diff --git a/Manifests/Manifest_LAOS-14.1.xml b/Manifests/Manifest_LAOS-14.1.xml index 62828b8c..9dd72cc2 100644 --- a/Manifests/Manifest_LAOS-14.1.xml +++ b/Manifests/Manifest_LAOS-14.1.xml @@ -78,11 +78,6 @@ - - - - - diff --git a/Patches/Linux b/Patches/Linux index 7618c9fc..880f21d6 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit 7618c9fc271a9e9c50cb22db74c8d100b1cf423c +Subproject commit 880f21d611c3b68a62712a84a61838907160a99d diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh deleted file mode 100644 index eb19d33c..00000000 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ /dev/null @@ -1,263 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/asus/msm8916" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11918/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/^5.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p259" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh index 00c90c41..e04e42e7 100644 --- a/Scripts/LineageOS-14.1/Functions.sh +++ b/Scripts/LineageOS-14.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2018-04-27 patchAllKernels() { - startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_asus_msm8916 kernel_htc_msm8960 kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890"; + startPatcher "kernel_amazon_hdx-common kernel_asus_grouper kernel_htc_msm8960 kernel_htc_msm8994 kernel_lge_msm8992 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_samsung_exynos5420 kernel_samsung_manta kernel_samsung_smdk4412 kernel_samsung_tuna kernel_samsung_universal8890"; } export -f patchAllKernels; @@ -71,8 +71,6 @@ buildAll() { buildDevice osprey; #SD810 buildDevice himaul; - #SD615 - buildDevice Z00T; #Exynos buildDevice manta; buildDevice n7100; #broken sepolicy diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 638b5e1b..53e05f38 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -259,7 +259,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch @@ -309,5 +308,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch -editKernelLocalversion "-dos.p309" +editKernelLocalversion "-dos.p308" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh index de328b85..206291c9 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -189,7 +189,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch @@ -239,5 +238,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch -editKernelLocalversion "-dos.p239" +editKernelLocalversion "-dos.p238" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh index 66af9369..ea602b18 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -232,7 +232,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch @@ -282,5 +281,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch -editKernelLocalversion "-dos.p282" +editKernelLocalversion "-dos.p281" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 2a6b534d..3867dc83 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -266,7 +266,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0342/4.19/0002.patch @@ -322,5 +321,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.19/0003.patch -editKernelLocalversion "-dos.p322" +editKernelLocalversion "-dos.p321" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh index f587bc9b..e80e5d25 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -340,7 +340,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch @@ -385,5 +384,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p385" +editKernelLocalversion "-dos.p384" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index baf5b85d..8325a724 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -205,7 +205,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch @@ -255,5 +254,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch -editKernelLocalversion "-dos.p255" +editKernelLocalversion "-dos.p254" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_zuk_msm8996.sh index 101d609e..2f38a34e 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -204,7 +204,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch @@ -254,5 +253,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch -editKernelLocalversion "-dos.p254" +editKernelLocalversion "-dos.p253" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/Functions.sh b/Scripts/LineageOS-17.1/Functions.sh index 5d0b203a..6e4b34db 100644 --- a/Scripts/LineageOS-17.1/Functions.sh +++ b/Scripts/LineageOS-17.1/Functions.sh @@ -81,7 +81,7 @@ buildAll() { buildDevice bonito avb; #18.1 not compiling buildDevice sargo avb; #Intel - buildDevice fugu; + buildDevice fugu; #broken #Tegra buildDevice yellowstone; #broken } diff --git a/Scripts/LineageOS-17.1/Patch.sh b/Scripts/LineageOS-17.1/Patch.sh index 361cd0c1..80205d93 100644 --- a/Scripts/LineageOS-17.1/Patch.sh +++ b/Scripts/LineageOS-17.1/Patch.sh @@ -69,6 +69,9 @@ enterAndClear "device/qcom/sepolicy-legacy"; patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH echo "SELINUX_IGNORE_NEVERALLOWS := true" >> sepolicy.mk; #necessary for -user builds of legacy devices +enterAndClear "external/chromium-libpac"; +git pull "https://github.com/LineageOS/android_external_chromium-libpac" refs/changes/04/312104/1; #Q_asb_2021-06 + enterAndClear "external/chromium-webview"; git pull "https://github.com/LineageOS/android_external_chromium-webview" refs/changes/11/310811/3; #update webview @@ -247,7 +250,8 @@ enterAndClear "device/lge/mako"; echo "pmf=0" >> wifi/wpa_supplicant_overlay.conf; #Wi-Fi chipset doesn't support PMF awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools -#enterAndClear "device/motorola/clark"; +enterAndClear "device/motorola/clark"; +echo "recovery_only(' allow firmware_file labeledfs:filesystem associate; ')" >> sepolicy/recovery.te; #304224: Allow recovery to unzip and chmod modem firmware #echo "TARGET_RECOVERY_PERMISSIVE_OVERRIDE := true" >> BoardConfig.mk; #Allow extract_firmware.sh to function enterAndClear "device/oneplus/avicii"; diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh index 07b88d43..1efe7ac0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh @@ -157,7 +157,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch @@ -203,5 +202,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch -editKernelLocalversion "-dos.p203" +editKernelLocalversion "-dos.p202" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh index 556004db..82eb0bca 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -155,7 +155,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch @@ -206,5 +205,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch -editKernelLocalversion "-dos.p206" +editKernelLocalversion "-dos.p205" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 45db9359..02e706fa 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -133,7 +133,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36386/^5.7/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.14/0003.patch @@ -182,5 +181,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.14/0002.patch -editKernelLocalversion "-dos.p182" +editKernelLocalversion "-dos.p181" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index ebf12220..eb4a1d81 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -54,7 +54,7 @@ buildAll() { if [ "$DOS_OPTIMIZE_IMAGES" = true ]; then optimizeImagesRecursive "$DOS_BUILD_BASE"; fi; #SDS4P buildDevice flox; - buildDevice mako; + buildDevice mako; #broken radio #SD600 buildDevice jfltexx; #SD800