This repository was archived by the owner on Dec 23, 2024. It is now read-only.
File tree Expand file tree Collapse file tree 5 files changed +4
-15
lines changed
Expand file tree Collapse file tree 5 files changed +4
-15
lines changed Original file line number Diff line number Diff line change @@ -55,8 +55,8 @@ commentPatches android_kernel_google_bonito.sh "CVE-2020-0067";
5555commentPatches android_kernel_google_coral.sh " CVE-2019-19319" " CVE-2020-1749" " CVE-2020-8992" " CVE-2021-30324" ;
5656commentPatches android_kernel_google_dragon.sh " 0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" " 0008-Graphene-Kernel_Hardening-ro" " CVE-2015-4167" " CVE-2017-15951" " CVE-2016-1237" " CVE-2016-6198" " CVE-2017-7374" " CVE-2018-17972" " CVE-2019-2214" " CVE-2021-39715/ANY/0001.patch" ;
5757commentPatches android_kernel_google_crosshatch.sh " CVE-2020-0067" ;
58- commentPatches android_kernel_google_gs101_private_gs-google.sh " CVE-2021-29648/^5.11/0001.patch" " CVE-2023-6817/5.10/0002.patch" " CVE-2023-52462/5.10/0002.patch" " CVE-2023-52672" " CVE-2024-26733/5.10/0002.patch" " CVE-2023-52656/5.10" " CVE-2024-26882" ;
59- commentPatches android_kernel_google_gs201_private_gs-google.sh " CVE-2021-29648/^5.11/0001.patch" " CVE-2023-6817/5.10/0002.patch" " CVE-2023-52462/5.10/0002.patch" " CVE-2023-52672" " CVE-2024-26733/5.10/0002.patch" " CVE-2023-52656/5.10" " CVE-2024-26882" ;
58+ commentPatches android_kernel_google_gs101_private_gs-google.sh " CVE-2021-29648/^5.11/0001.patch" " CVE-2023-6817/5.10/0002.patch" " CVE-2023-52462/5.10/0002.patch" " CVE-2023-52672" " CVE-2024-26733/5.10/0002.patch" " CVE-2023-52656/5.10" " CVE-2024-26882" " CVE-2024-38564 " ;
59+ commentPatches android_kernel_google_gs201_private_gs-google.sh " CVE-2021-29648/^5.11/0001.patch" " CVE-2023-6817/5.10/0002.patch" " CVE-2023-52462/5.10/0002.patch" " CVE-2023-52672" " CVE-2024-26733/5.10/0002.patch" " CVE-2023-52656/5.10" " CVE-2024-26882" " CVE-2024-38564 " ;
6060commentPatches android_kernel_google_marlin.sh " 0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" " 0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch" " 0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch" " 0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" " CVE-2017-13162/3.18/0001.patch" " CVE-2017-14883" " CVE-2017-15951" " CVE-2018-17972" " CVE-2019-16746" " CVE-2020-0427" " CVE-2020-14381" " CVE-2020-16166" " CVE-2021-39715/ANY/0001.patch" " CVE-2022-42896/4.9" ;
6161commentPatches android_kernel_google_msm.sh " CVE-2017-11015/prima" " CVE-2021-Misc2/ANY/0031.patch" ;
6262commentPatches android_kernel_google_msm-4.9.sh " CVE-2019-19319" " CVE-2020-0067" " CVE-2020-1749" " CVE-2020-8992" " CVE-2021-30324" " CVE-2021-45469" ;
Original file line number Diff line number Diff line change @@ -66,9 +66,8 @@ patchWorkspaceReal() {
6666 verifyAllPlatformTags;
6767 gpgVerifyGitHead " $DOS_BUILD_BASE /external/chromium-webview" ;
6868
69- source build/envsetup.sh;
69+ # source build/envsetup.sh;
7070 # repopick -ift twelve-bt-sbc-hd-dualchannel;
71- repopick -it S_asb_2024-06 -e 394523,394543;
7271
7372 sh " $DOS_SCRIPTS /Patch.sh" ;
7473 sh " $DOS_SCRIPTS_COMMON /Enable_Verity.sh" ;
Original file line number Diff line number Diff line change @@ -95,7 +95,6 @@ applyPatch "$DOS_PATCHES_COMMON/android_build/0001-verity-openssl3.patch"; #Fix
9595sed -i ' 75i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aapt2.mk; # Enable auto-add-overlay for packages, this allows the vendor overlay to easily work across all branches.
9696awk -i inplace ' !/updatable_apex.mk/' target/product/generic_system.mk; # Disable APEX
9797sed -i ' s/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; # Set the minimum supported target SDK to Pie (GrapheneOS)
98- sed -i ' s/2024-05-05/2024-06-05/' core/version_defaults.mk; # Bump Security String #S_asb_2024-06
9998fi ;
10099
101100if enterAndClear " build/soong" ; then
@@ -395,10 +394,6 @@ if enterAndClear "system/extras"; then
395394applyPatch " $DOS_PATCHES /android_system_extras/0001-ext4_pad_filenames.patch" ; # FBE: pad filenames more (GrapheneOS)
396395fi ;
397396
398- if enterAndClear " system/libfmq" ; then
399- git fetch https://github.com/LineageOS/android_system_libfmq refs/changes/43/394543/1 && git cherry-pick FETCH_HEAD; # S_asb_2024-06
400- fi ;
401-
402397if enterAndClear " system/netd" ; then
403398applyPatch " $DOS_PATCHES /android_system_netd/0001-Network_Permission.patch" ; # Expose the NETWORK permission (GrapheneOS)
404399fi ;
Original file line number Diff line number Diff line change @@ -162,8 +162,7 @@ patchWorkspaceReal() {
162162 verifyAllPlatformTags;
163163 gpgVerifyGitHead " $DOS_BUILD_BASE /external/chromium-webview" ;
164164
165- source build/envsetup.sh;
166- repopick -it T_asb_2024-06 -e 394238,394253;
165+ # source build/envsetup.sh;
167166
168167 sh " $DOS_SCRIPTS /Patch.sh" ;
169168 sh " $DOS_SCRIPTS_COMMON /Enable_Verity.sh" ;
Original file line number Diff line number Diff line change @@ -395,10 +395,6 @@ if enterAndClear "system/extras"; then
395395applyPatch " $DOS_PATCHES /android_system_extras/0001-ext4_pad_filenames.patch" ; # FBE: pad filenames more (GrapheneOS)
396396fi ;
397397
398- if enterAndClear " system/libfmq" ; then
399- git fetch https://github.com/LineageOS/android_system_libfmq refs/changes/53/394253/1 && git cherry-pick FETCH_HEAD; # T_asb_2024-06
400- fi ;
401-
402398if enterAndClear " system/sepolicy" ; then
403399applyPatch " $DOS_PATCHES /android_system_sepolicy/0002-protected_files.patch" ; # Label protected_{fifos,regular} as proc_security (GrapheneOS)
404400applyPatch " $DOS_PATCHES /android_system_sepolicy/0003-ptrace_scope-1.patch" ; # Allow init to control kernel.yama.ptrace_scope (GrapheneOS)
You can’t perform that action at this time.
0 commit comments