diff --git a/Manifests/Manifest_LAOS-19.1.xml b/Manifests/Manifest_LAOS-19.1.xml index fb8021ee..1019d6e9 100644 --- a/Manifests/Manifest_LAOS-19.1.xml +++ b/Manifests/Manifest_LAOS-19.1.xml @@ -62,6 +62,10 @@ + + + + @@ -101,6 +105,14 @@ + + + + + + + + diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index 32665f0e..99c87983 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -443,7 +443,6 @@ echo "allow cameraserver sysfs_soc:file r_file_perms;" >> sepolicy/vendor/camera fi; if enterAndClear "device/essential/mata"; then -#git revert --no-edit 1f1d061c4d7ddedcac503608e8fa333aff30a693 3928b30a97fe7f6b6020bbd9d83a56a32de4ba16 e91f0fece65d32ca407be532e2c4456056b1a968; #Unbreak the earpiece speaker, breaking the loud speaker volume control on calls echo "allow permissioncontroller_app tethering_service:service_manager find;" > sepolicy/private/permissioncontroller_app.te; fi; diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh new file mode 100644 index 00000000..61eb476c --- /dev/null +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -0,0 +1,125 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/essential/msm8998" +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0017.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/4.4/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5909/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5910/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11818/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12010/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13920/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2264/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10584/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/^4.15/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch +editKernelLocalversion "-dos.p121" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh new file mode 100644 index 00000000..58d37896 --- /dev/null +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -0,0 +1,78 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/oneplus/msm8998" +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1941/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1945/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch +editKernelLocalversion "-dos.p74" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/Functions.sh b/Scripts/LineageOS-19.1/Functions.sh index 329398d7..6d7d8503 100644 --- a/Scripts/LineageOS-19.1/Functions.sh +++ b/Scripts/LineageOS-19.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2022-04-04 patchAllKernels() { - startPatcher "kernel_fxtec_msm8998 kernel_google_msm-4.9 kernel_google_msm-4.14 kernel_google_redbull kernel_google_wahoo kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_razer_msm8998 kernel_razer_sdm845 kernel_sony_sdm660 kernel_xiaomi_sdm845"; + startPatcher "kernel_essential_msm8998 kernel_fxtec_msm8998 kernel_google_msm-4.9 kernel_google_msm-4.14 kernel_google_redbull kernel_google_wahoo kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_razer_msm8998 kernel_razer_sdm845 kernel_sony_sdm660 kernel_xiaomi_sdm845"; } export -f patchAllKernels; @@ -60,6 +60,9 @@ buildAll() { buildDevice discovery; #SD835 buildDevice cheryl verity; + buildDevice cheeseburger verity; + buildDevice dumpling verity; + buildDevice mata verity; buildDevice taimen avb; buildDevice walleye avb; #SD845 diff --git a/Scripts/LineageOS-19.1/Patch.sh b/Scripts/LineageOS-19.1/Patch.sh index 37d491f4..7ac80720 100644 --- a/Scripts/LineageOS-19.1/Patch.sh +++ b/Scripts/LineageOS-19.1/Patch.sh @@ -390,10 +390,20 @@ fi; # #START OF DEVICE CHANGES # +if enterAndClear "device/essential/mata"; then +echo "allow permissioncontroller_app tethering_service:service_manager find;" > sepolicy/private/permissioncontroller_app.te; +fi; + if enterAndClear "device/google/redbull"; then awk -i inplace '!/sctp/' BoardConfig-common.mk modules.load; #fix compile after hardenDefconfig fi; +if enterAndClear "device/oneplus/msm8998-common"; then +awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation +sed -i '/PRODUCT_SYSTEM_VERITY_PARTITION/iPRODUCT_VENDOR_VERITY_PARTITION := /dev/block/bootdevice/by-name/vendor' common.mk; #Support verity on /vendor too +awk -i inplace '!/vendor_sensors_dbg_prop/' sepolicy/vendor/hal_camera_default.te; #fixup +fi; + if enterAndClear "kernel/google/wahoo"; then sed -i 's/asm(SET_PSTATE_UAO(1));/asm(SET_PSTATE_UAO(1)); return 0;/' arch/arm64/mm/fault.c; #fix build with CONFIG_ARM64_UAO fi;