From 0c3c89ffc4a45d7ae2a3aac9866c98773b9ccd34 Mon Sep 17 00:00:00 2001 From: Tad Date: Tue, 13 Apr 2021 13:29:45 -0400 Subject: [PATCH] 17.1: drop support for all devices compiling on 18.1 --- Manifests/Manifest_LAOS-17.1.xml | 53 +- .../android_kernel_fxtec_msm8998.sh | 54 --- .../android_kernel_google_coral.sh | 219 --------- .../android_kernel_google_wahoo.sh | 221 --------- .../android_kernel_lge_msm8974.sh | 216 --------- .../android_kernel_lge_msm8996.sh | 455 ------------------ .../android_kernel_motorola_msm8974.sh | 270 ----------- .../android_kernel_nextbit_msm8992.sh | 260 ---------- .../android_kernel_razer_msm8998.sh | 107 ---- .../CVE_Patchers/android_kernel_samsung_jf.sh | 268 ----------- Scripts/LineageOS-17.1/Functions.sh | 21 +- Scripts/LineageOS-17.1/Patch.sh | 22 - 12 files changed, 3 insertions(+), 2163 deletions(-) delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_coral.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_wahoo.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8974.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8996.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8974.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_razer_msm8998.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_jf.sh diff --git a/Manifests/Manifest_LAOS-17.1.xml b/Manifests/Manifest_LAOS-17.1.xml index a7344f62..e3c80c0f 100644 --- a/Manifests/Manifest_LAOS-17.1.xml +++ b/Manifests/Manifest_LAOS-17.1.xml @@ -87,10 +87,6 @@ - - - - @@ -101,13 +97,6 @@ - - - - - - - @@ -118,51 +107,24 @@ - - - - - - - - - - + - - - - - - - - - - - - - - - - - - @@ -171,10 +133,6 @@ - - - - @@ -213,19 +171,10 @@ - - - - - - - - - diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh deleted file mode 100644 index c5ce3436..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ /dev/null @@ -1,54 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fxtec/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0264-0265.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0265-0266.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -editKernelLocalversion "-dos.p50" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_coral.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_coral.sh deleted file mode 100644 index 42f39348..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_coral.sh +++ /dev/null @@ -1,219 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/coral" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0205-0206.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0076.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0080.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0082.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20669/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10585/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10621/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14034/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14122/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.14/0015.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3694/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10781/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11150/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11669/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12657/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27777/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28941/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p215" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_wahoo.sh deleted file mode 100644 index 99a034d2..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_wahoo.sh +++ /dev/null @@ -1,221 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/wahoo" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0244-0245.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11065/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14886/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18061/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5902/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5906/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0025.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p217" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8974.sh deleted file mode 100644 index 81c39eca..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ /dev/null @@ -1,216 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3224/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p212" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8996.sh deleted file mode 100644 index 8f32f9ff..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ /dev/null @@ -1,455 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/lge/msm8996" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0115-0116.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.18/0002-Alt2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/^4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10810/^4.11.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/^4.11.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5832/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/^4.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2000/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/^5.0.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -editKernelLocalversion "-dos.p451" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8974.sh deleted file mode 100644 index 390b9cc2..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ /dev/null @@ -1,270 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/motorola/msm8974" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-0349/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5347/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.4/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10661/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/^4.13.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p266" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh deleted file mode 100644 index 201164b3..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ /dev/null @@ -1,260 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/^3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/^3.18.2/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/^4.2.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/^4.14.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18153/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/^4.14.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/^4.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/^4.17.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/^4.18.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/^4.18.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/^4.20/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10639/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/^5.0.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/^5.2.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/^5.2.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/^5.1.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/^5.3.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/^5.2.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/^5.3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/^5.2.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/^5.4.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/^5.1.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/^5.5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/^5.6.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p256" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_razer_msm8998.sh deleted file mode 100644 index 92de066e..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_razer_msm8998.sh +++ /dev/null @@ -1,107 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/razer/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0249-0250.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0252-0253.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch -editKernelLocalversion "-dos.p103" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_jf.sh deleted file mode 100644 index d1c957c6..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ /dev/null @@ -1,268 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/samsung/jf" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4737/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9410/ANY/msm.git-43b4ff3bf3fbb02e85defcea939629f46506a217.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0568/ANY/msm.git-8de3fe39e7c40190f82832253ed5946714e5bff1.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8816/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/^4.11.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/^4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch -editKernelLocalversion "-dos.p264" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/Functions.sh b/Scripts/LineageOS-17.1/Functions.sh index dd839566..4cf5bdaf 100644 --- a/Scripts/LineageOS-17.1/Functions.sh +++ b/Scripts/LineageOS-17.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2020-04-14 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_cyanogen_msm8916 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_marlin kernel_google_msm-4.9 kernel_google_wahoo kernel_google_yellowstone kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_motorola_msm8916 kernel_motorola_msm8974 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8994 kernel_oneplus_msm8996 kernel_oneplus_sdm845 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_razer_msm8998 kernel_samsung_jf kernel_xiaomi_sdm845 kernel_yandex_sdm660 kernel_zuk_msm8996"; + startPatcher "kernel_asus_fugu kernel_cyanogen_msm8916 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_google_marlin kernel_google_msm-4.9 kernel_google_yellowstone kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_oneplus_msm8996 kernel_oneplus_sdm845 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_xiaomi_sdm845 kernel_yandex_sdm660 kernel_zuk_msm8996"; } export -f patchAllKernels; @@ -57,26 +57,16 @@ buildAll() { #SD410 buildDevice crackling; #buildDevice osprey; #needs manual patching + more - mkdir proprietary/priv-app && cp -r proprietary/system/priv-app/qcrilmsgtunnel proprietary/priv-app/ - #SD600 - buildDevice jfltexx; - #SD800 - buildDevice d802; #SD801 buildDevice d852; buildDevice d855; buildDevice FP2; buildDevice m8; - buildDevice victara; #error: +out/target/product/victara/recovery.img too large (10522624 >= 10485760) #SD808 buildDevice clark; - buildDevice ether; #SD810 buildDevice oneplus2; #SD820 - buildDevice h850; - buildDevice rs988; - buildDevice h990; - buildDevice us996; buildDevice griffin; buildDevice oneplus3 verity; buildDevice z2_plus verity; @@ -85,22 +75,15 @@ buildAll() { buildDevice sailfish verity; #SD632 buildDevice FP3 avb; - #SD835 - buildDevice cheryl verity; - buildDevice taimen avb; - buildDevice walleye avb; #SD845 buildDevice beryllium; #needs manual patching in vendor buildDevice crosshatch avb; buildDevice blueline avb; buildDevice enchilada avb; buildDevice fajita avb; - buildDevice pro1 avb; #SD855 buildDevice guacamole avb; buildDevice guacamoleb avb; - buildDevice coral avb; - buildDevice flame avb; #SD660 buildDevice Amber verity; #SD765 @@ -109,7 +92,7 @@ buildAll() { buildDevice bonito avb; buildDevice sargo avb; #Intel - buildDevice fugu; + buildDevice fugu; #broken #Tegra buildDevice yellowstone; #broken } diff --git a/Scripts/LineageOS-17.1/Patch.sh b/Scripts/LineageOS-17.1/Patch.sh index 18ab136c..faf942a7 100644 --- a/Scripts/LineageOS-17.1/Patch.sh +++ b/Scripts/LineageOS-17.1/Patch.sh @@ -234,32 +234,19 @@ awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken enterAndClear "device/fairphone/FP3"; enableVerity; #Resurrect dm-verity -enterAndClear "device/fxtec/pro1"; -enableVerity; #Resurrect dm-verity - enterAndClear "device/google/bonito"; enableVerity; #Resurrect dm-verity awk -i inplace '!/INODE_COUNT/' BoardConfig-lineage.mk; #mke2fs -1 incompatibility (?) -enterAndClear "device/google/coral"; -enableVerity; #Resurrect dm-verity - enterAndClear "device/google/crosshatch"; enableVerity; #Resurrect dm-verity enterAndClear "device/google/marlin"; git revert --no-edit 777dafa35f185b1f501e3c80b8ab495191583444; #remove some carrier blobs -enterAndClear "device/google/wahoo"; -enableVerity; #Resurrect dm-verity - enterAndClear "device/htc/m8-common"; awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken releasetools -enterAndClear "device/lge/g2-common"; -sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; -awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken releasetools - enterAndClear "device/lge/g3-common"; echo "vendor/lib/hw/nfc_nci.msm8974.so|7dcb79a385dd1155cb9b6310a3e7b85b7dc8db13" >> proprietary-files.txt; #g3-common: Add NFC HAL to proprietary-files (254249) sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; @@ -275,10 +262,6 @@ enterAndClear "device/lge/mako"; echo "pmf=0" >> wifi/wpa_supplicant_overlay.conf; #Wi-Fi chipset doesn't support PMF awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools -enterAndClear "device/lge/msm8996-common"; -sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; -awk -i inplace '!/WfdCommon/' msm8996.mk; #fix breakage - #enterAndClear "device/motorola/clark"; #echo "TARGET_RECOVERY_PERMISSIVE_OVERRIDE := true" >> BoardConfig.mk; #Allow extract_firmware.sh to function @@ -300,9 +283,6 @@ awk -i inplace '!/WfdCommon/' msm8996.mk; #fix breakage enterAndClear "kernel/google/marlin"; git revert --no-edit dd4a454f080f60cc7c4f5cc281a48cba80947baf; #Resurrect dm-verity -enterAndClear "kernel/google/wahoo"; -sed -i 's/asm(SET_PSTATE_UAO(1));/asm(SET_PSTATE_UAO(1)); return 0;/' arch/arm64/mm/fault.c; #fix build with CONFIG_ARM64_UAO - #Make changes to all devices cd "$DOS_BUILD_BASE"; if [ "$DOS_LOWRAM_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'enableLowRam "{}"'; fi; @@ -322,8 +302,6 @@ removeBuildFingerprints; #Fix broken options enabled by hardenDefconfig() sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/yellowstone/arch/arm*/configs/*_defconfig; #Breaks on compile sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/lge/mako/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile -sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/lge/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile -sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/motorola/msm8974/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/motorola/msm8996/arch/arm64/configs/*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/oneplus/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile