From 4b6a86a4730e299a252112cc42e6398131769a06 Mon Sep 17 00:00:00 2001 From: Tad Date: Thu, 14 Apr 2022 11:42:26 -0400 Subject: [PATCH] Add missing device variants Signed-off-by: Tad --- Manifests/Manifest_LAOS-14.1.xml | 26 +- Manifests/Manifest_LAOS-15.1.xml | 6 +- Manifests/Manifest_LAOS-18.1.xml | 24 +- Scripts/Common/Enable_Verity.sh | 1 + Scripts/Common/Fix_CVE_Patchers.sh | 3 +- Scripts/Common/Functions.sh | 2 +- .../CVE_Patchers/android_kernel_samsung_d2.sh | 521 ++++++++++++++++++ Scripts/LineageOS-14.1/Functions.sh | 12 +- Scripts/LineageOS-14.1/Patch.sh | 9 +- Scripts/LineageOS-15.1/Functions.sh | 2 + Scripts/LineageOS-15.1/Patch.sh | 6 + Scripts/LineageOS-18.1/Functions.sh | 24 +- Scripts/LineageOS-18.1/Patch.sh | 19 + 13 files changed, 635 insertions(+), 20 deletions(-) create mode 100644 Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh diff --git a/Manifests/Manifest_LAOS-14.1.xml b/Manifests/Manifest_LAOS-14.1.xml index 6c820bc3..c9ffe18a 100644 --- a/Manifests/Manifest_LAOS-14.1.xml +++ b/Manifests/Manifest_LAOS-14.1.xml @@ -95,13 +95,15 @@ - + + - + + @@ -126,7 +128,7 @@ - + @@ -137,9 +139,11 @@ - + + + @@ -151,12 +155,22 @@ - + - + + + + + + + + + + + diff --git a/Manifests/Manifest_LAOS-15.1.xml b/Manifests/Manifest_LAOS-15.1.xml index bd68ee18..2dedd116 100644 --- a/Manifests/Manifest_LAOS-15.1.xml +++ b/Manifests/Manifest_LAOS-15.1.xml @@ -115,8 +115,9 @@ - + + @@ -127,8 +128,9 @@ - + + diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index 29071631..fc6f1bfb 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -143,26 +143,36 @@ - + + - + + + + - + + + + + + + @@ -173,6 +183,9 @@ + + + @@ -246,8 +259,11 @@ - + + + + diff --git a/Scripts/Common/Enable_Verity.sh b/Scripts/Common/Enable_Verity.sh index f6499e3d..44eaff4e 100644 --- a/Scripts/Common/Enable_Verity.sh +++ b/Scripts/Common/Enable_Verity.sh @@ -73,6 +73,7 @@ enableVerity "device/essential/mata"; enableVerity "device/google/marlin"; enableVerity "device/google/sailfish"; #enableVerity "device/htc/flounder"; #XXX: no boot +#enableVerity "device/htc/flounder_lte"; enableVerity "device/huawei/angler"; enableVerity "device/lge/bullhead"; enableVerity "device/moto/shamu"; diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index 18653e10..f3520e25 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -78,6 +78,7 @@ commentPatches android_kernel_oneplus_sm7250.sh "CVE-2018-5873" "CVE-2020-1749" commentPatches android_kernel_oneplus_sm8150.sh "CVE-2019-16746" "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-8992" "CVE-2020-24588/4.14/0018.patch" "CVE-2021-30324" "CVE-2021-45469"; commentPatches android_kernel_razer_msm8998.sh "0008-Graphene-Kernel_Hardening/4.4/0011.patch" "0008-Graphene-Kernel_Hardening/4.4/0012.patch" "0008-Graphene-Kernel_Hardening/4.4/0014.patch" "0008-Graphene-Kernel_Hardening/4.4/0019.patch" "CVE-2019-14070/ANY/0005.patch" "CVE-2020-16166"; commentPatches android_kernel_samsung_apq8084.sh "0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch"; +commentPatches android_kernel_samsung_d2.sh "CVE-2021-Misc2/3.4/0055.patch" "CVE-2021-Misc2/3.4/0056.patch"; commentPatches android_kernel_samsung_exynos5420.sh "CVE-2021-Misc2/3.4/0061.patch" "CVE-2021-Misc2/3.4/0062.patch"; commentPatches android_kernel_samsung_jf.sh "CVE-2019-11599"; commentPatches android_kernel_samsung_manta.sh "CVE-2021-Misc2/3.4/0055.patch" "CVE-2021-Misc2/3.4/0056.patch"; @@ -105,7 +106,7 @@ do commentPatches $script "CVE-2017-15868/3.4" "CVE-2018-10877/3.4"; done #3.4 -declare -a threeDotFour=("${threeDotZero[@]}" "android_kernel_amazon_hdx-common.sh" "android_kernel_asus_grouper.sh" "android_kernel_htc_msm8960.sh" "android_kernel_samsung_exynos5420.sh" "android_kernel_samsung_manta.sh" "android_kernel_google_msm.sh" "android_kernel_lge_hammerhead.sh" "android_kernel_cyanogen_msm8974.sh" "android_kernel_htc_msm8974.sh" "android_kernel_fairphone_msm8974.sh" "android_kernel_lge_g3.sh" "android_kernel_lge_mako.sh" "android_kernel_lge_msm8974.sh" "android_kernel_motorola_msm8974.sh" "android_kernel_oppo_msm8974.sh" "android_kernel_samsung_jf.sh" "android_kernel_samsung_msm8930-common.sh" "android_kernel_samsung_msm8974.sh"); +declare -a threeDotFour=("${threeDotZero[@]}" "android_kernel_amazon_hdx-common.sh" "android_kernel_asus_grouper.sh" "android_kernel_htc_msm8960.sh" "android_kernel_samsung_exynos5420.sh" "android_kernel_samsung_manta.sh" "android_kernel_google_msm.sh" "android_kernel_lge_hammerhead.sh" "android_kernel_cyanogen_msm8974.sh" "android_kernel_htc_msm8974.sh" "android_kernel_fairphone_msm8974.sh" "android_kernel_lge_g3.sh" "android_kernel_lge_mako.sh" "android_kernel_lge_msm8974.sh" "android_kernel_motorola_msm8974.sh" "android_kernel_oppo_msm8974.sh" "android_kernel_samsung_d2.sh" "android_kernel_samsung_jf.sh" "android_kernel_samsung_msm8930-common.sh" "android_kernel_samsung_msm8974.sh"); for script in "${threeDotFour[@]}" do commentPatches $script "0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch" "CVE-2017-5551/3.10" "CVE-2017-7187/3.18" "CVE-2017-18193/3.18" "CVE-2020-14305/4.4"; diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index a118b41f..c519f27d 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -746,7 +746,7 @@ getDefconfig() { else #grep TARGET_KERNEL_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u #grep TARGET_KERNEL_VARIANT_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_VARIANT_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u - local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig "; + local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-hero2lte_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_att_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/jf_spr_defconfig arch/arm*/configs/jf_vzw_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/m8dug_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig"; fi; echo $defconfigPath; } diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh new file mode 100644 index 00000000..da5a20b2 --- /dev/null +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh @@ -0,0 +1,521 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/samsung/d2" +git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch +#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch +#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9410/ANY/msm.git-43b4ff3bf3fbb02e85defcea939629f46506a217.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0568/ANY/msm.git-8de3fe39e7c40190f82832253ed5946714e5bff1.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8816/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9004/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2471/prima/0001.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3809/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3841/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5346/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5696/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6786/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6791/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7916/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8399/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8463/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9754/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9806/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10044/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10229/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0568/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0568/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0571/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0633/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2636/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7889/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8263/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9076/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9714/prima/0003.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13078/prima/0001.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.4/0076.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15819/prima/0002.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5835/prima/0001.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0026.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0028.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0029.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0030.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0046.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch +git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch +editKernelLocalversion "-dos.p517" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh index ff8f395b..696b053e 100644 --- a/Scripts/LineageOS-14.1/Functions.sh +++ b/Scripts/LineageOS-14.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_htc_msm8960 kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8992 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890"; + startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_htc_msm8960 kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8992 kernel_samsung_d2 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890"; } export -f patchAllKernels; @@ -64,6 +64,11 @@ buildAll() { cd "$DOS_BUILD_BASE"; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; #Select devices are userdebug due to SELinux policy issues + #SDS4P + buildDeviceUserDebug d2att; + buildDeviceUserDebug d2spr; + buildDeviceUserDebug d2tmo; + buildDeviceUserDebug d2vzw; #SD600 buildDeviceUserDebug m7; #SD801 @@ -71,18 +76,23 @@ buildAll() { buildDeviceUserDebug apollo; #SD808 buildDevice clark; #Last version with working IMS + buildDevice h811; buildDevice h815; #SD810 buildDevice himaul; + buildDevice himawl; #Exynos buildDevice manta; #buildDevice n7100; #broken sepolicy buildDeviceUserDebug i9100; buildDeviceUserDebug i9300; buildDeviceUserDebug i9305; + buildDevice n5100; buildDevice n5110; + buildDevice n5120; buildDevice v1awifi; buildDevice herolte; + buildDevice hero2lte; #OMAP buildDevice maguro; buildDevice toro; diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index 2558a518..0533c096 100644 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -411,13 +411,20 @@ enableLowRam "device/asus/grouper"; enableLowRam "device/samsung/galaxys2-common"; enableLowRam "device/samsung/i9100"; enableLowRam "device/samsung/i9300"; -enableLowRam "device/samsung/i9305"; enableLowRam "device/samsung/maguro"; enableLowRam "device/samsung/manta"; enableLowRam "device/samsung/smdk4412-common"; enableLowRam "device/samsung/toro"; enableLowRam "device/samsung/toroplus"; enableLowRam "device/samsung/tuna"; +#Tweaks for <3GB RAM devices +#enableLowRam "device/samsung/d2att"; +#enableLowRam "device/samsung/d2-common"; +#enableLowRam "device/samsung/d2spr"; +#enableLowRam "device/samsung/d2tmo"; +#enableLowRam "device/samsung/d2vzw"; +#enableLowRam "device/samsung/i9305"; +#enableLowRam "device/samsung/msm8960-common"; #Fixes #Fix broken options enabled by hardenDefconfig() diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh index 926c32be..bf0f99c4 100644 --- a/Scripts/LineageOS-15.1/Functions.sh +++ b/Scripts/LineageOS-15.1/Functions.sh @@ -55,6 +55,7 @@ buildAll() { cd "$DOS_BUILD_BASE"; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; #SDS4P + buildDevice deb; buildDevice flo; #Last version without repartitioning required + 18.1 has random power off issue #SD801 buildDevice hammerhead; #Last version with working Bluetooth @@ -77,6 +78,7 @@ buildAll() { buildDevice fugu; #Tegra buildDevice flounder verity; + buildDevice flounder_lte verity; buildDevice dragon verity; } export -f buildAll; diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh index 889c7657..1b1666ee 100644 --- a/Scripts/LineageOS-15.1/Patch.sh +++ b/Scripts/LineageOS-15.1/Patch.sh @@ -289,6 +289,12 @@ fi; # #START OF DEVICE CHANGES # +if enterAndClear "device/asus/deb"; then +compressRamdisks; +sed -i 's|vendor/cm|vendor/lineage|' lineage.mk; +awk -i inplace '!/ioctl/' sepolicy/audioserver.te; #neverallow +fi; + if enterAndClear "device/asus/flo"; then compressRamdisks; echo "/dev/block/platform/msm_sdcc\.1/by-name/misc u:object_r:misc_block_device:s0" >> sepolicy/file_contexts; diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index 67c1bd6e..9654f8a9 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -61,27 +61,43 @@ buildAll() { buildDevice serrano3gxx; #unb buildDevice serranoltexx; #unb #SD600 - buildDevice jfltexx; + buildDevice jfltexx; #TODO: jactivelte, jfvelte + buildDevice jflteatt; + buildDevice jfltespr; + buildDevice jfltevzw; #SD800 + buildDevice d800; + buildDevice d801; buildDevice d802; + buildDevice d803; #SD801 buildDevice bacon; + buildDevice d850; + buildDevice d851; buildDevice d852; buildDevice d855; + buildDevice f400; + buildDevice ls990; + buildDevice vs985; buildDevice FP2; - buildDevice klte; + buildDevice klte; #TODO: klteaio, kltechn, kltechnduo, klteduos, kltedv, kltekdi, kltekor buildDevice m8; #unb18 + #buildDevice m8d; #unb18 #TODO buildDevice victara; #SD805 buildDevice shamu verity; #SD808 buildDevice ether; #SD820 + buildDevice h830; buildDevice h850; buildDevice rs988; buildDevice h910; + buildDevice h918; buildDevice h990; + buildDevice ls997; buildDevice us996; + buildDevice vs995; buildDevice oneplus3 verity; #needs manual patching - broken yyloc buildDevice z2_plus verity; #SD821 @@ -172,8 +188,8 @@ enableDexPreOpt() { if [ -f BoardConfig.mk ]; then echo "WITH_DEXPREOPT := true" >> BoardConfig.mk; echo "WITH_DEXPREOPT_DEBUG_INFO := false" >> BoardConfig.mk; - #m8, jfltexx: /system partition too small - if [ "$1" != "device/htc/m8" ] && [ "$1" != "device/samsung/jfltexx" ]; then + #m8*, jflte*: /system partition too small + if [ "$1" != "device/htc/m8" ] && [ "$1" != "device/htc/m8d" ] && [ "$1" != "device/samsung/jfltexx" ] && [ "$1" != "device/samsung/jflteatt" ] && [ "$1" != "device/samsung/jfltespr" ] && [ "$1" != "device/samsung/jfltevzw" ]; then echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk; echo "Enabled full dexpreopt for $1"; else diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index 57e6d277..60cbcc57 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -520,6 +520,18 @@ if enterAndClear "device/samsung/jfltexx"; then smallerSystem; fi; +if enterAndClear "device/samsung/jflteatt"; then +smallerSystem; +fi; + +if enterAndClear "device/samsung/jfltespr"; then +smallerSystem; +fi; + +if enterAndClear "device/samsung/jfltevzw"; then +smallerSystem; +fi; + if enterAndClear "device/samsung/msm8974-common"; then echo "TARGET_RECOVERY_DENSITY := hdpi" >> BoardConfigCommon.mk; echo "allow hal_gnss_default ssr_device:chr_file { open read };" >> sepolicy/common/hal_gnss_default.te; @@ -569,12 +581,19 @@ enableLowRam "device/asus/flox" "flox"; enableLowRam "device/fairphone/FP2" "FP2"; enableLowRam "device/htc/m8-common" "m8-common"; enableLowRam "device/htc/m8" "m8"; +enableLowRam "device/htc/m8d" "m8d"; enableLowRam "device/htc/msm8974-common" "msm8974-common"; +enableLowRam "device/lge/d800" "d800"; +enableLowRam "device/lge/d801" "d801"; enableLowRam "device/lge/d802" "d802"; +enableLowRam "device/lge/d803" "d803"; enableLowRam "device/lge/g2-common" "g2-common"; enableLowRam "device/lge/mako" "mako"; enableLowRam "device/motorola/victara" "victara"; enableLowRam "device/samsung/jf-common" "jf-common"; +enableLowRam "device/samsung/jflteatt" "jflteatt"; +enableLowRam "device/samsung/jfltespr" "jfltespr"; +enableLowRam "device/samsung/jfltevzw" "jfltevzw"; enableLowRam "device/samsung/jfltexx" "jfltexx"; enableLowRam "device/samsung/klte-common" "klte-common"; enableLowRam "device/samsung/klte" "klte";