diff --git a/Manifests/Manifest_LAOS-16.0.xml b/Manifests/Manifest_LAOS-16.0.xml index 20765bb8..e389a606 100644 --- a/Manifests/Manifest_LAOS-16.0.xml +++ b/Manifests/Manifest_LAOS-16.0.xml @@ -105,11 +105,6 @@ - - - - - diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index 5ce5a5bc..748c6179 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -229,10 +229,24 @@ + + + + + + + + + + + + + + diff --git a/Scripts/Common/Copy_Keys.sh b/Scripts/Common/Copy_Keys.sh index 4d98f5fd..97c6c6e3 100644 --- a/Scripts/Common/Copy_Keys.sh +++ b/Scripts/Common/Copy_Keys.sh @@ -17,6 +17,7 @@ echo "Copying verity/avb public keys to kernels..."; cat "$DOS_SIGNING_KEYS/Amber/verity.x509.pem" >> "kernel/yandex/sdm660/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/alioth/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/aura/verity.x509.pem" >> "kernel/razer/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/avicii/verity.x509.pem" >> "kernel/oneplus/sm7250/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/beryllium/verity.x509.pem" >> "kernel/xiaomi/sdm845/certs/verity.x509.pem"; @@ -34,12 +35,18 @@ cat "$DOS_SIGNING_KEYS/enchilada/verity.x509.pem" >> "kernel/oneplus/sdm845/cert cat "$DOS_SIGNING_KEYS/fajita/verity.x509.pem" >> "kernel/oneplus/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/flame/verity.x509.pem" >> "kernel/google/coral/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/FP3/verity.x509.pem" >> "kernel/fairphone/sdm632/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/griffin/verity.x509.pem" >> "kernel/motorola/msm8996/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/guacamoleb/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/guacamole/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/hotdog/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/hotdogb/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/lmi/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/marlin/verity.x509.pem" >> "kernel/google/marlin/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/mata/verity.x509.pem" >> "kernel/essential/msm8998/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/oneplus3/verity.x509.pem" >> "kernel/oneplus3/msm8996/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/pro1/verity.x509.pem" >> "kernel/fxtec/msm8998/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/raphael/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/sailfish/verity.x509.pem" >> "kernel/google/marlin/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/sargo/verity.x509.pem" >> "kernel/google/bonito/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/sargo/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem"; #cat "$DOS_SIGNING_KEYS/starlte/verity.x509.pem" >> "kernel/samsung/universal9810/certs/verity.x509.pem"; @@ -47,7 +54,10 @@ cat "$DOS_SIGNING_KEYS/sargo/verity.x509.pem" >> "kernel/google/msm-4.9/certs/ve cat "$DOS_SIGNING_KEYS/taimen/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/walleye/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/z2_plus/verity.x509.pem" >> "kernel/zuk/msm8996/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/zenfone3/verity.x509.pem" >> "kernel/asus/msm8953/certs/verity.x509.pem"; + cp -v "$DOS_SIGNING_KEYS/Amber/verifiedboot_relkeys.der.x509" "kernel/yandex/sdm660/verifiedboot_Amber_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/alioth/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_alioth_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/aura/verifiedboot_relkeys.der.x509" "kernel/razer/sdm845/verifiedboot_aura_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/avicii/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm7250/verifiedboot_avicii_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/beryllium/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sdm845/verifiedboot_beryllium_dos_relkeys.der.x509"; @@ -70,10 +80,12 @@ cp -v "$DOS_SIGNING_KEYS/guacamoleb/verifiedboot_relkeys.der.x509" "kernel/onepl cp -v "$DOS_SIGNING_KEYS/guacamole/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_guacamole_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/hotdog/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdog_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/hotdogb/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdogb_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/lmi/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_lmi_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/marlin/verifiedboot_relkeys.der.x509" "kernel/google/marlin/verifiedboot_marlin_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/mata/verifiedboot_relkeys.der.x509" "kernel/essential/msm8998/verifiedboot_mata_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/oneplus3/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8996/verifiedboot_oneplus3_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/pro1/verifiedboot_relkeys.der.x509" "kernel/fxtec/msm8998/verifiedboot_pro1_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/raphael/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_raphael_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sailfish/verifiedboot_relkeys.der.x509" "kernel/google/marlin/verifiedboot_sailfish_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sargo/verifiedboot_relkeys.der.x509" "kernel/google/bonito/verifiedboot_sargo_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sargo/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_sargo_dos_relkeys.der.x509"; diff --git a/Scripts/Common/Deblob.sh b/Scripts/Common/Deblob.sh index c16753e3..7e713e10 100644 --- a/Scripts/Common/Deblob.sh +++ b/Scripts/Common/Deblob.sh @@ -597,14 +597,7 @@ deblobDevice() { if [ "$DOS_DEBLOBBER_REMOVE_RENDERSCRIPT" = true ] || [ "$DOS_DEBLOBBER_REMOVE_GRAPHICS" = true ]; then awk -i inplace '!/RS_DRIVER/' BoardConfig*.mk &>/dev/null || true; fi; - if [ -f device-common.mk ]; then - awk -i inplace '!/'"$makes"'/' device-common.mk; #Remove references from common makefile - fi; - if [ -f common.mk ]; then - awk -i inplace '!/'"$makes"'/' common.mk; #Remove references from common makefile - fi; if [ -f device.mk ]; then - awk -i inplace '!/'"$makes"'/' device.mk; #Remove references from device makefile if [ -z "$replaceTime" ]; then echo "PRODUCT_PACKAGES += timekeep TimeKeep" >> device.mk; #Switch to Sony TimeKeep fi; @@ -615,8 +608,6 @@ deblobDevice() { local baseDirTmp=${PWD##*/}; local suffixTmp="-common"; if [ -f "${PWD##*/}".mk ] && [ "${PWD##*/}".mk != "sepolicy" ]; then - awk -i inplace '!/'"$makes"'/' "${PWD##*/}".mk; #Remove references from device makefile - awk -i inplace '!/'"$makes"'/' "${baseDirTmp%"$suffixTmp"}".mk &>/dev/null || true; #Remove references from device makefile if [ -z "$replaceTime" ]; then echo "PRODUCT_PACKAGES += timekeep TimeKeep" >> "${PWD##*/}".mk; #Switch to Sony TimeKeep fi; @@ -802,6 +793,7 @@ export -f deblobVendorBp; # find build -name "*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'awk -i inplace "!/$makes/" "{}"'; #Deblob all makefiles find device -maxdepth 2 -mindepth 2 -type d -exec bash -c 'deblobDevice "$0"' {} \;; #Deblob all device directories +find device -name "*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'awk -i inplace "!/$makes/" "{}"'; #Deblob all makefiles #find device -maxdepth 3 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobSepolicy "{}"'; #Deblob all device sepolicy directories XXX: Breaks builds when other sepolicy files reference deleted ones #find kernel -maxdepth 2 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobKernel "{}"'; #Deblob all kernel directories find vendor -name "*endor*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobVendorMk "{}"'; #Deblob all makefiles diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index 6396851f..10015859 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -73,6 +73,7 @@ commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463 commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127"; commentPatches android_kernel_samsung_universal8890.sh "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166"; commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749"; +commentPatches android_kernel_xiaomi_sm8250.sh "0008-Graphene-Kernel_Hardening/4.19/0101.patch" "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600"; commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166"; commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima"; commentPatches android_kernel_zte_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-13162" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166"; diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index 14d50e95..606c4563 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -647,7 +647,7 @@ getDefconfig() { elif ls arch/arm64/configs/lineage*defconfig 1> /dev/null 2>&1; then local defconfigPath="arch/arm64/configs/lineage*defconfig"; else - local defconfigPath="arch/arm/configs/*defconfig arch/arm64/configs/*defconfig"; + local defconfigPath="arch/arm*/configs/*defconfig arch/arm*/configs/*/*defconfig"; fi; echo $defconfigPath; } diff --git a/Scripts/Generate_Signing_Keys.sh b/Scripts/Generate_Signing_Keys.sh index 07c57021..c3f546c9 100644 --- a/Scripts/Generate_Signing_Keys.sh +++ b/Scripts/Generate_Signing_Keys.sh @@ -19,7 +19,7 @@ type='rsa'; #Options: rsa, ec -#source build/envsetup.sh && breakfast lineage_sailfish-user && make -j20 generate_verity_key; +#source build/envsetup.sh && breakfast lineage_sailfish-user && make -j20 generate_verity_key otatools; #source ../../Scripts/Generate_Signing_Keys.sh $device; cd "$DOS_SIGNING_KEYS/NEW"; diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh deleted file mode 100644 index c311777a..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ /dev/null @@ -1,327 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14615/^4.17.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11135/4.9/0061.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14029/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19037/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19807/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3680/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11262/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24587/qca-wifi-host-cmn/0016.patch --directory=drivers/staging/qca-wifi-host-cmn -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -editKernelLocalversion "-dos.p323" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh index 44600794..8abf0216 100644 --- a/Scripts/LineageOS-16.0/Functions.sh +++ b/Scripts/LineageOS-16.0/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2018-04-27 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_xiaomi_sdm845"; + startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead"; } export -f patchAllKernels; @@ -62,8 +62,6 @@ buildAll() { buildDevice kipper; #SD625 buildDevice zenfone3; #broken - ninja: error: 'android.hidl.base@1.0.so', missing and no known rule to make it - #SD845 - buildDevice beryllium; #Intel buildDevice fugu; #broken - ninja: error: 'libpcre2.so' missing and no known rule to make it #Tegra diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh new file mode 100644 index 00000000..0974e539 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh @@ -0,0 +1,236 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/xiaomi/sm8150" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0181-0182.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0201-0202.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0205-0206.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0061.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0074.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0080.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0083.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0085.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0086.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0087.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0088.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0089.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10781/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24587/qca-wifi-host-cmn/0015.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.14/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25704/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/qca-wifi-host-cmn/0016.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qca-wifi-host-cmn/0009.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26146/qca-wifi-host-cmn/0003.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27777/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0606/4.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1904/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1904/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1915/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1927/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1940/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1943/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1964/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch +editKernelLocalversion "-dos.p232" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh new file mode 100644 index 00000000..fff0dc83 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -0,0 +1,272 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/xiaomi/sm8250" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0137-0138.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0144-0145.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0151-0152.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0156-0157.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0168-0169.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0091.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0092.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0093.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0094.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0095.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0096.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0097.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0098.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0099.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0100.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0101.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0102.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0103.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0104.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0105.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0106.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0108.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0109.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0110.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0111.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0112.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0113.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0115.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0116.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0117.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0118.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0119.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18814/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18885/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19036/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19067/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19072/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19082/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19768/4.19/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19768/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19770/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.19/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.19/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.19/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.19/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.19/0020.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.19/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10781/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11669/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11884/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12655/^5.6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12659/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12768/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14385/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24587/qca-wifi-host-cmn/0015.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25704/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/qca-wifi-host-cmn/0016.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qca-wifi-host-cmn/0009.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26146/qca-wifi-host-cmn/0003.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27777/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36311/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0342/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1915/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1927/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1943/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1964/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/^5.8/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.18-^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.19/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3600/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14-^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29264/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch +editKernelLocalversion "-dos.p268" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index 49c44949..a7ae3573 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2021-03-22 patchAllKernels() { - startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845"; + startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250"; } export -f patchAllKernels; @@ -91,7 +91,7 @@ buildAll() { buildDevice walleye avb; #SD845 buildDevice aura avb; - buildDevice beryllium; #needs manual patching in vendor + buildDevice beryllium avb; buildDevice pro1 avb; buildDevice crosshatch avb; buildDevice blueline avb; @@ -105,6 +105,11 @@ buildAll() { buildDevice hotdogb avb; buildDevice coral avb; buildDevice flame avb; + #buildDevice raphael avb; #unb + missing vendor + #SD865 + buildDevice lmi avb; + #SD870 + buildDevice alioth avb; #SD670 buildDevice bonito avb; #error: ln: cannot create symbolic link from '/data/vendor/rfs/mpss' to 'out/target/product/bonito/vendor/rfs/msm/mpss//readwrite': buildDevice sargo avb; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index c72e9c02..13497681 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -148,6 +148,14 @@ if enterAndClear "hardware/qcom-caf/sdm845/audio"; then patch -p1 < "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-sdm845.patch"; #audio_extn: Fix unused parameter warning in utils.c fi; +if enterAndClear "hardware/qcom-caf/sdm8150/audio"; then +patch -p1 < "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-sm8150.patch"; #audio_extn: Fix unused parameter warning in utils.c +fi; + +if enterAndClear "hardware/qcom-caf/sdm8250/audio"; then +patch -p1 < "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-sm8150.patch"; #audio_extn: Fix unused parameter warning in utils.c +fi; + if enterAndClear "lineage-sdk"; then awk -i inplace '!/LineageWeatherManagerService/' lineage/res/res/values/config.xml; #Disable Weather if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/LineageAudioService/' lineage/res/res/values/config.xml; fi; #Remove AudioFX @@ -297,6 +305,10 @@ if enterAndClear "device/google/crosshatch"; then enableVerity; #Resurrect dm-verity fi; +if enterAndClear "device/google/taimen"; then +enableVerity; #Resurrect dm-verity +fi; + if enterAndClear "device/google/wahoo"; then enableVerity; #Resurrect dm-verity fi; @@ -340,6 +352,10 @@ if enterAndClear "device/oneplus/msm8998-common"; then awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation fi; +if enterAndClear "device/oneplus/sdm845-common"; then +enableVerity; #Resurrect dm-verity +fi; + if enterAndClear "device/oneplus/sm8150-common"; then enableVerity; #Resurrect dm-verity fi; @@ -366,6 +382,18 @@ echo "TARGET_RECOVERY_DENSITY := hdpi" >> BoardConfigCommon.mk; echo "allow hal_gnss_default ssr_device:chr_file { open read };" >> sepolicy/common/hal_gnss_default.te; fi; +if enterAndClear "device/xiaomi/sdm845-common"; then +enableVerity; #Resurrect dm-verity +fi; + +if enterAndClear "device/xiaomi/sm8150-common"; then +enableVerity; #Resurrect dm-verity +fi; + +if enterAndClear "device/xiaomi/sm8250-common"; then +enableVerity; #Resurrect dm-verity +fi; + if enterAndClear "kernel/google/wahoo"; then sed -i 's/asm(SET_PSTATE_UAO(1));/asm(SET_PSTATE_UAO(1)); return 0;/' arch/arm64/mm/fault.c; #fix build with CONFIG_ARM64_UAO fi;