From 8a45dc4696e690ca8686f9076c514eb6a131ad05 Mon Sep 17 00:00:00 2001 From: Tad Date: Thu, 6 Jan 2022 15:29:27 -0500 Subject: [PATCH] 18.1: Device additions h910 lavender pioneer, voyager, discovery akari, aurora, xz2c Signed-off-by: Tad --- Manifests/Manifest_LAOS-18.1.xml | 33 +- .../0006-Disable_Analytics.patch | 6 +- .../android_device_lge_mako/0001-LTE.patch | 2 +- .../0001-Captive_Portal_Toggle.patch | 4 +- .../0004-Private_DNS.patch | 4 +- Scripts/Common/Copy_Keys.sh | 14 + Scripts/Common/Enable_Verity.sh | 11 + Scripts/Common/Fix_CVE_Patchers.sh | 3 + Scripts/Common/Functions.sh | 2 +- .../android_kernel_sony_sdm660.sh | 294 ++++++++++++++ .../android_kernel_sony_sdm845.sh | 368 ++++++++++++++++++ .../android_kernel_xiaomi_sdm660.sh | 51 +++ Scripts/LineageOS-18.1/Functions.sh | 13 +- Scripts/LineageOS-18.1/Patch.sh | 4 +- Scripts/init.sh | 2 +- 15 files changed, 797 insertions(+), 14 deletions(-) create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index ccfd6cef..09253932 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -76,6 +76,9 @@ + + + @@ -153,10 +156,11 @@ - + + @@ -248,6 +252,28 @@ + + + + + + + + + + + + + + + + + + + + + + @@ -272,6 +298,11 @@ + + + + + diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch index 0d905c7e..6e2048ce 100644 --- a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch +++ b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch @@ -6,11 +6,11 @@ Subject: [PATCH] Disable/reduce functionality of various ad/analytics Change-Id: I84303ee26d0232e471f44ae6eff6e41a2210e42e --- - core/java/android/content/pm/PackageParser.java | 14 ++++++++++++++ - 1 file changed, 14 insertions(+) + .../android/content/pm/PackageParser.java | 56 +++++++++++++++++++ + 1 file changed, 56 insertions(+) diff --git a/core/java/android/content/pm/PackageParser.java b/core/java/android/content/pm/PackageParser.java -index 861b0d922d32..a9ad5aac0f0d 100644 +index 861b0d922d32..1a93325f24ff 100644 --- a/core/java/android/content/pm/PackageParser.java +++ b/core/java/android/content/pm/PackageParser.java @@ -5598,6 +5598,62 @@ public class PackageParser { diff --git a/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch b/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch index eb9b0a74..82a5e9c7 100644 --- a/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch +++ b/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch @@ -12,7 +12,7 @@ Change-Id: I36cbd7ce1a070201da24dc237154355e780d01b4 create mode 100644 overlay/packages/services/Telephony/res/values/config.xml diff --git a/overlay/frameworks/base/core/res/res/values/config.xml b/overlay/frameworks/base/core/res/res/values/config.xml -index 9f37d0a..2220fca 100644 +index 8924e2a..2e7ba44 100644 --- a/overlay/frameworks/base/core/res/res/values/config.xml +++ b/overlay/frameworks/base/core/res/res/values/config.xml @@ -178,7 +178,7 @@ diff --git a/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch b/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch index 3b35883b..a35ef178 100644 --- a/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch +++ b/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch @@ -40,10 +40,10 @@ index ce8ba8c6eb..96223a68ce 100644 + Nach dem Ausschalten der Captive-Portal-Erkennung empfangen Sie keine Verbindungs-Rückmeldung mehr. Wirklich fortfahren? diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml -index 1c78816577..c35c696b16 100644 +index ab38dec706..6c81254ce2 100644 --- a/res/values/cm_strings.xml +++ b/res/values/cm_strings.xml -@@ -172,4 +172,9 @@ +@@ -175,4 +175,9 @@ Automatically raises the refresh rate from 60 to %1$d Hz for some content. Increases battery usage. diff --git a/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch b/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch index e314e5f3..4b89f958 100644 --- a/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch +++ b/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch @@ -84,10 +84,10 @@ index 0b4f4db6c4..ca6a2cf62d 100644 android:id="@+id/private_dns_mode_opportunistic" layout="@layout/preference_widget_dialog_radiobutton"/> diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml -index c35c696b16..0523c1a276 100644 +index 6c81254ce2..86fd2bd6c6 100644 --- a/res/values/cm_strings.xml +++ b/res/values/cm_strings.xml -@@ -134,6 +134,21 @@ +@@ -137,6 +137,21 @@ Scramble layout Scramble PIN layout when unlocking device diff --git a/Scripts/Common/Copy_Keys.sh b/Scripts/Common/Copy_Keys.sh index f3e45cdd..3c626ee5 100644 --- a/Scripts/Common/Copy_Keys.sh +++ b/Scripts/Common/Copy_Keys.sh @@ -20,10 +20,12 @@ source "$DOS_SCRIPTS_COMMON/Shell.sh"; if [ -d "$DOS_SIGNING_KEYS" ]; then echo "Copying verity/avb public keys to kernels..."; +cat "$DOS_SIGNING_KEYS/akari/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/alioth/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/Amber/verity.x509.pem" >> "kernel/yandex/sdm660/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/angler/verity.x509.pem" >> "kernel/huawei/angler/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/aura/verity.x509.pem" >> "kernel/razer/sdm845/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/aurora/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/avicii/verity.x509.pem" >> "kernel/oneplus/sm7250/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/beryllium/verity.x509.pem" >> "kernel/xiaomi/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/blueline/verity.x509.pem" >> "kernel/google/crosshatch/certs/verity.x509.pem"; @@ -38,6 +40,7 @@ cat "$DOS_SIGNING_KEYS/coral/verity.x509.pem" >> "kernel/google/coral/certs/veri cat "$DOS_SIGNING_KEYS/crosshatch/verity.x509.pem" >> "kernel/google/crosshatch/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/crosshatch/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/davinci/verity.x509.pem" >> "kernel/xiaomi/sm6150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/discovery/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/dragon/verity.x509.pem" >> "kernel/google/dragon/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/dumpling/verity.x509.pem" >> "kernel/oneplus/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/enchilada/verity.x509.pem" >> "kernel/oneplus/sdm845/certs/verity.x509.pem"; @@ -50,10 +53,12 @@ cat "$DOS_SIGNING_KEYS/guacamoleb/verity.x509.pem" >> "kernel/oneplus/sm8150/cer cat "$DOS_SIGNING_KEYS/guacamole/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/hotdogb/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/hotdog/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/lavender/verity.x509.pem" >> "kernel/xiaomi/sdm660/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/lmi/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/marlin/verity.x509.pem" >> "kernel/google/marlin/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/mata/verity.x509.pem" >> "kernel/essential/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/oneplus3/verity.x509.pem" >> "kernel/oneplus3/msm8996/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/pioneer/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/pro1/verity.x509.pem" >> "kernel/fxtec/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/raphael/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/redfin/verity.x509.pem" >> "kernel/google/redbull/certs/verity.x509.pem"; @@ -66,14 +71,18 @@ cat "$DOS_SIGNING_KEYS/shamu/verity.x509.pem" >> "kernel/moto/shamu/certs/verity cat "$DOS_SIGNING_KEYS/sunfish/verity.x509.pem" >> "kernel/google/sunfish/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/taimen/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/vayu/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/voyager/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/walleye/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/xz2c/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/z2_plus/verity.x509.pem" >> "kernel/zuk/msm8996/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/zenfone3/verity.x509.pem" >> "kernel/asus/msm8953/certs/verity.x509.pem"; +cp -v "$DOS_SIGNING_KEYS/akari/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_akari_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/alioth/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_alioth_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/Amber/verifiedboot_relkeys.der.x509" "kernel/yandex/sdm660/verifiedboot_Amber_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/angler/verifiedboot_relkeys.der.x509" "kernel/huawei/angler/verifiedboot_angler_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/aura/verifiedboot_relkeys.der.x509" "kernel/razer/sdm845/verifiedboot_aura_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/aurora/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_aurora_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/avicii/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm7250/verifiedboot_avicii_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/beryllium/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sdm845/verifiedboot_beryllium_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/blueline/verifiedboot_relkeys.der.x509" "kernel/google/crosshatch/verifiedboot_blueline_dos_relkeys.der.x509"; @@ -88,6 +97,7 @@ cp -v "$DOS_SIGNING_KEYS/coral/verifiedboot_relkeys.der.x509" "kernel/google/cor cp -v "$DOS_SIGNING_KEYS/crosshatch/verifiedboot_relkeys.der.x509" "kernel/google/crosshatch/verifiedboot_crosshatch_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/crosshatch/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_crosshatch_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/davinci/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm6150/verifiedboot_davinci_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/discovery/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_discovery_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/dragon/verifiedboot_relkeys.der.x509" "kernel/google/dragon/verifiedboot_dragon_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/dumpling/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8998/verifiedboot_dumpling_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/enchilada/verifiedboot_relkeys.der.x509" "kernel/oneplus/sdm845/verifiedboot_enchilada_dos_relkeys.der.x509"; @@ -100,10 +110,12 @@ cp -v "$DOS_SIGNING_KEYS/guacamoleb/verifiedboot_relkeys.der.x509" "kernel/onepl cp -v "$DOS_SIGNING_KEYS/guacamole/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_guacamole_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/hotdogb/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdogb_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/hotdog/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdog_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/lavender/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sdm660/verifiedboot_lavender_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/lmi/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_lmi_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/marlin/verifiedboot_relkeys.der.x509" "kernel/google/marlin/verifiedboot_marlin_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/mata/verifiedboot_relkeys.der.x509" "kernel/essential/msm8998/verifiedboot_mata_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/oneplus3/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8996/verifiedboot_oneplus3_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/pioneer/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_pioneer_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/pro1/verifiedboot_relkeys.der.x509" "kernel/fxtec/msm8998/verifiedboot_pro1_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/raphael/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_raphael_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/redfin/verifiedboot_relkeys.der.x509" "kernel/google/redbull/verifiedboot_redfin_dos_relkeys.der.x509"; @@ -116,7 +128,9 @@ cp -v "$DOS_SIGNING_KEYS/shamu/verifiedboot_relkeys.der.x509" "kernel/moto/shamu cp -v "$DOS_SIGNING_KEYS/sunfish/verifiedboot_relkeys.der.x509" "kernel/google/sunfish/verifiedboot_sunfish_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/taimen/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_taimen_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/vayu/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_vayu_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/voyager/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_voyager_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/walleye/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_walleye_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/xz2c/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_xz2c_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/z2_plus/verifiedboot_relkeys.der.x509" "kernel/zuk/msm8996/verifiedboot_z2_plus_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/zenfone3/verifiedboot_relkeys.der.x509" "kernel/asus/msm8953/verifiedboot_zenfone3_dos_relkeys.der.x509"; echo -e "\e[0;32m[SCRIPT COMPLETE] Copied keys to kernels\e[0m"; diff --git a/Scripts/Common/Enable_Verity.sh b/Scripts/Common/Enable_Verity.sh index b6c7d3df..31d6b010 100644 --- a/Scripts/Common/Enable_Verity.sh +++ b/Scripts/Common/Enable_Verity.sh @@ -57,9 +57,14 @@ enableVerity "device/oneplus/dumpling"; enableVerity "device/oneplus/msm8998-common"; enableVerity "device/oneplus/oneplus3"; enableVerity "device/razer/cheryl"; +#enableVerity "device/sony/discovery"; +#enableVerity "device/sony/nile-common"; +#enableVerity "device/sony/pioneer"; +#enableVerity "device/sony/voyager"; enableVerity "device/yandex/Amber"; enableVerity "device/zuk/msm8996-common"; enableVerity "device/zuk/z2_plus"; + enableAVB "device/fairphone/FP3"; enableAVB "device/fxtec/pro1"; enableAVB "device/google/blueline"; @@ -86,11 +91,17 @@ enableAVB "device/oneplus/hotdogb"; enableAVB "device/oneplus/sdm845-common"; enableAVB "device/oneplus/sm8150-common"; enableAVB "device/razer/aura"; +enableAVB "device/sony/akari"; +enableAVB "device/sony/aurora"; +enableAVB "device/sony/tama-common"; +enableAVB "device/sony/xz2c"; enableAVB "device/xiaomi/alioth"; enableAVB "device/xiaomi/beryllium"; enableAVB "device/xiaomi/davinci"; +enableAVB "device/xiaomi/lavender"; enableAVB "device/xiaomi/lmi"; enableAVB "device/xiaomi/raphael"; +enableAVB "device/xiaomi/sdm660-common"; enableAVB "device/xiaomi/sdm845-common"; enableAVB "device/xiaomi/sm6150-common"; enableAVB "device/xiaomi/sm8150-common"; diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index 51b110c6..f54cb0fa 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -85,7 +85,10 @@ commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463 commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127"; commentPatches android_kernel_samsung_universal8890.sh "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166"; commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749"; +commentPatches android_kernel_sony_sdm660.sh "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166"; +commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992"; commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166"; +commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening/4.4/0019.patch"; commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch"; commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600"; commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166"; diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index 2a4003f6..31e54436 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -689,7 +689,7 @@ getDefconfig() { else #grep TARGET_KERNEL_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u #grep TARGET_KERNEL_VARIANT_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_VARIANT_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u - local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig"; + local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig"; fi; echo $defconfigPath; } diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh new file mode 100644 index 00000000..09da306f --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -0,0 +1,294 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/sony/sdm660" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0233-0234.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0288-0289.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0023.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0026.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0027.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0028.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0029.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0030.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch +editKernelLocalversion "-dos.p290" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh new file mode 100644 index 00000000..14b2c649 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -0,0 +1,368 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/sony/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0286-0287.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0052.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10565/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19037/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0026.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0027.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0028.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0029.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0030.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11125/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11125/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11162/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11174/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11225/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11240/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1939/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1941/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1945/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1962/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/^5.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch +editKernelLocalversion "-dos.p364" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh new file mode 100644 index 00000000..bbcdc923 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -0,0 +1,51 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm660" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0296-0297.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch +editKernelLocalversion "-dos.p47" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index 061dd2df..13fca97b 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996"; + startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_sony_sdm660 kernel_sony_sdm845 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996"; } export -f patchAllKernels; @@ -80,10 +80,16 @@ buildAll() { #SD820 buildDevice h850; buildDevice rs988; + buildDevice h910; buildDevice h990; buildDevice us996; buildDevice oneplus3 verity; #needs manual patching - broken yyloc buildDevice z2_plus verity; + #SD630 + buildDevice pioneer; + buildDevice voyager; + buildDevice discovery; + buildDevice lavender avb; #SD835 buildDevice cheryl verity; buildDevice cheeseburger verity; @@ -99,6 +105,9 @@ buildAll() { buildDevice blueline avb; buildDevice enchilada avb; #XXX: uses stock /vendor buildDevice fajita avb; #XXX: uses stock /vendor + buildDevice akari avb; + buildDevice aurora avb; + buildDeivce xz2c avb; #SD632 buildDevice FP3 avb; #SD730 @@ -139,6 +148,8 @@ patchWorkspace() { #repopick -i 320663; #Trebuchet: Don't hide home screen rotation setting #repopick -i 320914 320917; #Settings: Make PIN scramble user specific #repopick -i 320921; #Revert "Remove dependency on IME subtype from TSMS" + #repopick -i 321297; #fs_mgr: Don't enable clean_scratch_files on non-dynamic devices + #repopick -it R_asb_2022-01; sh "$DOS_SCRIPTS/Patch.sh"; sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh"; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index d009170f..da54b535 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -332,14 +332,14 @@ echo "allow hwaddrs self:capability { fowner };" >> sepolicy/hwaddrs.te; echo "allow hwaddrs block_device:lnk_file { open };" >> sepolicy/hwaddrs.te; echo "allow hwaddrs misc_block_device:blk_file { open read };" >> sepolicy/hwaddrs.te; sed -i '1itypeattribute wcnss_service misc_block_device_exception;' sepolicy/wcnss_service.te; -echo "/sys/devices/qpnp-rtc-[a-f0-9]+/rtc/rtc0(/.*)? u:object_r:sysfs_rtc:s0" >> sepolicy/file_contexts; #https://gitlab.com/LineageOS/issues/android/-/issues/3889 fi; if enterAndClear "device/lge/mako"; then applyPatch "$DOS_PATCHES/android_device_lge_mako/0001-LTE.patch"; #Enable LTE support +rm overlay/packages/apps/CarrierConfig/res/xml/vendor.xml; echo "pmf=0" >> wifi/wpa_supplicant_overlay.conf; #Wi-Fi chipset doesn't support PMF awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools -sed -i 's/bdAddrLoader/bdAddrLoader-mako/' device.mk bdAddrLoader/Android.bp bdAddrLoader/addrloader.c rootdir/etc/init.mako.bt.sh sepolicy/file_contexts; #Fix conflicts +sed -i 's/bdAddrLoader/bdAddrLoader-mako/' device.mk bdAddrLoader/Android.bp bdAddrLoader/addrloader.c rootdir/etc/init.mako.bt.sh sepolicy/vendor/file_contexts; #Fix conflicts sed -i 's|/bdAddrLoader|/bdAddrLoader-mako|' rootdir/etc/init.mako.rc; sed -i '16iifeq ($(TARGET_DEVICE),mako)' sensors/Android.mk; echo "endif" >> sensors/Android.mk; diff --git a/Scripts/init.sh b/Scripts/init.sh index 184f4060..c955d03e 100644 --- a/Scripts/init.sh +++ b/Scripts/init.sh @@ -79,7 +79,7 @@ export DOS_GPS_SUPL_HOST="supl.google.com"; #Options: supl.{google,vodafone,sony #Release Processing export DOS_MALWARE_SCAN_BEFORE_SIGN=false; #Scan device files for malware before signing export DOS_GENERATE_DELTAS=true; #Creates deltas from existing target_files in $DOS_BUILDS -export DOS_GENERATE_DELTAS_DEVICES=('Amber' 'alioth' 'aura' 'avicii' 'blueline' 'bonito' 'bramble' 'cheryl' 'coral' 'crosshatch' 'davinci' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pro1' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'walleye'); #List of devices deltas will be generated for +export DOS_GENERATE_DELTAS_DEVICES=('akari' 'alioth' 'Amber' 'aura' 'aurora' 'avicii' 'blueline' 'bonito' 'bramble' 'cheryl' 'coral' 'crosshatch' 'davinci' 'discovery' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pioneer' 'pro1' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'voyager' 'walleye' 'xz2c'); #List of devices deltas will be generated for export DOS_AUTO_ARCHIVE_BUILDS=true; #Copies files to $DOS_BUILDS after signing export DOS_REMOVE_AFTER=true; #Removes device OUT directory after complete to reclaim space. Requires AUTO_ARCHIVE_BUILDS=true export DOS_GPG_SIGNING=true;