diff --git a/Patches/LineageOS-20.0/android_hardware_qcom_audio/0001-Unused-sm8150.patch b/Patches/LineageOS-20.0/android_hardware_qcom_audio/0001-Unused-sm8150.patch index 802b9132..6a298598 100644 --- a/Patches/LineageOS-20.0/android_hardware_qcom_audio/0001-Unused-sm8150.patch +++ b/Patches/LineageOS-20.0/android_hardware_qcom_audio/0001-Unused-sm8150.patch @@ -21,10 +21,10 @@ Change-Id: I694c683c9bfde60343f0f6ea8d806bc5e24437e6 2 files changed, 6 insertions(+) diff --git a/hal/audio_extn/audio_extn.h b/hal/audio_extn/audio_extn.h -index f35a9d60b0..b8abfd04a4 100644 +index 256382c07f..a4898cf860 100644 --- a/hal/audio_extn/audio_extn.h +++ b/hal/audio_extn/audio_extn.h -@@ -868,7 +868,11 @@ bool audio_extn_utils_is_dolby_format(audio_format_t format); +@@ -873,7 +873,11 @@ bool audio_extn_utils_is_dolby_format(audio_format_t format); int audio_extn_utils_get_bit_width_from_string(const char *); int audio_extn_utils_get_sample_rate_from_string(const char *); int audio_extn_utils_get_channels_from_string(const char *); @@ -37,10 +37,10 @@ index f35a9d60b0..b8abfd04a4 100644 int audio_extn_utils_get_vendor_enhanced_info(); int audio_extn_utils_get_app_sample_rate_for_device(struct audio_device *adev, diff --git a/hal/audio_extn/utils.c b/hal/audio_extn/utils.c -index 174e43fa96..9b72e31a2c 100644 +index 23ecf7a590..6ddfcaced7 100644 --- a/hal/audio_extn/utils.c +++ b/hal/audio_extn/utils.c -@@ -3312,6 +3312,7 @@ int audio_extn_utils_get_channels_from_string(const char *id_string) +@@ -3314,6 +3314,7 @@ int audio_extn_utils_get_channels_from_string(const char *id_string) return -EINVAL; } @@ -48,7 +48,7 @@ index 174e43fa96..9b72e31a2c 100644 void audio_extn_utils_release_snd_device(snd_device_t snd_device) { audio_extn_dev_arbi_release(snd_device); -@@ -3320,6 +3321,7 @@ void audio_extn_utils_release_snd_device(snd_device_t snd_device) +@@ -3322,6 +3323,7 @@ void audio_extn_utils_release_snd_device(snd_device_t snd_device) audio_extn_listen_update_device_status(snd_device, LISTEN_EVENT_SND_DEVICE_FREE); } diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh index 364799e1..8f058ec2 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -22,7 +22,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.pa git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch @@ -75,20 +74,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2007/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch -editKernelLocalversion "-dos.p88" +editKernelLocalversion "-dos.p76" else echo "kernel_fairphone_sm7225 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh index aef18e00..4de28925 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -47,10 +47,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch @@ -173,7 +169,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p173" +editKernelLocalversion "-dos.p169" else echo "kernel_fxtec_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh index 6268c290..8ac931d5 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh @@ -22,7 +22,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.pa git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch @@ -75,20 +74,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2007/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch -editKernelLocalversion "-dos.p88" +editKernelLocalversion "-dos.p76" else echo "kernel_fxtec_sm6115 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh index f6e73128..0850f161 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh @@ -20,7 +20,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.pa git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch @@ -73,20 +72,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2007/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch -editKernelLocalversion "-dos.p86" +editKernelLocalversion "-dos.p74" else echo "kernel_oneplus_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh index ee6ce371..967e96f7 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh @@ -1,6 +1,5 @@ #!/bin/bash if cd "$DOS_BUILD_BASE""kernel/oneplus/sm8350"; then -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/5.4/5.4.0247-0248.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/ANY/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/5.4/0001.patch @@ -30,12 +29,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39189/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/5.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/5.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/5.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/5.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3338/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/5.4/0005.patch @@ -44,7 +41,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/5.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.4/0005.patch -editKernelLocalversion "-dos.p44" +editKernelLocalversion "-dos.p41" else echo "kernel_oneplus_sm8350 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE"