Small fixes

This commit is contained in:
Tad 2020-11-09 00:29:29 -05:00
parent dfe516fc3d
commit e7a65ff912
9 changed files with 28 additions and 18 deletions

View File

@ -38,7 +38,8 @@ commentPatches android_kernel_essential_msm8998.sh "0008-Graphene-Kernel_Hardeni
commentPatches android_kernel_fairphone_msm8974.sh "CVE-2018-20169";
commentPatches android_kernel_fxtec_msm8998.sh "0008-Graphene-Kernel_Hardening/4.4/0011.patch" "0008-Graphene-Kernel_Hardening/4.4/0012.patch" "0008-Graphene-Kernel_Hardening/4.4/0014.patch" "0008-Graphene-Kernel_Hardening/4.4/0019.patch" "CVE-2019-11599" "CVE-2019-16746" "CVE-2019-18282" "CVE-2019-19319" "CVE-2019-ctnl-addr-leak" "CVE-2020-0429" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166";
commentPatches android_kernel_google_bonito.sh "CVE-2020-0067";
commentPatches android_kernel_google_dragon.sh "CVE-2015-4167/^3.19.1/0001.patch" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214";
commentPatches android_kernel_google_coral.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
commentPatches android_kernel_google_dragon.sh "CVE-2015-4167/^3.19.1/0001.patch" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214";
commentPatches android_kernel_google_crosshatch.sh "CVE-2020-0067";
commentPatches android_kernel_google_marlin.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "0006-Copperhead-Kernel_Hardening/3.18/0048.patch" "0006-Copperhead-Kernel_Hardening/3.18/0049.patch" "CVE-2017-13162/3.18/0001.patch" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-14381" "CVE-2020-16166";
commentPatches android_kernel_google_msm.sh "CVE-2017-11015/prima";

View File

@ -92,7 +92,7 @@ scanForMalware() {
echo -e "\e[0;31m----------------------------------------------------------------\e[0m";
echo -e "\e[0;31mWARNING: MALWARE WAS FOUND! PLEASE INVESTIGATE!\e[0m";
echo -e "\e[0;31m----------------------------------------------------------------\e[0m";
echo -e "\e[0;33mFalse positivies such as the following are probably OK\e[0m";
echo -e "\e[0;33mFalse positives such as the following are probably OK\e[0m";
echo -e "\e[0;33mPUAs: Ewind, Mobidash\e[0m";
echo -e "\e[0;31m----------------------------------------------------------------\e[0m";
sleep 60;

View File

@ -83,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15-^4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch

View File

@ -83,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15-^4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1237/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch

View File

@ -60,14 +60,12 @@ buildAll() {
buildDevice angler verity;
buildDevice Z00T; #broken - needs vendor patching
buildDevice axon7; #broken - needs vendor patching
buildDevice us996;
buildDevice us997;
buildDevice flounder verity;
buildDevice dragon verity;
#The following are all superseded, and should only be enabled if the newer version is broken (not building/booting/etc.)
buildDevice flo;
buildDevice h850; #broken
buildDevice fugu;
if [ "$DOS_BUILDALL_SUPERSEDED" = true ]; then
buildDevice mako;
@ -87,6 +85,8 @@ buildAll() {
buildDevice ether;
buildDevice kipper;
buildDevice oneplus3;
buildDevice us996;
buildDevice h850; #broken
buildDevice griffin;
buildDevice marlin verity;
buildDevice sailfish verity;

View File

@ -72,7 +72,7 @@ buildAll() {
buildDevice cheeseburger verity; #needs manual patching - vendor common makefile
buildDevice dumpling verity;
buildDevice yellowstone;
buildDevice yellowstone; #broken sepolicy?
if [ "$DOS_BUILDALL_SUPERSEDED" = true ]; then
#SD410
buildDevice crackling;

View File

@ -70,10 +70,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/^5.3.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0012.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0010.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0011.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch
@ -90,11 +90,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.14/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3694/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.14/0005.patch

View File

@ -80,7 +80,7 @@ buildAll() {
#SD810
buildDevice oneplus2;
#SD820
buildDevice h850; #needs manual patching + more - rm vendor/lge/v20-common/Android.bp
buildDevice h850;
buildDevice us996;
buildDevice griffin;
buildDevice oneplus3 verity;
@ -90,7 +90,7 @@ buildAll() {
buildDevice sailfish verity;
#SD835
buildDevice cheryl;
buildDevice cheeseburger verity; #needs manual patching - vendor common makefile
buildDevice cheeseburger verity; #needs manual patching - vendor common makefile + not booting
buildDevice dumpling verity;
buildDevice mata verity;
buildDevice taimen avb;
@ -115,7 +115,7 @@ buildAll() {
#Exynos
buildDevice starlte;
#Tegra
buildDevice yellowstone;
buildDevice yellowstone; #broken
}
export -f buildAll;
@ -148,9 +148,15 @@ enableDexPreOpt() {
cd "$DOS_BUILD_BASE$1";
if [ -f BoardConfig.mk ]; then
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk;
echo "WITH_DEXPREOPT_DEBUG_INFO := false" >> BoardConfig.mk;
echo "Enabled full dexpreopt for $1";
#m8: /system partition too small
if [ "$1" != "device/htc/m8" ]; then
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk;
echo "Enabled full dexpreopt for $1";
else
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true" >> BoardConfig.mk;
echo "Enabled core dexpreopt for $1";
fi;
fi;
cd "$DOS_BUILD_BASE";
}

View File

@ -112,6 +112,9 @@ enterAndClear "frameworks/opt/net/ims";
patch -p1 < "$DOS_PATCHES/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
fi
enterAndClear "hardware/qcom-caf/msm8996/audio";
patch -p1 < "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-8996.patch"; #audio_extn: Fix unused parameter warning in utils.c
enterAndClear "hardware/qcom-caf/msm8998/audio";
patch -p1 < "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-8998.patch"; #audio_extn: Fix unused parameter warning in utils.c