patch.sh
@@ -226,7 +226,7 @@ compressRamdisks;
echo "/dev/block/platform/msm_sdcc\.1/by-name/misc u:object_r:misc_block_device:s0" >> sepolicy/file_contexts;
enterAndClear "device/asus/msm8916-common";
-rm -rf Android.bp sensors; #already included in asus/flo
+rm -rf Android.bp sensors; #exact duplicate in asus/flo #XXX be careful with this
enterAndClear "device/lge/msm8996-common";
sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te;
diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh
deleted file mode 100644
index 32e12fa0..00000000
--- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/bin/bash
-cd "$DOS_BUILD_BASE""kernel/oneplus/msm8998"
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0244-0245.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0252-0253.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
-#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch
-#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch
-#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch
-#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13098/^4.17.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/^4.17.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13100/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14072/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
-editKernelLocalversion "-dos.p137"
-cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh
index e1fc859c..e38d8429 100644
--- a/Scripts/LineageOS-16.0/Functions.sh
+++ b/Scripts/LineageOS-16.0/Functions.sh
@@ -18,7 +18,7 @@
#Last verified: 2018-04-27
patchAllKernels() {
- startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_oneplus_msm8998 kernel_xiaomi_sdm845";
+ startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_xiaomi_sdm845";
}
export -f patchAllKernels;
@@ -60,9 +60,6 @@ buildAll() {
buildDevice kipper;
#SD625
buildDevice zenfone3; #broken - ninja: error: 'android.hidl.base@1.0.so', missing and no known rule to make it
- #SD835
- buildDevice cheeseburger verity; #needs manual patching - vendor common makefile + 17.1+ isn't booting
- buildDevice dumpling verity;
#SD845
buildDevice beryllium;
#Intel
diff --git a/Scripts/LineageOS-16.0/Patch.sh b/Scripts/LineageOS-16.0/Patch.sh
index 43a9ee16..36caf237 100644
--- a/Scripts/LineageOS-16.0/Patch.sh
+++ b/Scripts/LineageOS-16.0/Patch.sh
@@ -232,13 +232,8 @@ rm -rf libhidl; #breaks other devices
enterAndClear "device/lge/hammerhead";
git am $DOS_PATCHES/android_device_lge_hammerhead/*.patch; #hh-p-sepolicy
-rm -rf bdAddrLoader; #duplicate with mako
echo "SELINUX_IGNORE_NEVERALLOWS := true" >> BoardConfig.mk; #qcom-legacy sepolicy
-enterAndClear "device/oneplus/msm8998-common";
-patch -p1 < "$DOS_PATCHES_COMMON/android_device_audio/0001-No_Vorbis_Offload.patch"; #Fix Ogg Vorbis playback
-awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation
-
#Make changes to all devices
cd "$DOS_BUILD_BASE";
if [ "$DOS_LOWRAM_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'enableLowRam "{}"'; fi;
diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh
index 6b7825bf..fa005318 100644
--- a/Scripts/LineageOS-18.1/Patch.sh
+++ b/Scripts/LineageOS-18.1/Patch.sh
@@ -210,7 +210,6 @@ echo "PRODUCT_PACKAGES += eSpeakNG" >> packages.mk; #PicoTTS needs work to compi
#
enterAndClear "device/asus/flox";
compressRamdisks;
-rm -rf bdAddrLoader; #duplicate with mako
enterAndClear "device/essential/mata";
git revert --no-edit 3928b30a97fe7f6b6020bbd9d83a56a32de4ba16 e91f0fece65d32ca407be532e2c4456056b1a968; #Unbreak the earpiece speaker, breaking the loud speaker volume control on calls
@@ -242,6 +241,10 @@ sed -i '1itypeattribute wcnss_service misc_block_device_exception;' sepolicy/wcn
enterAndClear "device/lge/mako";
echo "pmf=0" >> wifi/wpa_supplicant_overlay.conf; #Wi-Fi chipset doesn't support PMF
awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools
+sed -i 's/bdAddrLoader/bdAddrLoader-mako/' device.mk bdAddrLoader/Android.bp bdAddrLoader/addrloader.c rootdir/etc/init.mako.bt.sh sepolicy/file_contexts; #Fix conflicts
+sed -i 's|/bdAddrLoader|/bdAddrLoader-mako|' rootdir/etc/init.mako.rc;
+sed -i '16iifeq ($(TARGET_DEVICE),mako)' sensors/Android.mk;
+echo "endif" >> sensors/Android.mk;
enterAndClear "device/lge/msm8996-common";
sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te;