21.0: More devices

- essential
- fxtec
- fairphone
- google
- oneplus

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-12-10 21:08:17 -05:00
parent 4d29cbe162
commit 7c666a10e4
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
20 changed files with 6916 additions and 30 deletions

View File

@ -9,13 +9,18 @@ build/blueprint cf7fdff39eeae23d21e41fcdeecbad5eecbee3c8
build/make 9531801b02c499820c129fb0ef501b1c76c34550 build/make 9531801b02c499820c129fb0ef501b1c76c34550
build/orchestrator 9ab639207fbfb50cf17c9f937869ea569a77b6bf build/orchestrator 9ab639207fbfb50cf17c9f937869ea569a77b6bf
build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c
build/release 137f00337a5152e7d7347e2e3329086d4020fdc3 build/release 4600ca29b927f01fed65aa934080b5565599d3fe
build/soong 7e2be266cfde19c5e0cbc8e4ed016d5572abd4fb build/soong 7e2be266cfde19c5e0cbc8e4ed016d5572abd4fb
cts f1da77ef4dd31b8e01e8583704596027eea02951 cts f1da77ef4dd31b8e01e8583704596027eea02951
dalvik 66005be703c8f4f2358016c0ff440ed6fc52e719 dalvik 66005be703c8f4f2358016c0ff440ed6fc52e719
developers/build 867763a9d64188addd7d9a6a4d730f8072411e76 developers/build 867763a9d64188addd7d9a6a4d730f8072411e76
development 46c27c9f02618f69bd15205adc5fb2e699d4bc76 development 46c27c9f02618f69bd15205adc5fb2e699d4bc76
device/common bb1fa9edb22f1c9bf28f07f3d23c20789e61c14c device/common bb1fa9edb22f1c9bf28f07f3d23c20789e61c14c
device/essential/mata a017021841eff170fbbf34438a6b9b9ca7b79aa3
device/fairphone/FP3 792f7c83c8735c98a99465129e029cf2b35aa07c
device/fairphone/FP4 1886b28c5b21a200135ed12c6f600c464eeaf501
device/fxtec/pro1 dbe436588661b56288c4ec03b7d8c4a0f63b9f23
device/fxtec/pro1x aedfac2a3a58b689a557529f37cbc90214b03703
device/generic/arm64 71380158d818de918338e34a9cb72316fe3cfa4e device/generic/arm64 71380158d818de918338e34a9cb72316fe3cfa4e
device/generic/armv7-a-neon 74640f99231132d45339f0d92a49728f421e9b81 device/generic/armv7-a-neon 74640f99231132d45339f0d92a49728f421e9b81
device/generic/art 75616d68269de67ef95b919e1b20a4c697d75552 device/generic/art 75616d68269de67ef95b919e1b20a4c697d75552
@ -33,15 +38,22 @@ device/generic/vulkan-cereal 6c322e407dfdf34a73949ad36883caf7c8be61ac
device/generic/x86 4394cdf90094161d5caf4f7237c883ab2862c2f2 device/generic/x86 4394cdf90094161d5caf4f7237c883ab2862c2f2
device/generic/x86_64 43ed01aceb08b2ab661b4fb50b9a5fe145012d4b device/generic/x86_64 43ed01aceb08b2ab661b4fb50b9a5fe145012d4b
device/google/atv 754e5418af6b7df47df34681b3ec01c1d917de76 device/google/atv 754e5418af6b7df47df34681b3ec01c1d917de76
device/google/barbet 5b4356006dc0f1fbaa345c1db6c9311ee2c4e2da
device/google/bluejay 65186d71545c2d376ec5a35d1b2aa2402bd6b721 device/google/bluejay 65186d71545c2d376ec5a35d1b2aa2402bd6b721
device/google/bluejay-kernel 7f93dd0cc9c0bdb47af6982d2accba79b1d05c98 device/google/bluejay-kernel 7f93dd0cc9c0bdb47af6982d2accba79b1d05c98
device/google/blueline 40bffd6293c1d33acf397fd338b7f04c4d13b156
device/google/bonito 9e8ea23d415f98ea0f813e1afd9dd0c62de794d2
device/google/bramble 0757140d907f568e4515791911c7e0e9b2132635
device/google/cheetah 85cc49918114bbf10ab4741649dec46252da49d1 device/google/cheetah 85cc49918114bbf10ab4741649dec46252da49d1
device/google/contexthub 846d8316f3da79ce27dcdf92c98de50d9a900ec8 device/google/contexthub 846d8316f3da79ce27dcdf92c98de50d9a900ec8
device/google/coral 34b4f98cecc6106abc6335b4eebfe8c5cd8d1b41
device/google/crosshatch 162a54d838dbb7f9eb675b8d06b5a96443ad2470
device/google/cuttlefish 59f1b5b1b7b1bb1fd7dfc7003161c1ec32a3120e device/google/cuttlefish 59f1b5b1b7b1bb1fd7dfc7003161c1ec32a3120e
device/google/cuttlefish_prebuilts 78870564f4537fe1aada6110854ce2237fc20cfd device/google/cuttlefish_prebuilts 78870564f4537fe1aada6110854ce2237fc20cfd
device/google/cuttlefish_vmm aea3cd85d83d1d6d0b59c9cf0004e701ae7cdfef device/google/cuttlefish_vmm aea3cd85d83d1d6d0b59c9cf0004e701ae7cdfef
device/google/felix a24c87ba0622bf92ddfaa802bcbe9df2914310f9 device/google/felix a24c87ba0622bf92ddfaa802bcbe9df2914310f9
device/google/felix-kernel 5b9f0fdda4870d62bb3545590a201f22cb1efb0e device/google/felix-kernel 5b9f0fdda4870d62bb3545590a201f22cb1efb0e
device/google/flame 3f0cf2898324099794b7d316f02eda3883a409f3
device/google/gs-common 811212e50502a3e1af5f46279338942365890e2d device/google/gs-common 811212e50502a3e1af5f46279338942365890e2d
device/google/gs101 ec68559daffa4aabbba264f56f9a6e450883db8d device/google/gs101 ec68559daffa4aabbba264f56f9a6e450883db8d
device/google/gs201 d0495834e4bd28d8dd559fb1b991340a5368ede5 device/google/gs201 d0495834e4bd28d8dd559fb1b991340a5368ede5
@ -55,6 +67,10 @@ device/google/panther 1fffafe63058376bce1278a983f5e7ad87dfc5d5
device/google/raven d2ee4333052087d012c3c6ed0f3ff169d8746bc4 device/google/raven d2ee4333052087d012c3c6ed0f3ff169d8746bc4
device/google/raviole 72dadeb7f455b984691e43f82cc7dfee924ab258 device/google/raviole 72dadeb7f455b984691e43f82cc7dfee924ab258
device/google/raviole-kernel 1c5e7767d36771475bd0bc213734b542d29e9ac0 device/google/raviole-kernel 1c5e7767d36771475bd0bc213734b542d29e9ac0
device/google/redbull 9f291fe92ab20c4fed6ee6627f0d6204fd394596
device/google/redfin 69332ca0551e5b46fa0cbde1473e100430e5cc36
device/google/sargo 778f11fc241e4f78c64b3a19e82f109a6d8528be
device/google/sunfish ca0cffd027fc7d25b8083e1751f53b184dc8d2cd
device/google/taimen acbad5fdd58c96a9a08c7a952593181fc6eb026b device/google/taimen acbad5fdd58c96a9a08c7a952593181fc6eb026b
device/google/tangorpro 10f9f808bdf2c746d796179f040173f41db02eb0 device/google/tangorpro 10f9f808bdf2c746d796179f040173f41db02eb0
device/google/tangorpro-kernel 14ff7d544741ad835507239440eed87e17ed7bd8 device/google/tangorpro-kernel 14ff7d544741ad835507239440eed87e17ed7bd8
@ -65,6 +81,26 @@ device/google_car 92b6781fa6ce806d4d33c362a8d083fc67f7f3e7
device/lineage/atv a85571a4aa9135577912444a4274310466a111ad device/lineage/atv a85571a4aa9135577912444a4274310466a111ad
device/lineage/car 57aaa54bd41e2e0db3348a9b9792cc007ec496e4 device/lineage/car 57aaa54bd41e2e0db3348a9b9792cc007ec496e4
device/lineage/sepolicy 126b2bdd0f6fdc815999e44b9e134c7ae6c39d8c device/lineage/sepolicy 126b2bdd0f6fdc815999e44b9e134c7ae6c39d8c
device/oneplus/avicii 2ce7f3e9c5e0d92ddc0a1b6492f7be6ff8c342a7
device/oneplus/cheeseburger 980b9e58db9998511efce378e10839c9d86ec3fc
device/oneplus/dumpling ffea7c7c479e8e8538a7bc31ff8e06a4c15b540c
device/oneplus/enchilada c662081cfb18d38a102dd7fc66e4189cd6bc1cb8
device/oneplus/fajita 54ff0c36fcb835b8d4e3015c9666f16e0d84c56b
device/oneplus/guacamole 0a04e4c2f26a0daad06c550ccadac32b16274044
device/oneplus/guacamoleb b9a5083bdbae8f259ba41604b2a34cbe6ae27533
device/oneplus/hotdog edcfc0db462668595cb3768c86aa8ae425e62340
device/oneplus/hotdogb 405b1f3c23cbabee47e6a181e6313856bb5dc0ac
device/oneplus/instantnoodle 0600c77acc6656d64776d829a849aa48988335be
device/oneplus/instantnoodlep 3f9ba8f6c0b77084ff9fefd85f401b10dc3af403
device/oneplus/kebab 642b77596096bd7a6af96fd516a9340cf5ac3193
device/oneplus/lemonade eb6ec85bbcac62132f7b2045420a38ccca9baf02
device/oneplus/lemonadep 9e282c176f51b5963f9d2e5e3652f4450046bc5d
device/oneplus/lemonades 87ad9cc2d64727225025904d3c53a50c42f1b06b
device/oneplus/msm8998-common 05778eb6d16caa16c6ed67cf4ae12d29bdc0330f
device/oneplus/sdm845-common da173525de9474c265017c5a5cfd1875e8b5d2e8
device/oneplus/sm8150-common 54104767ec7e968a37c724c574ca2cfdd7967e07
device/oneplus/sm8250-common 22b8a6c2075ac3bd1e823f2aaffe2e2f0537f5e5
device/oneplus/sm8350-common fb531a968a534d079fd68e9edd4dbc8b99288ef7
device/qcom/sepolicy f1f31749313106bdc735fa700fb2248cc261c2c2 device/qcom/sepolicy f1f31749313106bdc735fa700fb2248cc261c2c2
device/qcom/sepolicy-legacy-um a0cc2d5fd85457281130c635a6d4af1b753a2662 device/qcom/sepolicy-legacy-um a0cc2d5fd85457281130c635a6d4af1b753a2662
device/qcom/sepolicy_vndr/legacy-um 338029e10a2647da5742503e6584f6a270942fc9 device/qcom/sepolicy_vndr/legacy-um 338029e10a2647da5742503e6584f6a270942fc9
@ -135,7 +171,7 @@ external/capstone 9a0e4156d50a75a99ec4f1653a0e9602a5d45c18
external/cblas e5d01406896b3eeb89dd91a97fd23acf8da54297 external/cblas e5d01406896b3eeb89dd91a97fd23acf8da54297
external/cbor-java 3bcaeafe943411543f051b8142b62ffe45589356 external/cbor-java 3bcaeafe943411543f051b8142b62ffe45589356
external/chromium-trace c942db8690e564bf053225d118980c694102dd5f external/chromium-trace c942db8690e564bf053225d118980c694102dd5f
external/chromium-webview 4a9cf619f77955ea20f608a193006dcdf1b21e21 external/chromium-webview d03a677dd34972dfcdd8e72c3c90ddc1c77e4033
external/clang 9297b900761ee5537ab713ca190f45c94d5ec3ac external/clang 9297b900761ee5537ab713ca190f45c94d5ec3ac
external/cldr b7a7a49c48ffd1ea235cff89d6b2d97359eba522 external/cldr b7a7a49c48ffd1ea235cff89d6b2d97359eba522
external/cn-cbor 28d988464a3b4df16c91af3771c7b042fa5a7772 external/cn-cbor 28d988464a3b4df16c91af3771c7b042fa5a7772
@ -807,7 +843,7 @@ external/sfntly 1ceec735689fa94e28187be7a3c29da1b5c636be
external/sg3_utils 44704f698541f6367e81f991ef8bb54ccbf3fc18 external/sg3_utils 44704f698541f6367e81f991ef8bb54ccbf3fc18
external/shaderc/spirv-headers 7febe9feb40df796f100384b8ea729b9c0489522 external/shaderc/spirv-headers 7febe9feb40df796f100384b8ea729b9c0489522
external/shflags 0316ec7373f5738d4a461291407635d5500cc414 external/shflags 0316ec7373f5738d4a461291407635d5500cc414
external/skia 949e496cf98197ed25a871d6247814e224d21cb9 external/skia 1992504e312ef2e7ddd101fa69eeb784adad05bc
external/sl4a ce036dc189d7455a0f09cd24991e69d020a3ac81 external/sl4a ce036dc189d7455a0f09cd24991e69d020a3ac81
external/slf4j d0137a3495b4080aa9fa7ea5d00d4c0a9e81d79f external/slf4j d0137a3495b4080aa9fa7ea5d00d4c0a9e81d79f
external/snakeyaml 835062ed5ce551279286f9a6a8bec439f4837976 external/snakeyaml 835062ed5ce551279286f9a6a8bec439f4837976
@ -878,7 +914,7 @@ external/zstd fc80ff3c3d0ef8123ebcd901d89ce352d0c191cd
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00 external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
external/zxing 513427e33d61bc67fc40bc261642ac0b2a686b45 external/zxing 513427e33d61bc67fc40bc261642ac0b2a686b45
frameworks/av 34fa5d146a5fdba488711e34b7a899472185fc9f frameworks/av 34fa5d146a5fdba488711e34b7a899472185fc9f
frameworks/base 2031865f119a22eec24ef5499f962f37e00e6c5d frameworks/base 158a581dfad292f14e53f70a055476b67216c7ef
frameworks/compile/libbcc 2c3f4c361d131e500f6de3c417b819a05d13cf1f frameworks/compile/libbcc 2c3f4c361d131e500f6de3c417b819a05d13cf1f
frameworks/compile/mclinker a40bbbff6e6e115620b12f620d3e9e9a0e7eb20e frameworks/compile/mclinker a40bbbff6e6e115620b12f620d3e9e9a0e7eb20e
frameworks/compile/slang 8e9a212552c9096cfeccaacd65dea1d1bca88107 frameworks/compile/slang 8e9a212552c9096cfeccaacd65dea1d1bca88107
@ -944,6 +980,8 @@ hardware/nxp/nfc 418bd01a4c681adc7ae0e0278041a9534d34306f
hardware/nxp/secure_element 6dac5079f0ffcaa4832d3266c0498f30ebbc7ac4 hardware/nxp/secure_element 6dac5079f0ffcaa4832d3266c0498f30ebbc7ac4
hardware/nxp/uwb 0d0dd875c90ebc33e9a76c8397a7218742b51730 hardware/nxp/uwb 0d0dd875c90ebc33e9a76c8397a7218742b51730
hardware/nxp/weaver dc982dd7facd353701e9c9e51f9f385df59b1bde hardware/nxp/weaver dc982dd7facd353701e9c9e51f9f385df59b1bde
hardware/oneplus 0ac405890a96ffdccfebbfacffccd713d647e596
hardware/oplus 56cc248362fe1221062e38846330d5930c85aee1
hardware/qcom-caf/bootctrl 581fb573e1e26168f7fd56f5ad84ce75d92fe623 hardware/qcom-caf/bootctrl 581fb573e1e26168f7fd56f5ad84ce75d92fe623
hardware/qcom-caf/bt b7218e4c89817079546f035f3cfe5f99b4730d43 hardware/qcom-caf/bt b7218e4c89817079546f035f3cfe5f99b4730d43
hardware/qcom-caf/common 2c1fa0cf671c709937b67cbb71b148dce12f8604 hardware/qcom-caf/common 2c1fa0cf671c709937b67cbb71b148dce12f8604
@ -1025,7 +1063,21 @@ hardware/st/secure_element2 755cd2d9427da6d3bd2a5d6b11880cca1e80e4f2
hardware/synaptics/wlan 652d892bc1bd254e63ac916dec49623454e9e067 hardware/synaptics/wlan 652d892bc1bd254e63ac916dec49623454e9e067
hardware/ti/am57x 051ca1565ae8fb7e8e23f0dbcd94460f5a9ad522 hardware/ti/am57x 051ca1565ae8fb7e8e23f0dbcd94460f5a9ad522
kernel/configs 847bbc49ae44b9161bfafb766202b6dc4d435c17 kernel/configs 847bbc49ae44b9161bfafb766202b6dc4d435c17
kernel/essential/msm8998 9bf9886d6c295d0dd7ec9b9c701df9d893e75571
kernel/fairphone/sdm632 d02c84f597b54a79cee9b7f4cbe6981b9c50de4b
kernel/fairphone/sm7225 1b745eae03088f41f905be5d1727adf3bc018cb4
kernel/fxtec/msm8998 4d3dc6e9b86ffc767cf09356be9471fd42572af0
kernel/fxtec/sm6115 345de7d2363b5b122169b776dcd230b39eb08797
kernel/google/msm-4.14 7441b2abbab516bd006b64d137c44b126e5c6d32
kernel/google/msm-4.9 7af616af007590fc1af4776a6c236c56be51489d
kernel/google/redbull afabfd37d07db6b36dfe37d1a0d5841ea06eb949
kernel/google/wahoo 3a67b5d2e16a0c839b68dbfa2a5bb8c9c6e5cce2 kernel/google/wahoo 3a67b5d2e16a0c839b68dbfa2a5bb8c9c6e5cce2
kernel/oneplus/msm8998 5d01a147deb228b2d053117a18071a81aa907acc
kernel/oneplus/sdm845 ed65f45c7f6ffdbcb25fb27ac0df5c9404c4eb16
kernel/oneplus/sm7250 fb4b4374d3b9ad0f10ba38d159585129f092fb3d
kernel/oneplus/sm8150 553ad0541485772cea4203b81dcae6372d038da0
kernel/oneplus/sm8250 22fe06dbcf3c8d3cf2cca26e3e60bb804dead654
kernel/oneplus/sm8350 2f6287c4740289b2d529df932a16a1108398c993
kernel/prebuilts/4.19/arm64 2c56f90c98f82a5004ef01bb4552bfa094718472 kernel/prebuilts/4.19/arm64 2c56f90c98f82a5004ef01bb4552bfa094718472
kernel/prebuilts/5.10/arm64 ba73bcd23eb442208ee8ac6cf5a779324a11d03e kernel/prebuilts/5.10/arm64 ba73bcd23eb442208ee8ac6cf5a779324a11d03e
kernel/prebuilts/5.10/x86_64 94b5e7765b0606f6d530b999882a31c7e5a051d6 kernel/prebuilts/5.10/x86_64 94b5e7765b0606f6d530b999882a31c7e5a051d6
@ -1088,7 +1140,7 @@ packages/apps/CertInstaller ac293f1fa79b3a02cb78a1dd7eaf9942374603d1
packages/apps/Contacts d9ef1ac5a7850698632e3c28278e1ced449c4b91 packages/apps/Contacts d9ef1ac5a7850698632e3c28278e1ced449c4b91
packages/apps/DeskClock 2828ae1a4d183feb32e842a642f58bdf0ae35485 packages/apps/DeskClock 2828ae1a4d183feb32e842a642f58bdf0ae35485
packages/apps/Dialer 1dad74cb39d1d8ba641698cb8ca85005a386f4d7 packages/apps/Dialer 1dad74cb39d1d8ba641698cb8ca85005a386f4d7
packages/apps/DocumentsUI a2c1dd717347fc6dae14de4e5ae0b1651eb5ed78 packages/apps/DocumentsUI f9cd25bde91d634ab82132468a0564d51e3f0fb9
packages/apps/ElmyraService b0fe9149683fac753182253ec488453e8e6903a5 packages/apps/ElmyraService b0fe9149683fac753182253ec488453e8e6903a5
packages/apps/EmergencyInfo c3f0da3e1b055755647c7728b30e723f4fd0fa41 packages/apps/EmergencyInfo c3f0da3e1b055755647c7728b30e723f4fd0fa41
packages/apps/Etar 396a4e9c4cf26740fbb62558af19524ebb4e2370 packages/apps/Etar 396a4e9c4cf26740fbb62558af19524ebb4e2370
@ -1139,7 +1191,7 @@ packages/inputmethods/LeanbackIME e149bd75e80000e8ce5e1ffe045174c32825924e
packages/modules/AdServices 50c6b795de14812a67eca6a83cb50ac7e74a0a2e packages/modules/AdServices 50c6b795de14812a67eca6a83cb50ac7e74a0a2e
packages/modules/AppSearch ceb280f1b40b917fc907d8eacfc84e27e497b8c4 packages/modules/AppSearch ceb280f1b40b917fc907d8eacfc84e27e497b8c4
packages/modules/ArtPrebuilt bee62eeff9f366e5887a439b71f17a43d678be81 packages/modules/ArtPrebuilt bee62eeff9f366e5887a439b71f17a43d678be81
packages/modules/Bluetooth 53b9f2c0930d957c74a9f89fa1c5a950e89ecae0 packages/modules/Bluetooth eaafcbe83e66004f17fd4f5433c8e2c2bfd36b7b
packages/modules/CaptivePortalLogin db4ac5ad7d3caa76879de01630fd9f0c74a5b574 packages/modules/CaptivePortalLogin db4ac5ad7d3caa76879de01630fd9f0c74a5b574
packages/modules/CellBroadcastService 6a2dd19af8c82b73debe2d1a4dbd1a3b232c5ba7 packages/modules/CellBroadcastService 6a2dd19af8c82b73debe2d1a4dbd1a3b232c5ba7
packages/modules/ConfigInfrastructure 7671cc7268a9b074813e190884a17d3084d876c3 packages/modules/ConfigInfrastructure 7671cc7268a9b074813e190884a17d3084d876c3
@ -1161,7 +1213,7 @@ packages/modules/NetworkPermissionConfig 881a1704a0f929a6560538ce4648abddbef8d1f
packages/modules/NetworkStack a415d3808f8b6ab9c15b8d873eb88e96f4a506a8 packages/modules/NetworkStack a415d3808f8b6ab9c15b8d873eb88e96f4a506a8
packages/modules/NeuralNetworks 4672170986e5cd37ef90adc990288cc09b3047b2 packages/modules/NeuralNetworks 4672170986e5cd37ef90adc990288cc09b3047b2
packages/modules/OnDevicePersonalization 21ed7b685584f258aa3c39da1efdb7ab43272ba1 packages/modules/OnDevicePersonalization 21ed7b685584f258aa3c39da1efdb7ab43272ba1
packages/modules/Permission 02b09166c18018578207272a9e7e48b3c53fdb74 packages/modules/Permission 0def8c1cb889eb3f76908b38b9c27b0041f42dd6
packages/modules/Profiling 92609c87ae155dc21b173cd335b42eb40017e13c packages/modules/Profiling 92609c87ae155dc21b173cd335b42eb40017e13c
packages/modules/RemoteKeyProvisioning 379030fe72cce0ced58a51ee6f528556772b576f packages/modules/RemoteKeyProvisioning 379030fe72cce0ced58a51ee6f528556772b576f
packages/modules/RuntimeI18n 41d2bb4904b435d2a0cc3779def166b9e6d6b33c packages/modules/RuntimeI18n 41d2bb4904b435d2a0cc3779def166b9e6d6b33c
@ -1413,17 +1465,52 @@ trusty/user/base 776861c503a1efabb0ff34b47ea17a8d461a23b2
trusty/vendor/google/aosp 2edf8eb162934c428ffcbda2dcd91696e0bc1777 trusty/vendor/google/aosp 2edf8eb162934c428ffcbda2dcd91696e0bc1777
vendor/codeaurora/telephony 6cfafa7df042506e0c48f19e18b5972985177745 vendor/codeaurora/telephony 6cfafa7df042506e0c48f19e18b5972985177745
vendor/crowdin 15a184c4aaa6469cc55ca685b5f1cd1939155888 vendor/crowdin 15a184c4aaa6469cc55ca685b5f1cd1939155888
vendor/essential/mata be8ca723a879465e95c185c17888b0024f70b6dd
vendor/fairphone/FP3 c76b99fc9da8bb53156cfb3e78a592ee4281b8d7
vendor/fairphone/FP4 3e298c3fb0e5bf6f1a1e6eeef33aaa1b2cd4a485
vendor/fxtec/pro1 f743734f39eada0646b213c9d3ccb82a45da3d79
vendor/fxtec/pro1x ea4f9ed909f932b3b5f1322bf8605c222313a444
vendor/google/barbet 0a5b2cb46b584b5380a8bd2b898e61161e68da31
vendor/google/bluejay 430da8d3e2aa8a8f7985519d35b700d35830eaaa vendor/google/bluejay 430da8d3e2aa8a8f7985519d35b700d35830eaaa
vendor/google/blueline cdd53336abdf517011184d71953be4cdc4f9d344
vendor/google/bonito 29fa47e938fc8181d764fb0d61983078314d91de
vendor/google/bramble 605a1481e4d12265dc4118bf31ef5bc3d90c78aa
vendor/google/cheetah d49f62efef0843a81dc8d7c860b196a30efceb66 vendor/google/cheetah d49f62efef0843a81dc8d7c860b196a30efceb66
vendor/google/coral 47b81e6505bd580890160e0adf58c8d82816515d
vendor/google/crosshatch 322a40b75962294e22ab961f03f3f7266a472cef
vendor/google/felix 6eff0c3e287454905660729a634e7e7a1264b18e vendor/google/felix 6eff0c3e287454905660729a634e7e7a1264b18e
vendor/google/flame 326682ac09d6464d1657b2290c0cd7554a461237
vendor/google/lynx e9e047709bd5a2605d1207eb2354b4101626e01d vendor/google/lynx e9e047709bd5a2605d1207eb2354b4101626e01d
vendor/google/oriole 460fad99f25575e4f3a328319952ee5497e0bbc3 vendor/google/oriole 460fad99f25575e4f3a328319952ee5497e0bbc3
vendor/google/panther ac852a92ef6381c4d52c8a19c393cde28045bba6 vendor/google/panther ac852a92ef6381c4d52c8a19c393cde28045bba6
vendor/google/raven 8a497b74a346c15d94910aced32e93467a2a8890 vendor/google/raven 8a497b74a346c15d94910aced32e93467a2a8890
vendor/google/redfin 4e3a556ec79f83816e14f5256edc8af4f53193db
vendor/google/sargo 1da09a59d1827a77d8bf19697192dd8e1ee9713e
vendor/google/sunfish fcc2a2c281f095abe0aeed1ab5b988b7783d6174
vendor/google/taimen 315fcc4a1acfc3deebb6fb077a9d5ac753d6a996 vendor/google/taimen 315fcc4a1acfc3deebb6fb077a9d5ac753d6a996
vendor/google/tangorpro 51f599d8515e0a9fd9dcbdafecc8940eb79878d1 vendor/google/tangorpro 51f599d8515e0a9fd9dcbdafecc8940eb79878d1
vendor/google/walleye 8bc5a546a6dd148dce708a1f29f4cd376addb8f7 vendor/google/walleye 8bc5a546a6dd148dce708a1f29f4cd376addb8f7
vendor/lineage bd5c14a81070f25315e46910353dd32e3c2fdd83 vendor/lineage 56ec683ee675eefa2fb618c06e8e29d47f2fffdb
vendor/oneplus/avicii df3e83539d65dd97f856fc119a1e430badb2ab55
vendor/oneplus/cheeseburger 2b5b41b090de2cc83a379d32a27a9c6424a1f802
vendor/oneplus/dumpling 8220ba4e0044caa81bbd900586c6463659c10f2d
vendor/oneplus/enchilada e49f96f6bff48fbc9083777149f5c71a4c8d2aa9
vendor/oneplus/fajita 21771a8a208e7aeb5e67fb88cf940ec6a3ceddcb
vendor/oneplus/guacamole 587f315a6156aa4d1b92a98deada11a6500aa3fa
vendor/oneplus/guacamoleb 5ebd0ba3246e4d9501cfa3099ac5a0087297c4f5
vendor/oneplus/hotdog 456986cd07e170f79e36df513bbf9c55d1a0f896
vendor/oneplus/hotdogb add3e544a92f738318780416a40c83f4e6104b30
vendor/oneplus/instantnoodle 7a90f01c559b0919f74f52614c79cb95de25771f
vendor/oneplus/instantnoodlep a9fefc09f787be3375ecf3f85ba4c3804d59117d
vendor/oneplus/kebab e66c9b7dea5359ff588082febc55b2b3bb50178a
vendor/oneplus/lemonade ef71ad64bc277d922943aaff5cc3f1a60d7734fc
vendor/oneplus/lemonadep 21e51c95ebb5ae3788fad0aa71703d2a69778770
vendor/oneplus/lemonades 30425d2d37f3a0e13e56577faa3353b950e72d71
vendor/oneplus/msm8998-common 1cd9f3694568f82142d2e3bbc0498745c8ab3fef
vendor/oneplus/sdm845-common eaa2c5d5c53fec4400ebe76cbceed0595fe2162e
vendor/oneplus/sm8150-common 0fe0857509c82850b81372dc6639b4cf231d4606
vendor/oneplus/sm8250-common 8468891550ed266ca61ac8f612f63a678e764251
vendor/oneplus/sm8350-common 812ab578fafebc5834daa6fc9a9208982094df49
vendor/qcom/opensource/audio-hal/st-hal b2a0060bb4fa63280419616eb6e17cf3c10a4d42 vendor/qcom/opensource/audio-hal/st-hal b2a0060bb4fa63280419616eb6e17cf3c10a4d42
vendor/qcom/opensource/audio-hal/st-hal-ar 9a1ad498496ba28f7ed7d7146ec24ffaf899ed99 vendor/qcom/opensource/audio-hal/st-hal-ar 9a1ad498496ba28f7ed7d7146ec24ffaf899ed99
vendor/qcom/opensource/commonsys-intf/display bfd8bbc7536d4a06cb4f541a70e029060a0c7e90 vendor/qcom/opensource/commonsys-intf/display bfd8bbc7536d4a06cb4f541a70e029060a0c7e90

View File

@ -63,6 +63,26 @@
<project path="hardware/sony/timekeep" remote="github" name="LineageOS/android_hardware_sony_timekeep" revision="lineage-21" /> <project path="hardware/sony/timekeep" remote="github" name="LineageOS/android_hardware_sony_timekeep" revision="lineage-21" />
<project path="packages/apps/ElmyraService" name="LineageOS/android_packages_apps_ElmyraService" remote="github" /> <project path="packages/apps/ElmyraService" name="LineageOS/android_packages_apps_ElmyraService" remote="github" />
<!-- Essential PH-1 (mata) -->
<project path="device/essential/mata" name="LineageOS/android_device_essential_mata" remote="github" revision="lineage-21" />
<project path="kernel/essential/msm8998" name="LineageOS/android_kernel_essential_msm8998" remote="github" revision="lineage-21" />
<!-- F(x)tec Pro¹ (pro1) -->
<project path="device/fxtec/pro1" name="LineageOS/android_device_fxtec_pro1" remote="github" revision="lineage-21" />
<project path="kernel/fxtec/msm8998" name="LineageOS/android_kernel_fxtec_msm8998" remote="github" revision="lineage-21" />
<!-- F(x)tec Pro¹ X (pro1x) -->
<project path="device/fxtec/pro1x" name="LineageOS/android_device_fxtec_pro1x" remote="github" revision="lineage-21" />
<project path="kernel/fxtec/sm6115" name="LineageOS/android_kernel_fxtec_sm6115" remote="github" revision="lineage-21" />
<!-- Fairphone 3 (FP3) -->
<project path="device/fairphone/FP3" name="LineageOS/android_device_fairphone_FP3" remote="github" revision="lineage-21" />
<project path="kernel/fairphone/sdm632" name="LineageOS/android_kernel_fairphone_sdm632" remote="github" revision="lineage-21" />
<!-- Fairphone 4 (FP4) -->
<project path="device/fairphone/FP4" name="LineageOS/android_device_fairphone_FP4" remote="github" revision="lineage-21" />
<project path="kernel/fairphone/sm7225" name="LineageOS/android_kernel_fairphone_sm7225" remote="github" revision="lineage-21" />
<!-- Google Pixel 2 (taimen/walleye) --> <!-- Google Pixel 2 (taimen/walleye) -->
<project path="device/google/taimen" name="LineageOS/android_device_google_taimen" remote="github" revision="lineage-21" /> <project path="device/google/taimen" name="LineageOS/android_device_google_taimen" remote="github" revision="lineage-21" />
<project path="device/google/muskie" name="LineageOS/android_device_google_muskie" remote="github" revision="lineage-21" /> <project path="device/google/muskie" name="LineageOS/android_device_google_muskie" remote="github" revision="lineage-21" />
@ -70,6 +90,38 @@
<project path="device/google/wahoo" name="LineageOS/android_device_google_wahoo" remote="github" revision="lineage-21" /> <project path="device/google/wahoo" name="LineageOS/android_device_google_wahoo" remote="github" revision="lineage-21" />
<project path="kernel/google/wahoo" name="LineageOS/android_kernel_google_wahoo" remote="github" revision="lineage-21" /> <project path="kernel/google/wahoo" name="LineageOS/android_kernel_google_wahoo" remote="github" revision="lineage-21" />
<!-- Google Pixel 3 (crosshatch/blueline) -->
<project path="device/google/crosshatch" name="LineageOS/android_device_google_crosshatch" remote="github" revision="lineage-21" />
<project path="device/google/blueline" name="LineageOS/android_device_google_blueline" remote="github" revision="lineage-21" />
<project path="kernel/google/msm-4.9" name="LineageOS/android_kernel_google_msm-4.9" remote="github" revision="lineage-21" />
<!-- Google Pixel 3a (bonito/sargo) -->
<project path="device/google/bonito" name="LineageOS/android_device_google_bonito" remote="github" revision="lineage-21" />
<project path="device/google/sargo" name="LineageOS/android_device_google_sargo" remote="github" revision="lineage-21" />
<!-- uses google/msm-4.9 kernel -->
<!-- Google Pixel 4 (coral/flame) -->
<project path="device/google/coral" name="LineageOS/android_device_google_coral" remote="github" revision="lineage-21" />
<project path="device/google/flame" name="LineageOS/android_device_google_flame" remote="github" revision="lineage-21" />
<project path="kernel/google/msm-4.14" name="LineageOS/android_kernel_google_msm-4.14" remote="github" revision="lineage-21" />
<!-- Google Pixel 4a (sunfish) -->
<project path="device/google/sunfish" name="LineageOS/android_device_google_sunfish" remote="github" revision="lineage-21" />
<!-- uses google/msm-4.14 kernel -->
<!-- Google Pixel 4a 5G (bramble) -->
<project path="device/google/bramble" name="LineageOS/android_device_google_bramble" remote="github" revision="lineage-21" />
<project path="device/google/redbull" name="LineageOS/android_device_google_redbull" remote="github" revision="lineage-21" />
<project path="kernel/google/redbull" name="LineageOS/android_kernel_google_redbull" remote="github" revision="lineage-21" />
<!-- Google Pixel 5 (redfin) -->
<project path="device/google/redfin" name="LineageOS/android_device_google_redfin" remote="github" revision="lineage-21" />
<!-- uses redbull commons -->
<!-- Google Pixel 5a (barbet) -->
<project path="device/google/barbet" name="LineageOS/android_device_google_barbet" remote="github" revision="lineage-21" />
<!-- uses redbull commons -->
<!-- Google Tensor Commons --> <!-- Google Tensor Commons -->
<project path="device/google/gs-common" name="LineageOS/android_device_google_gs-common" remote="github" revision="lineage-21" /> <project path="device/google/gs-common" name="LineageOS/android_device_google_gs-common" remote="github" revision="lineage-21" />
<project path="device/google/gs101" name="LineageOS/android_device_google_gs101" remote="github" revision="lineage-21" /> <project path="device/google/gs101" name="LineageOS/android_device_google_gs101" remote="github" revision="lineage-21" />
@ -97,15 +149,108 @@
<project path="device/google/felix" name="LineageOS/android_device_google_felix" remote="github" revision="lineage-21" /> <project path="device/google/felix" name="LineageOS/android_device_google_felix" remote="github" revision="lineage-21" />
<project path="device/google/felix-kernel" name="device/google/felix-kernel" remote="aosp-felix" clone-depth="1" /> <project path="device/google/felix-kernel" name="device/google/felix-kernel" remote="aosp-felix" clone-depth="1" />
<!-- OnePlus 5 (cheeseburger) -->
<project path="device/oneplus/cheeseburger" name="LineageOS/android_device_oneplus_cheeseburger" remote="github" revision="lineage-21" />
<project path="device/oneplus/msm8998-common" name="LineageOS/android_device_oneplus_msm8998-common" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/msm8998" name="LineageOS/android_kernel_oneplus_msm8998" remote="github" revision="lineage-21" />
<!-- OnePlus 5T (dumpling) -->
<project path="device/oneplus/dumpling" name="LineageOS/android_device_oneplus_dumpling" remote="github" revision="lineage-21" />
<!-- OnePlus 6 (enchilada) -->
<project path="hardware/oneplus" name="LineageOS/android_hardware_oneplus" remote="github" revision="lineage-21" />
<project path="device/oneplus/sdm845-common" name="LineageOS/android_device_oneplus_sdm845-common" remote="github" revision="lineage-21" />
<project path="device/oneplus/enchilada" name="LineageOS/android_device_oneplus_enchilada" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/sdm845" name="LineageOS/android_kernel_oneplus_sdm845" remote="github" revision="lineage-21" />
<!-- OnePlus 6T (fajita) -->
<project path="device/oneplus/fajita" name="LineageOS/android_device_oneplus_fajita" remote="github" revision="lineage-21" />
<!-- OnePlus Nord (avicii) -->
<project path="device/oneplus/avicii" name="LineageOS/android_device_oneplus_avicii" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/sm7250" name="LineageOS/android_kernel_oneplus_sm7250" remote="github" revision="lineage-21" />
<!-- OnePlus 7 Pro (guacamole) -->
<project path="device/oneplus/sm8150-common" name="LineageOS/android_device_oneplus_sm8150-common" remote="github" revision="lineage-21" />
<project path="device/oneplus/guacamole" name="LineageOS/android_device_oneplus_guacamole" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/sm8150" name="LineageOS/android_kernel_oneplus_sm8150" remote="github" revision="lineage-21" />
<!-- OnePlus 7 (guacamoleb) -->
<project path="device/oneplus/guacamoleb" name="LineageOS/android_device_oneplus_guacamoleb" remote="github" revision="lineage-21" />
<!-- OnePlus 7T Pro (hotdog) -->
<project path="device/oneplus/hotdog" name="LineageOS/android_device_oneplus_hotdog" remote="github" revision="lineage-21" />
<!-- OnePlus 7T (hotdogb) -->
<project path="device/oneplus/hotdogb" name="LineageOS/android_device_oneplus_hotdogb" remote="github" revision="lineage-21" />
<!-- OnePlus 8 Pro (instantnoodlep) -->
<project path="device/oneplus/sm8250-common" name="LineageOS/android_device_oneplus_sm8250-common" remote="github" revision="lineage-21" />
<project path="device/oneplus/instantnoodlep" name="LineageOS/android_device_oneplus_instantnoodlep" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/sm8250" name="LineageOS/android_kernel_oneplus_sm8250" remote="github" revision="lineage-21" />
<!-- OnePlus 8 (instantnoodle) -->
<project path="device/oneplus/instantnoodle" name="LineageOS/android_device_oneplus_instantnoodle" remote="github" revision="lineage-21" />
<!-- OnePlus 8T (kebab) -->
<project path="device/oneplus/kebab" name="LineageOS/android_device_oneplus_kebab" remote="github" revision="lineage-21" />
<!-- OnePlus 9R (lemonades) -->
<project path="device/oneplus/lemonades" name="LineageOS/android_device_oneplus_lemonades" remote="github" revision="lineage-21" />
<!-- OnePlus 9 Pro (lemonadep) -->
<project path="hardware/oplus" name="LineageOS/android_hardware_oplus" remote="github" revision="lineage-21" />
<project path="device/oneplus/sm8350-common" name="LineageOS/android_device_oneplus_sm8350-common" remote="github" revision="lineage-21" />
<project path="device/oneplus/lemonadep" name="LineageOS/android_device_oneplus_lemonadep" remote="github" revision="lineage-21" />
<project path="kernel/oneplus/sm8350" name="LineageOS/android_kernel_oneplus_sm8350" remote="github" revision="lineage-21" />
<!-- OnePlus 9 (lemonade) -->
<project path="device/oneplus/lemonade" name="LineageOS/android_device_oneplus_lemonade" remote="github" revision="lineage-21" />
<!-- Proprietary Blobs --> <!-- Proprietary Blobs -->
<project path="vendor/google/bluejay" name="[COLOUR IN THE LINES]/proprietary_vendor_google_bluejay" remote="github" revision="lineage-21" /> <project path="vendor/essential/mata" name="[COLOUR IN THE LINES]/proprietary_vendor_essential_mata" remote="github" revision="lineage-21" />
<project path="vendor/google/cheetah" name="[COLOUR IN THE LINES]/proprietary_vendor_google_cheetah" remote="github" revision="lineage-21" /> <project path="vendor/fairphone/FP3" name="[COLOUR IN THE LINES]/proprietary_vendor_fairphone_FP3" remote="github" revision="lineage-21" />
<project path="vendor/google/felix" name="[COLOUR IN THE LINES]/proprietary_vendor_google_felix" remote="github" revision="lineage-21" /> <project path="vendor/fairphone/FP4" name="[COLOUR IN THE LINES]/proprietary_vendor_fairphone_FP4" remote="github" revision="lineage-21" />
<project path="vendor/google/lynx" name="[COLOUR IN THE LINES]/proprietary_vendor_google_lynx" remote="github" revision="lineage-21" /> <project path="vendor/fxtec/pro1" name="[COLOUR IN THE LINES]/proprietary_vendor_fxtec_pro1" remote="github" revision="lineage-21" />
<project path="vendor/google/oriole" name="[COLOUR IN THE LINES]/proprietary_vendor_google_oriole" remote="github" revision="lineage-21" /> <project path="vendor/fxtec/pro1x" name="[COLOUR IN THE LINES]/proprietary_vendor_fxtec_pro1x" remote="github" revision="lineage-21" />
<project path="vendor/google/panther" name="[COLOUR IN THE LINES]/proprietary_vendor_google_panther" remote="github" revision="lineage-21" /> <project path="vendor/google/barbet" name="[COLOUR IN THE LINES]/proprietary_vendor_google_barbet" remote="github" revision="lineage-21" />
<project path="vendor/google/raven" name="[COLOUR IN THE LINES]/proprietary_vendor_google_raven" remote="github" revision="lineage-21" /> <project path="vendor/google/bluejay" name="[COLOUR IN THE LINES]/proprietary_vendor_google_bluejay" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/tangorpro" name="[COLOUR IN THE LINES]/proprietary_vendor_google_tangorpro" remote="github" revision="lineage-21" /> <project path="vendor/google/blueline" name="[COLOUR IN THE LINES]/proprietary_vendor_google_blueline" remote="github" revision="lineage-21" />
<project path="vendor/google/bonito" name="[COLOUR IN THE LINES]/proprietary_vendor_google_bonito" remote="github" revision="lineage-21" />
<project path="vendor/google/bramble" name="[COLOUR IN THE LINES]/proprietary_vendor_google_bramble" remote="github" revision="lineage-21" />
<project path="vendor/google/cheetah" name="[COLOUR IN THE LINES]/proprietary_vendor_google_cheetah" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/coral" name="[COLOUR IN THE LINES]/proprietary_vendor_google_coral" remote="github" revision="lineage-21" />
<project path="vendor/google/crosshatch" name="[COLOUR IN THE LINES]/proprietary_vendor_google_crosshatch" remote="github" revision="lineage-21" />
<project path="vendor/google/felix" name="[COLOUR IN THE LINES]/proprietary_vendor_google_felix" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/flame" name="[COLOUR IN THE LINES]/proprietary_vendor_google_flame" remote="github" revision="lineage-21" />
<project path="vendor/google/lynx" name="[COLOUR IN THE LINES]/proprietary_vendor_google_lynx" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/oriole" name="[COLOUR IN THE LINES]/proprietary_vendor_google_oriole" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/panther" name="[COLOUR IN THE LINES]/proprietary_vendor_google_panther" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/raven" name="[COLOUR IN THE LINES]/proprietary_vendor_google_raven" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/redfin" name="[COLOUR IN THE LINES]/proprietary_vendor_google_redfin" remote="github" revision="lineage-21" />
<project path="vendor/google/sargo" name="[COLOUR IN THE LINES]/proprietary_vendor_google_sargo" remote="github" revision="lineage-21" />
<project path="vendor/google/sunfish" name="[COLOUR IN THE LINES]/proprietary_vendor_google_sunfish" remote="github" revision="lineage-21" />
<project path="vendor/google/tangorpro" name="[COLOUR IN THE LINES]/proprietary_vendor_google_tangorpro" remote="gitlab" revision="lineage-21" />
<project path="vendor/google/taimen" name="[COLOUR IN THE LINES]/proprietary_vendor_google_taimen" remote="github" revision="lineage-21" /> <project path="vendor/google/taimen" name="[COLOUR IN THE LINES]/proprietary_vendor_google_taimen" remote="github" revision="lineage-21" />
<project path="vendor/google/walleye" name="[COLOUR IN THE LINES]/proprietary_vendor_google_walleye" remote="github" revision="lineage-21" /> <project path="vendor/google/walleye" name="[COLOUR IN THE LINES]/proprietary_vendor_google_walleye" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/avicii" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_avicii" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/cheeseburger" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_cheeseburger" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/dumpling" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_dumpling" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/enchilada" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_enchilada" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/fajita" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_fajita" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/guacamoleb" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_guacamoleb" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/guacamole" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_guacamole" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/hotdogb" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_hotdogb" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/hotdog" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_hotdog" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/instantnoodle" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_instantnoodle" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/instantnoodlep" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_instantnoodlep" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/kebab" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_kebab" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/lemonade" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_lemonade" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/lemonadep" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_lemonadep" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/lemonades" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_lemonades" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/msm8998-common" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_msm8998-common" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/sdm845-common" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_sdm845-common" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/sm8150-common" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_sm8150-common" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/sm8250-common" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_sm8250-common" remote="github" revision="lineage-21" />
<project path="vendor/oneplus/sm8350-common" name="[COLOUR IN THE LINES]/proprietary_vendor_oneplus_sm8350-common" remote="github" revision="lineage-21" />
</manifest> </manifest>

View File

@ -11,7 +11,7 @@ integrate better with the new camera and microphone indicators.
1 file changed, 1 insertion(+), 1 deletion(-) 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt b/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt diff --git a/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt b/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt
index 2aad0154b..16c6d5aa9 100644 index 3fcc88854..c87dde293 100644
--- a/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt --- a/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt
+++ b/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt +++ b/PermissionController/src/com/android/permissioncontroller/permission/utils/KotlinUtils.kt
@@ -197,7 +197,7 @@ object KotlinUtils { @@ -197,7 +197,7 @@ object KotlinUtils {

View File

@ -174,14 +174,14 @@ enableAVB "device/xiaomi/wayne-common";
enableAVB "device/xiaomi/whyred"; enableAVB "device/xiaomi/whyred";
#Kernel Changes #Kernel Changes
[[ -d kernel/essential/msm8998 ]] && sed -i 's/slotselect/slotselect,verify/' kernel/essential/msm8998/arch/arm64/boot/dts/essential/msm8998-mata-lineage.dtsi &>/dev/null; #/vendor [[ -d kernel/essential/msm8998 ]] && sed -i 's/slotselect/slotselect,verify/' kernel/essential/msm8998/arch/arm64/boot/dts/essential/msm8998-mata-lineage.dtsi &>/dev/null || true; #/vendor
[[ -d kernel/google/marlin ]] && sed -i 's/wait,slotselect/wait,slotselect,verify/' kernel/google/marlin/arch/arm64/boot/dts/htc/msm8996-htc-common.dtsi &>/dev/null; #/vendor [[ -d kernel/google/marlin ]] && sed -i 's/wait,slotselect/wait,slotselect,verify/' kernel/google/marlin/arch/arm64/boot/dts/htc/msm8996-htc-common.dtsi &>/dev/null || true; #/vendor
#[[ -d kernel/htc/flounder ]] && sed -i 's/wait/wait,verify/g' kernel/htc/flounder/arch/arm64/boot/dts/tegra132.dtsi &>/dev/null; #/system #XXX: no boot #[[ -d kernel/htc/flounder ]] && sed -i 's/wait/wait,verify/g' kernel/htc/flounder/arch/arm64/boot/dts/tegra132.dtsi &>/dev/null || true; #/system #XXX: no boot
[[ -d kernel/moto/shamu ]] && sed -i 's/wait/wait,verify/g' kernel/moto/shamu/arch/arm/boot/dts/qcom/apq8084.dtsi &>/dev/null; #/system [[ -d kernel/moto/shamu ]] && sed -i 's/wait/wait,verify/g' kernel/moto/shamu/arch/arm/boot/dts/qcom/apq8084.dtsi &>/dev/null || true; #/system
[[ -d kernel/oneplus/msm8996 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8996/arch/arm/boot/dts/qcom/15801/msm8996-mtp.dtsi &>/dev/null; #/system [[ -d kernel/oneplus/msm8996 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8996/arch/arm/boot/dts/qcom/15801/msm8996-mtp.dtsi &>/dev/null || true; #/system
[[ -d kernel/oneplus/msm8998 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8998/arch/arm/boot/dts/qcom/cheeseburger.dtsi &>/dev/null; #/system and /vendor [[ -d kernel/oneplus/msm8998 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8998/arch/arm/boot/dts/qcom/cheeseburger.dtsi &>/dev/null || true; #/system and /vendor
[[ -d kernel/oneplus/msm8998 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8998/arch/arm/boot/dts/qcom/dumpling.dtsi &>/dev/null; #/system and /vendor [[ -d kernel/oneplus/msm8998 ]] && sed -i 's/wait/wait,verify/g' kernel/oneplus/msm8998/arch/arm/boot/dts/qcom/dumpling.dtsi &>/dev/null || true; #/system and /vendor
[[ -d kernel/zuk/msm8996 ]] && sed -i 's/wait/wait,verify/g' kernel/zuk/msm8996/arch/arm/boot/dts/qcom/zuk/common.dtsi &>/dev/null; #/system and /vendor [[ -d kernel/zuk/msm8996 ]] && sed -i 's/wait/wait,verify/g' kernel/zuk/msm8996/arch/arm/boot/dts/qcom/zuk/common.dtsi &>/dev/null || true; #/system and /vendor
#not used #not used
#sed -i 's/wait/wait,verify/g' kernel/cyanogen/msm8916/arch/arm/boot/dts/qcom/msm8916.dtsi &>/dev/null || true; #/system #sed -i 's/wait/wait,verify/g' kernel/cyanogen/msm8916/arch/arm/boot/dts/qcom/msm8916.dtsi &>/dev/null || true; #/system
#sed -i 's/wait/wait,verify/g' kernel/cyanogen/msm8974/arch/arm/boot/dts/msm8974.dtsi &>/dev/null || true; #/system #sed -i 's/wait/wait,verify/g' kernel/cyanogen/msm8974/arch/arm/boot/dts/msm8974.dtsi &>/dev/null || true; #/system

View File

@ -0,0 +1,677 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/essential/msm8998"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11883/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-3.0/0002.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3542/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47006/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1974/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42328/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48619/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48651/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48695/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48701/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48715/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48736/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48737/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48738/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48743/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48786/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48810/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0023.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52478/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52605/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52615/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52868/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26624/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26976/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27013/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42070/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p671"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,575 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/fairphone/sdm632"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46935/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47110/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1855/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33064/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33065/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43528/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52477/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52527/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52528/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52609/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52650/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52691/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52819/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26744/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26752/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26763/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27078/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35950/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.9/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38637/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38780/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46745/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-alt/4.9/0001.patch
editKernelLocalversion "-dos.p569"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,302 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/fairphone/sm7225"; then
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36782/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36783/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44988/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50150/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50282/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53136/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53142/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p296"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,677 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/fxtec/msm8998"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0012.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11883/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-3.0/0002.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3542/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47006/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1974/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42328/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48619/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48651/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48695/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48701/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48715/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48736/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48737/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48738/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48743/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48786/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48810/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0023.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52478/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52605/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52615/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52868/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26624/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26976/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27013/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42070/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p671"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,302 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/fxtec/sm6115"; then
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36782/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36783/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44988/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50150/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50282/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53136/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53142/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p296"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,269 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/google/msm-4.14"; then
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0028.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0030.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0032.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-unused/4.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-unused/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5754/^4.19/0157.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20382/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33246/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28554/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33064/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33065/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43528/audio-kernel/0001.patch --directory=techpack/audio
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52746/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35950/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41007/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
editKernelLocalversion "-dos.p263"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,570 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/google/msm-4.9"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0033.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11883/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.19/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46935/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47110/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1855/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33065/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43528/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52477/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52527/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52528/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52609/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52650/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52691/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52819/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26744/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26752/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26763/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27078/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38637/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38780/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46745/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p564"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,301 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/google/redbull"; then
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36782/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36783/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3104/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28541/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33118/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33118/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52682/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52748/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52852/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23378/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33053/video-driver/0001.patch --directory=techpack/video
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44988/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46719/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50150/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50282/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53136/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53142/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p295"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,677 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/msm8998"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0012.patch
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11883/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-3.0/0002.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3542/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47006/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1974/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42328/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48619/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48651/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48695/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48701/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48715/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48736/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48737/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48738/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48743/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48786/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48810/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48836/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0023.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.4/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52478/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52605/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52615/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52809/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52868/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26624/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26923-alt/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26955/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26976/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27013/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42070/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p671"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,576 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/sdm845"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15832/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46935/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47110/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1855/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2002/3.10-^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33065/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34324/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39194/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42752/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-42754/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43528/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52475/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52477/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52507/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52527/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52528/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52566/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52609/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52646/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52650/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52691/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52804/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52805/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52806/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52813/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52818/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52819/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52832/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52843/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52845/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52855/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26744/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26752/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26763/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27078/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35950/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38637/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38780/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46745/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p570"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,712 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/sm7250"; then
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0318-0319.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11149/camera-kernel/0004.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11150/camera-kernel/0003.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36782/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36783/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35118/camera-kernel/0004.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48797/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7042/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52583/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52594/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52597/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52598/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52600/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52605/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52606/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52609/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52615/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52619/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52620/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52650/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52675/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52679/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52683/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52685/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52686/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52691/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52746/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23378/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26615/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26624/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26664/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26675/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26679/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26685/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26696/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26697/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26704/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26735/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26744/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26751/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26752/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26754/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26763/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26766/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26772/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26773/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26777/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26778/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26779/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26791/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26793/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26801/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26805/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26816/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26825/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26839/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26884/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26894/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26908/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26917/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26931/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26957/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26965/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26973/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26976/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26993/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27000/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27001/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27013/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27024/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27028/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27046/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27075/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27077/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27078/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27398/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27405/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27412/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27413/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27416/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27421/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27426/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27436/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-31076/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33053/video-driver/0001.patch --directory=techpack/video
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35807/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35825/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35925/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35955/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35973/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35976/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36288/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36904/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36940/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38627/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38637/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38661/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38780/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39276/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40941/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40978/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41098/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44965/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44988/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46739/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46745/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46747/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53136/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53142/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p706"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,338 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/sm8150"; then
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-Steam/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.14/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.14/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0028.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0030.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.14/0032.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.14/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5754/^4.19/0157.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19252/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33246/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52486/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52504/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52746/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35950/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41007/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46745/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
editKernelLocalversion "-dos.p332"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,304 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/sm8250"; then
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/^5.1/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11149/camera-kernel/0004.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11150/camera-kernel/0003.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36782/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36783/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35118/camera-kernel/0004.patch --directory=techpack/camera
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26950/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26951/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26972/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44988/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50150/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50282/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53130/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53131/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53136/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53142/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p298"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -0,0 +1,290 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/oneplus/sm8350"; then
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/5.4/5.4.0205-0206.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46959/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46982/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47007/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47049/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47228/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47413/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47469/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/5.3-^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47535/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47599/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47618/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48713/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48720/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/5.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52530/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52561/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/5.4/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52879/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26676/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26780/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26885/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26921/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26961/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27004/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27033/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36909/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38538/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38544/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38588/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40953/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46754/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47692/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47712/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49868/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49878/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49879/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49962/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49995/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50006/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50007/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50008/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50017/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50076/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50082/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50096/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50099/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50116/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50117/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50127/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50131/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50134/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50142/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50143/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50148/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50150/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50151/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50167/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50168/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50171/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50179/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50180/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50184/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50186/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50195/3.17-^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50199/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50201/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50202/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50205/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50210/3.17-^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50218/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50228/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50229/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50230/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50233/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50234/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50236/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50237/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50251/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50262/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50264/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50265/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50267/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50269/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50273/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50279/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50282/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50287/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50290/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50292/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50295/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50296/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50299/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50301/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50302/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53057/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53060/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53061/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53063/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53066/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53101/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53103/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53104/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53112/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53121/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53127/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53138/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53140/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-53141/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47195/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
editKernelLocalversion "-dos.p284"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2024-12-05 #Last verified: 2024-12-05
patchAllKernels() { patchAllKernels() {
startPatcher "kernel_google_wahoo"; startPatcher "kernel_essential_msm8998 kernel_fairphone_sdm632 kernel_fairphone_sm7225 kernel_fxtec_msm8998 kernel_fxtec_sm6115 kernel_google_msm-4.9 kernel_google_msm-4.14 kernel_google_redbull kernel_google_wahoo kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_oneplus_sm8250 kernel_oneplus_sm8350";
} }
export -f patchAllKernels; export -f patchAllKernels;
@ -52,14 +52,52 @@ buildAll() {
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
#frontloaded for testing #frontloaded for testing
buildDevice taimen avb; buildDevice taimen avb;
buildDevice fajita avb;
buildDevice flame avb;
#SD835 #SD835
buildDevice walleye avb; buildDevice walleye avb;
buildDevice cheeseburger verity;
#Tensor #TODO: inline kernel building buildDevice dumpling verity;
buildDevice mata verity;
buildDevice pro1 avb;
#SD845
buildDevice enchilada avb;
buildDevice crosshatch avb;
buildDevice blueline avb;
#SD750
buildDevice FP4 avb;
#SD855
buildDevice guacamole avb;
buildDevice guacamoleb avb;
buildDevice hotdog avb;
buildDevice hotdogb avb;
buildDevice coral avb;
#SD730
buildDevice sunfish avb;
#SD632
buildDevice FP3 avb; #TODO: firmware
#SD865
buildDevice instantnoodle avb;
buildDevice instantnoodlep avb;
buildDevice kebab avb;
buildDevice lemonades avb;
#SD888
buildDevice lemonade avb;
buildDevice lemonadep avb;
#SD662
buildDevice pro1x avb;
#SD765
buildDevice avicii avb;
buildDevice bramble avb;
buildDevice redfin avb;
buildDevice barbet avb;
#SD670
buildDevice bonito avb;
buildDevice sargo avb;
#Tensor #TODO: replace the outdated prebuilt kernels
buildDevice bluejay avb;
buildDevice oriole avb; buildDevice oriole avb;
buildDevice raven avb; buildDevice raven avb;
buildDevice bluejay avb;
buildDevice panther avb; buildDevice panther avb;
buildDevice cheetah avb; buildDevice cheetah avb;
buildDevice lynx avb; buildDevice lynx avb;

View File

@ -401,6 +401,14 @@ fi;
# #
#START OF DEVICE CHANGES #START OF DEVICE CHANGES
# #
if enterAndClear "device/essential/mata"; then
echo "allow permissioncontroller_app tethering_service:service_manager find;" > sepolicy/private/permissioncontroller_app.te;
fi;
if enterAndClear "device/fxtec/pro1"; then
echo "type qti_debugfs, fs_type, debugfs_type;" >> sepolicy/vendor/file.te; #fixup
fi;
if enterAndClear "device/google/gs101"; then if enterAndClear "device/google/gs101"; then
git revert --no-edit adfcf46ec8c099e77cf58ec87d02bafc78a0d01e; #potential breakage git revert --no-edit adfcf46ec8c099e77cf58ec87d02bafc78a0d01e; #potential breakage
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then sed -i '/google iwlan/,+8d' device.mk; fi; #fix stray if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then sed -i '/google iwlan/,+8d' device.mk; fi; #fix stray
@ -418,6 +426,25 @@ if enterAndClear "device/google/gs-common"; then
rm -rfv widevine; rm -rfv widevine;
fi; fi;
if enterAndClear "device/google/redbull"; then
awk -i inplace '!/sctp/' BoardConfig-common.mk modules.load; #fix compile after hardenDefconfig
fi;
if enterAndClear "device/oneplus/msm8998-common"; then
#awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation
sed -i '/PRODUCT_SYSTEM_VERITY_PARTITION/iPRODUCT_VENDOR_VERITY_PARTITION := /dev/block/bootdevice/by-name/vendor' common.mk; #Support verity on /vendor too
awk -i inplace '!/vendor_sensors_dbg_prop/' sepolicy/vendor/hal_camera_default.te; #fixup
echo "type qti_debugfs, fs_type, debugfs_type;" >> sepolicy/vendor/file.te; #fixup
fi;
if enterAndClear "hardware/oplus"; then
echo "allow update_engine_common vendor_custom_ab_block_device:blk_file rw_file_perms;" >> sepolicy/qti/vendor/update_engine_common.te; #fix firmware flash
fi;
if enterAndClear "kernel/fairphone/sdm632"; then
sed -i 's|/../../prebuilts/tools-lineage|/../../../prebuilts/tools-lineage|' lib/Makefile; #fixup typo
fi;
#Make changes to all devices #Make changes to all devices
cd "$DOS_BUILD_BASE"; cd "$DOS_BUILD_BASE";
find "hardware/qcom/gps" -name "gps\.conf" -type f -print0 | xargs -0 -n 1 -P 4 -I {} bash -c 'hardenLocationConf "{}"'; find "hardware/qcom/gps" -name "gps\.conf" -type f -print0 | xargs -0 -n 1 -P 4 -I {} bash -c 'hardenLocationConf "{}"';
@ -443,6 +470,25 @@ sed -i 's/SSLv23_NO_TLSv1_2/TLSv1_2/' device/*/*/gps*xml* device/*/*/location/gp
cd "$DOS_BUILD_BASE"; cd "$DOS_BUILD_BASE";
#rm -rfv device/*/*/overlay/CarrierConfigResCommon device/*/*/rro_overlays/CarrierConfigOverlay device/*/*/overlay/packages/apps/CarrierConfig/res/xml/vendor.xml; #rm -rfv device/*/*/overlay/CarrierConfigResCommon device/*/*/rro_overlays/CarrierConfigOverlay device/*/*/overlay/packages/apps/CarrierConfig/res/xml/vendor.xml;
#Tweaks for 4GB RAM devices
#enableLowRam "device/essential/mata" "mata";
#enableLowRam "device/fairphone/FP3" "FP3";
#enableLowRam "device/google/bonito" "bonito";
#enableLowRam "device/google/bonito" "sargo";
#enableLowRam "device/google/crosshatch" "blueline";
#enableLowRam "device/google/crosshatch" "crosshatch";
#enableLowRam "device/google/muskie/walleye" "walleye";
#enableLowRam "device/google/taimen" "taimen";
#Fix broken options enabled by hardenDefconfig()
[[ -d kernel/fairphone/sdm632 ]] && sed -i "s/CONFIG_PREEMPT_TRACER=n/CONFIG_PREEMPT_TRACER=y/" kernel/fairphone/sdm632/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile
[[ -d kernel/google/msm-4.9 ]] && sed -i "s/CONFIG_DEBUG_NOTIFIERS=y/# CONFIG_DEBUG_NOTIFIERS is not set/" kernel/google/msm-4.9/arch/arm64/configs/*_defconfig; #Likely breaks boot
[[ -d kernel/google/msm-4.14 ]] && sed -i "s/CONFIG_FORTIFY_SOURCE=y/# CONFIG_FORTIFY_SOURCE is not set/" kernel/google/msm-4.14/arch/arm64/configs/*_defconfig; #breaks compile
[[ -d kernel/google/msm-4.14 ]] && sed -i "s/CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY=y/# CONFIG_MITIGATE_SPECTRE_BRANCH_HISTORY is not set/" kernel/google/msm-4.14/arch/arm64/configs/*_defconfig; #impartial backport
[[ -d kernel/oneplus/sm8150 ]] && echo -e "\nCONFIG_DEBUG_FS=y" >> kernel/oneplus/sm8150/arch/arm64/configs/vendor/sm8150-perf_defconfig; #compile failure
[[ -d kernel/oneplus/sm7250 ]] && echo -e "\nCONFIG_DEBUG_FS=n" >> kernel/oneplus/sm7250/arch/arm64/configs/vendor/lito-perf_defconfig; #compile failure
[[ -d kernel/oneplus/sm8250 ]] && echo -e "\nCONFIG_DEBUG_FS=n" >> kernel/oneplus/sm8250/arch/arm64/configs/vendor/kona-perf_defconfig; #vintf failure
if [ "$DOS_DEBLOBBER_REMOVE_EUICC_FULL" = false ]; then sed -i '/<privapp-permissions/a\ \ \ \ \ \ \ \ <deny-permission name="android.permission.INTERNET" \/>' vendor/*/*/proprietary/*/etc/permissions/com.google.euiccpixel.xml; fi; #Remove network permission if [ "$DOS_DEBLOBBER_REMOVE_EUICC_FULL" = false ]; then sed -i '/<privapp-permissions/a\ \ \ \ \ \ \ \ <deny-permission name="android.permission.INTERNET" \/>' vendor/*/*/proprietary/*/etc/permissions/com.google.euiccpixel.xml; fi; #Remove network permission
sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10 sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10
rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true; rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true;