From 2cf0b314d8e9f47d1ddf5810d3d1abc34f8d9e3b Mon Sep 17 00:00:00 2001 From: Tad Date: Thu, 6 May 2021 14:37:51 -0400 Subject: [PATCH] Various changes - Cherrypick May ASB topics - 18.1: bump enchilada, fajita, and guacamole --- Manifests/Manifest_LAOS-18.1.xml | 17 +- Misc/aosp-cves/gen_cve_list-qc.sh | 1 + Misc/aosp-cves/gen_cve_list.sh | 2 + Scripts/LineageOS-14.1/Functions.sh | 1 + Scripts/LineageOS-15.1/Functions.sh | 3 +- Scripts/LineageOS-16.0/Functions.sh | 3 +- Scripts/LineageOS-17.1/Functions.sh | 3 +- .../android_kernel_oneplus_sdm845.sh | 193 ++++++++++++++++++ .../android_kernel_oneplus_sm8150.sh | 167 +++++++++++++++ Scripts/LineageOS-18.1/Functions.sh | 6 +- Scripts/LineageOS-18.1/Patch.sh | 3 + 11 files changed, 394 insertions(+), 5 deletions(-) create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index 3b837e18..a4510d47 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -67,7 +67,7 @@ - + @@ -164,6 +164,21 @@ + + + + + + + + + + + + + + + diff --git a/Misc/aosp-cves/gen_cve_list-qc.sh b/Misc/aosp-cves/gen_cve_list-qc.sh index d2c88bd9..b738b6fc 100644 --- a/Misc/aosp-cves/gen_cve_list-qc.sh +++ b/Misc/aosp-cves/gen_cve_list-qc.sh @@ -1,3 +1,4 @@ +java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin" >> cve_list-qc.txt java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin" >> cve_list-qc.txt java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin" >> cve_list-qc.txt java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin" >> cve_list-qc.txt diff --git a/Misc/aosp-cves/gen_cve_list.sh b/Misc/aosp-cves/gen_cve_list.sh index b13f439a..f0bf796d 100644 --- a/Misc/aosp-cves/gen_cve_list.sh +++ b/Misc/aosp-cves/gen_cve_list.sh @@ -1,8 +1,10 @@ +java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2021-05-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2021-04-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2021-03-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2021-02-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2021-01-01" >> cve_list.txt +java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2021-05-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2021-04-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2021-03-01" >> cve_list.txt java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2021-02-01" >> cve_list.txt diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh index 7ceb6860..37682e1f 100644 --- a/Scripts/LineageOS-14.1/Functions.sh +++ b/Scripts/LineageOS-14.1/Functions.sh @@ -97,6 +97,7 @@ patchWorkspace() { source build/envsetup.sh; repopick -ift n_asb_09-2018-qcom; #TODO: move in tree #repopick -it bt-sbc-hd-dualchannel-nougat; + repopick -it n-asb-2021-05; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh"; diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh index b360b2c7..8ab658d2 100644 --- a/Scripts/LineageOS-15.1/Functions.sh +++ b/Scripts/LineageOS-15.1/Functions.sh @@ -82,7 +82,8 @@ export -f buildAll; patchWorkspace() { if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi; - #source build/envsetup.sh; + source build/envsetup.sh; + repopick -it O_asb_2021-05; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh"; diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh index e38d8429..e25c2a48 100644 --- a/Scripts/LineageOS-16.0/Functions.sh +++ b/Scripts/LineageOS-16.0/Functions.sh @@ -72,8 +72,9 @@ export -f buildAll; patchWorkspace() { if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi; - #source build/envsetup.sh; + source build/envsetup.sh; #repopick -it pie-firewall; + repopick -it P_asb_2021-05; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh"; diff --git a/Scripts/LineageOS-17.1/Functions.sh b/Scripts/LineageOS-17.1/Functions.sh index 04654054..87658a30 100644 --- a/Scripts/LineageOS-17.1/Functions.sh +++ b/Scripts/LineageOS-17.1/Functions.sh @@ -98,8 +98,9 @@ export -f buildAll; patchWorkspace() { if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi; - #source build/envsetup.sh; + source build/envsetup.sh; #repopick -it ten-firewall; + repopick -it Q_asb_2021-05; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh"; diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh new file mode 100644 index 00000000..014e2669 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -0,0 +1,193 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/oneplus/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0239-0240.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0040.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0056.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0057.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch +editKernelLocalversion "-dos.p189" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh new file mode 100644 index 00000000..8e13122c --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -0,0 +1,167 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/oneplus/sm8150" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0201-0202.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0205-0206.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0207-0208.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0210-0211.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0061.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0074.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0076.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0080.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0083.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0085.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0086.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0087.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0088.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0089.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14099/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25704/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27777/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1927/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch +editKernelLocalversion "-dos.p163" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index a61c977b..26838db0 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2021-03-22 patchAllKernels() { - startPatcher "kernel_essential_msm8998 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_samsung_jf kernel_samsung_msm8974 kernel_xiaomi_sdm845"; + startPatcher "kernel_essential_msm8998 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_samsung_jf kernel_samsung_msm8974 kernel_xiaomi_sdm845"; } export -f patchAllKernels; @@ -86,7 +86,10 @@ buildAll() { #SD845 buildDevice beryllium; #needs manual patching in vendor buildDevice pro1 avb; + buildDevice enchilada avb; + buildDevice fajita avb; #SD855 + buildDevice guacamole avb; buildDevice coral avb; buildDevice flame avb; #SD670 @@ -100,6 +103,7 @@ patchWorkspace() { source build/envsetup.sh; repopick -i 300595; #system/netd: add missing override keyword + #repopick -it android-11.0.0_r37; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh"; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index ddc13026..1d2342dc 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -258,6 +258,9 @@ git revert --no-edit 0ba2cb240e8483fa85fcc831328f70f65eeb7180 2be3c88c331387f039 enterAndClear "device/oneplus/msm8998-common"; awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation +enterAndClear "device/oneplus/sm8150-common"; +enableVerity; #Resurrect dm-verity + enterAndClear "device/oppo/common"; awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation