diff --git a/Manifests/Manifest_LAOS-16.0.xml b/Manifests/Manifest_LAOS-16.0.xml
index 3b1da3aa..72012a8f 100644
--- a/Manifests/Manifest_LAOS-16.0.xml
+++ b/Manifests/Manifest_LAOS-16.0.xml
@@ -111,14 +111,6 @@
-
-
-
-
-
-
-
-
@@ -129,7 +121,6 @@
-
diff --git a/Manifests/Manifest_LAOS-17.1.xml b/Manifests/Manifest_LAOS-17.1.xml
index ba1bbe69..4ae6c090 100644
--- a/Manifests/Manifest_LAOS-17.1.xml
+++ b/Manifests/Manifest_LAOS-17.1.xml
@@ -98,25 +98,12 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -136,7 +123,6 @@
-
diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml
index 79c5de56..43b2485e 100644
--- a/Manifests/Manifest_LAOS-18.1.xml
+++ b/Manifests/Manifest_LAOS-18.1.xml
@@ -147,6 +147,10 @@
+
+
+
+
diff --git a/Manifests/Manifest_LAOS-20.0.xml b/Manifests/Manifest_LAOS-20.0.xml
index 7fdee42a..bc38ce9b 100644
--- a/Manifests/Manifest_LAOS-20.0.xml
+++ b/Manifests/Manifest_LAOS-20.0.xml
@@ -66,6 +66,10 @@
+
+
+
+
@@ -195,6 +199,19 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -206,6 +223,11 @@
+
+
+
+
+
@@ -216,6 +238,7 @@
+
@@ -249,8 +272,14 @@
+
+
+
+
+
+
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch b/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
index 2d6818d1..0295e3c5 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
@@ -8,7 +8,7 @@ Subject: [PATCH] use permanent fingerprint lockout immediately
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/services/core/java/com/android/server/biometrics/fingerprint/FingerprintService.java b/services/core/java/com/android/server/biometrics/fingerprint/FingerprintService.java
-index 2159f6f2f861..4e06c591a896 100644
+index 2159f6f2f861..2adf316bb8a9 100644
--- a/services/core/java/com/android/server/biometrics/fingerprint/FingerprintService.java
+++ b/services/core/java/com/android/server/biometrics/fingerprint/FingerprintService.java
@@ -103,7 +103,7 @@ public class FingerprintService extends BiometricServiceBase {
diff --git a/Scripts/Common/Copy_Keys.sh b/Scripts/Common/Copy_Keys.sh
index 71c00f0a..e51014f9 100644
--- a/Scripts/Common/Copy_Keys.sh
+++ b/Scripts/Common/Copy_Keys.sh
@@ -96,6 +96,7 @@ if [ -d "$DOS_SIGNING_KEYS" ]; then
copyKey "panther" "kernel/google/gs201/private/gs-google";
copyKey "pioneer" "kernel/sony/sdm660";
copyKey "pro1" "kernel/fxtec/msm8998";
+ copyKey "pro1x" "kernel/fxtec/sm6115";
copyKey "raphael" "kernel/xiaomi/sm8150";
copyKey "raven" "kernel/google/gs101/private/gs-google";
copyKey "raven" "kernel/google/raviole";
diff --git a/Scripts/Common/Enable_Verity.sh b/Scripts/Common/Enable_Verity.sh
index 90e5b3af..2ed25a89 100644
--- a/Scripts/Common/Enable_Verity.sh
+++ b/Scripts/Common/Enable_Verity.sh
@@ -100,6 +100,7 @@ enableVerity "device/zuk/z2_plus";
enableAVB "device/fairphone/FP3";
enableAVB "device/fairphone/FP4";
enableAVB "device/fxtec/pro1";
+enableAVB "device/fxtec/pro1x";
enableAVB "device/google/barbet";
enableAVB "device/google/bluejay";
enableAVB "device/google/blueline";
@@ -196,6 +197,7 @@ sed -i 's/^\treturn VERITY_STATE_DISABLE;//' kernel/*/*/drivers/md/dm-android-ve
[[ -d device/fairphone/FP3 ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/fairphone/FP3/system.prop &>/dev/null || true;
[[ -d device/fairphone/FP4 ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/fairphone/FP4/system.prop &>/dev/null || true;
[[ -d device/fxtec/pro1 ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/fxtec/pro1/system.prop &>/dev/null || true;
+[[ -d device/fxtec/pro1x ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/fxtec/pro1x/system.prop &>/dev/null || true;
[[ -d device/google/bluejay ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/google/bluejay/vendor.prop &>/dev/null || true;
[[ -d device/google/bonito ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/google/bonito/vendor.prop &>/dev/null || true;
[[ -d device/google/coral ]] && sed -zi '/ro.oem_unlock_supported=1/!s/$/\nro.oem_unlock_supported=1/' device/google/coral/vendor.prop &>/dev/null || true;
diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh
index 0f468575..4639ccea 100644
--- a/Scripts/Common/Fix_CVE_Patchers.sh
+++ b/Scripts/Common/Fix_CVE_Patchers.sh
@@ -47,6 +47,7 @@ commentPatches android_kernel_fairphone_msm8974.sh "CVE-2018-20169";
commentPatches android_kernel_fairphone_sdm632.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-3347" "CVE-2021-20322";
commentPatches android_kernel_fairphone_sm7225.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2022-1184/^5.18/0001.patch" "CVE-2021-3600";
commentPatches android_kernel_fxtec_msm8998.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-11599" "CVE-2019-16746" "CVE-2019-18282" "CVE-2019-19319" "CVE-2019-ctnl-addr-leak" "CVE-2020-0429" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166";
+commentPatches android_kernel_fxtec_sm6115.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2021-3600";
commentPatches android_kernel_google_bonito.sh "CVE-2020-0067";
commentPatches android_kernel_google_coral.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324";
commentPatches android_kernel_google_dragon.sh "0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" "0008-Graphene-Kernel_Hardening-ro" "CVE-2015-4167" "CVE-2017-15951" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214" "CVE-2021-39715/ANY/0001.patch";
@@ -91,10 +92,11 @@ commentPatches android_kernel_samsung_msm8930-common.sh "CVE-2017-11015/prima" "
commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463/ANY/0001.patch";
commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
+commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305";
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
-commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
+commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-25715";
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";
commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch";
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-22075";
@@ -123,7 +125,7 @@ do
commentPatches $script "CVE-2016-1583/3.18" "CVE-2018-17972/3.18" "CVE-2018-20169/3.18" "CVE-2019-2214/3.18" "CVE-2020-0427/3.18" "CVE-2021-21781/3.18" "CVE-2022-40768/4.4";
done
#3.18
-declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh");
+declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh");
for script in "${threeDotEighteen[@]}"
do
commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4";
@@ -135,7 +137,7 @@ declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm89
# commentPatches $script ""; #handle 4.9
#done
#4.9
-declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_sdm845.sh");
+declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_exynos9810.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_xiaomi_sdm845.sh");
for script in "${fourDotNine[@]}"
do
commentPatches $script "CVE-2018-11412/4.14" "CVE-2020-0067/4.14" "CVE-2022-1204/4.14" "CVE-2023-0461/4.14"; #handle 4.14
diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh
index 9225ef42..a48e0ecc 100644
--- a/Scripts/Common/Functions.sh
+++ b/Scripts/Common/Functions.sh
@@ -349,7 +349,7 @@ processRelease() {
#Deltas
#grep update_engine Build/*/device/*/*/*.mk -l
- local DOS_GENERATE_DELTAS_DEVICES=('akari' 'alioth' 'Amber' 'aura' 'aurora' 'avicii' 'barbet' 'bluejay' 'blueline' 'bonito' 'bramble' 'cheetah' 'cheryl' 'coral' 'crosshatch' 'davinci' 'discovery' 'enchilada' 'fajita' 'flame' 'FP3' 'FP4' 'guacamole' 'guacamoleb' 'hotdog' 'hotdogb' 'instantnoodle' 'instantnoodlep' 'kebab' 'lemonade' 'lemonadep' 'marlin' 'mata' 'oriole' 'panther' 'pioneer' 'pro1' 'raven' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'voyager' 'walleye' 'xz2c'); #TODO: check lmi/alioth
+ local DOS_GENERATE_DELTAS_DEVICES=('akari' 'alioth' 'Amber' 'aura' 'aurora' 'avicii' 'barbet' 'bluejay' 'blueline' 'bonito' 'bramble' 'cheetah' 'cheryl' 'coral' 'crosshatch' 'davinci' 'discovery' 'enchilada' 'fajita' 'flame' 'FP3' 'FP4' 'guacamole' 'guacamoleb' 'hotdog' 'hotdogb' 'instantnoodle' 'instantnoodlep' 'kebab' 'lemonade' 'lemonadep' 'marlin' 'mata' 'oriole' 'panther' 'pioneer' 'pro1' 'pro1x' 'raven' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'voyager' 'walleye' 'xz2c'); #TODO: check lmi/alioth
if [ "$DOS_GENERATE_DELTAS" = true ]; then
if [[ " ${DOS_GENERATE_DELTAS_DEVICES[@]} " =~ " ${DEVICE} " ]]; then
for LAST_TARGET_FILES in $ARCHIVE/target_files/$DOS_BRANDING_ZIP_PREFIX-$VERSION-*-dos-$DEVICE-target_files.zip; do
@@ -577,8 +577,8 @@ export -f hardenUserdata;
enableAutoVarInit() {
#grep TARGET_KERNEL_CLANG_COMPILE Build/*/device/*/*/*.mk -l
#but exclude: grep INIT_STACK_ALL_ZERO Build/*/kernel/*/*/security/Kconfig.hardening -l
- #already supported: fairphone/sm7225, google/bluejay, google/gs101, google/gs201, google/msm-4.14, google/raviole, google/redbull, oneplus/sm8250, oneplus/sm8350
- local DOS_AUTOVARINIT_KERNELS=('essential/msm8998' 'fairphone/sdm632' 'fxtec/msm8998' 'google/coral' 'google/msm-4.9' 'google/sunfish' 'google/wahoo' 'oneplus/msm8996' 'oneplus/msm8998' 'oneplus/sdm845' 'oneplus/sm7250' 'oneplus/sm8150' 'razer/msm8998' 'razer/sdm845' 'samsung/universal9810' 'sony/sdm660' 'sony/sdm845' 'xiaomi/sdm660' 'xiaomi/sdm845' 'xiaomi/sm6150' 'xiaomi/sm8150' 'xiaomi/sm8250' 'zuk/msm8996');
+ #already supported: fairphone/sm7225, fxtec/sm6115, google/bluejay, google/gs101, google/gs201, google/msm-4.14, google/raviole, google/redbull, oneplus/sm8250, oneplus/sm8350
+ local DOS_AUTOVARINIT_KERNELS=('essential/msm8998' 'fairphone/sdm632' 'fxtec/msm8998' 'google/coral' 'google/msm-4.9' 'google/sunfish' 'google/wahoo' 'oneplus/msm8996' 'oneplus/msm8998' 'oneplus/sdm845' 'oneplus/sm7250' 'oneplus/sm8150' 'razer/msm8998' 'razer/sdm845' 'samsung/exynos9810' 'samsung/universal9810' 'sony/sdm660' 'sony/sdm845' 'xiaomi/msm8937' 'xiaomi/sdm660' 'xiaomi/sdm845' 'xiaomi/sm6150' 'xiaomi/sm8150' 'xiaomi/sm8250' 'zuk/msm8996');
cd "$DOS_BUILD_BASE";
echo "auto-var-init: Starting!";
for kernel in "${DOS_AUTOVARINIT_KERNELS[@]}"
@@ -820,7 +820,7 @@ getDefconfig() {
else
#grep TARGET_KERNEL_CONFIG Build/*/device/ -Rih | sed 's|TARGET_KERNEL_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u
#grep TARGET_KERNEL_VARIANT_CONFIG Build/*/device/ -Rih | sed 's|TARGET_KERNEL_VARIANT_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u
- local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/vendor/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/cloudripper_gki_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-hero2lte_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/exynos9810-star2lte_defconfig arch/arm*/configs/exynos9810-starlte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/FP4_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_att_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/jf_spr_defconfig arch/arm*/configs/jf_vzw_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/m8dug_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/slider_gki_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/kona-perf_defconfig arch/arm*/configs/vendor/lahaina-qgki_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/vendor/xiaomi/beryllium.config arch/arm*/configs/vendor/xiaomi/mi845_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig ";
+ local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/vendor/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/cloudripper_gki_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-hero2lte_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/exynos9810-crownlte_defconfig arch/arm*/configs/exynos9810-star2lte_defconfig arch/arm*/configs/exynos9810-starlte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/FP4_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_att_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/jf_spr_defconfig arch/arm*/configs/jf_vzw_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/m8dug_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/slider_gki_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/kona-perf_defconfig arch/arm*/configs/vendor/lahaina-qgki_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/vendor/xiaomi/beryllium.config arch/arm*/configs/vendor/xiaomi/mi845_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig";
fi;
echo $defconfigPath;
}
@@ -965,7 +965,7 @@ hardenDefconfig() {
optionsYes+=("HID_GENERIC" "HID_STEAM" "HID_SONY" "HID_WIIMOTE" "INPUT_JOYSTICK" "JOYSTICK_XPAD" "USB_USBNET" "USB_NET_CDCETHER");
#grep INIT_ON_ALLOC_DEFAULT_ON Build/*/kernel/*/*/security/Kconfig.hardening -l
- modernKernels=('fairphone/sm7225' 'google/barbet' 'google/bluejay' 'google/coral' 'google/gs101' 'google/gs201' 'google/msm-4.14' 'google/raviole' 'google/redbull' 'google/sunfish' 'oneplus/sm8150' 'oneplus/sm8250' 'oneplus/sm8350' 'xiaomi/sm8150' 'xiaomi/sm8250');
+ modernKernels=('fairphone/sm7225' 'fxtec/sm6115' 'google/barbet' 'google/bluejay' 'google/coral' 'google/gs101' 'google/gs201' 'google/msm-4.14' 'google/raviole' 'google/redbull' 'google/sunfish' 'oneplus/sm8150' 'oneplus/sm8250' 'oneplus/sm8350' 'xiaomi/sm8150' 'xiaomi/sm8250');
for kernelModern in "${modernKernels[@]}"; do
if [[ "$1" == *"/$kernelModern"* ]]; then
optionsYes+=("INIT_ON_ALLOC_DEFAULT_ON" "INIT_ON_FREE_DEFAULT_ON");
@@ -973,7 +973,7 @@ hardenDefconfig() {
done;
#excluding above: grep PAGE_POISONING_ENABLE_DEFAULT Build/*/kernel/*/*/mm/Kconfig.debug -l
- oldKernels=('essential/msm8998' 'fairphone/sdm632' 'fxtec/msm8998' 'google/msm-4.9' 'oneplus/msm8998' 'oneplus/sdm845' 'oneplus/sm7250' 'razer/msm8998' 'razer/sdm845' 'sony/sdm660' 'sony/sdm845' 'xiaomi/sdm660' 'xiaomi/sdm845' 'xiaomi/sm6150' 'yandex/sdm660' 'zuk/msm8996');
+ oldKernels=('essential/msm8998' 'fairphone/sdm632' 'fxtec/msm8998' 'google/msm-4.9' 'oneplus/msm8998' 'oneplus/sdm845' 'oneplus/sm7250' 'razer/msm8998' 'razer/sdm845' 'sony/sdm660' 'sony/sdm845' 'xiaomi/msm8937' 'xiaomi/sdm660' 'xiaomi/sdm845' 'xiaomi/sm6150' 'yandex/sdm660' 'zuk/msm8996');
for kernelOld in "${oldKernels[@]}"; do
if [[ "$1" == *"/$kernelOld"* ]]; then
optionsYes+=("PAGE_POISONING_ENABLE_DEFAULT");
diff --git a/Scripts/Generate_Supporting_Files.sh b/Scripts/Generate_Supporting_Files.sh
index 8fd7fa57..9831ed3c 100644
--- a/Scripts/Generate_Supporting_Files.sh
+++ b/Scripts/Generate_Supporting_Files.sh
@@ -23,7 +23,7 @@ export copyPartsZip="/mnt/backup-1/DOS/Builds/Extras/copy-partitions-20210323_19
export repoDir="/mnt/backup-1/DOS/Builds/Supporting_Files/";
mkdir -p $repoDir;
-devicesCopy=(akari alioth Amber aura aurora avicii barbet bluejay blueline bonito bramble cheetah cheryl coral crosshatch davinci discovery enchilada fajita flame FP3 FP4 guacamole guacamoleb hotdog hotdogb instantnoodle instantnoodlep kebab lemonade lemonadep marlin mata oriole panther pioneer pro1 raven redfin sailfish sargo sunfish taimen voyager walleye xz2c);
+devicesCopy=(akari alioth Amber aura aurora avicii barbet bluejay blueline bonito bramble cheetah cheryl coral crosshatch davinci discovery enchilada fajita flame FP3 FP4 guacamole guacamoleb hotdog hotdogb instantnoodle instantnoodlep kebab lemonade lemonadep marlin mata oriole panther pioneer pro1 pro1x raven redfin sailfish sargo sunfish taimen voyager walleye xz2c);
for device in "${devicesCopy[@]}"
do
@@ -34,7 +34,7 @@ do
fi;
done;
-devicesAVB=(akari alioth Amber aura aurora avicii barbet beryllium bluejay blueline bonito bramble cheetah coral crosshatch davinci enchilada fajita flame FP3 FP4 guacamole guacamoleb hotdog hotdogb instantnoodle instantnoodlep kebab lavender lemonade lemonadep lmi oriole panther pro1 raphael raven redfin sargo sunfish taimen vayu walleye xz2c);
+devicesAVB=(akari alioth Amber aura aurora avicii barbet beryllium bluejay blueline bonito bramble cheetah coral crosshatch davinci enchilada fajita flame FP3 FP4 guacamole guacamoleb hotdog hotdogb instantnoodle instantnoodlep kebab lavender lemonade lemonadep lmi oriole panther pro1 pro1x raphael raven redfin sargo sunfish taimen vayu walleye xz2c);
for device in "${devicesAVB[@]}"
do
diff --git a/Scripts/Generate_Verified_Boot_Hashes.sh b/Scripts/Generate_Verified_Boot_Hashes.sh
index f9897a40..eb2e98e0 100644
--- a/Scripts/Generate_Verified_Boot_Hashes.sh
+++ b/Scripts/Generate_Verified_Boot_Hashes.sh
@@ -20,7 +20,7 @@ set -uo pipefail;
#grep "verity\.mk" Build/*/device/*/*/*.mk -l
VERITY_DEVICES=('Amber' 'angler' 'bullhead' 'cheeseburger' 'cheryl' 'discovery' 'dragon' 'dumpling' 'flounder' 'marlin' 'mata' 'oneplus3' 'pioneer' 'sailfish' 'shamu' 'voyager' 'z2_plus');
#grep "AVB_ENABLE" Build/*/device/*/*/*.mk -l
-AVB_DEVICES=('akari' 'alioth' 'aura' 'aurora' 'avicii' 'barbet' 'beryllium' 'bluejay' 'blueline' 'bonito' 'bramble' 'cheetah' 'coral' 'crosshatch' 'davinci' 'enchilada' 'fajita' 'flame' 'FP3' 'FP4' 'guacamole' 'guacamoleb' 'hotdog' 'hotdogb' 'instantnoodle' 'instantnoodlep' 'kebab' 'lavender' 'lemonade' 'lemonadep' 'lmi' 'oriole' 'panther' 'pro1' 'raphael' 'raven' 'redfin' 'sargo' 'sunfish' 'taimen' 'vayu' 'walleye' 'xz2c');
+AVB_DEVICES=('akari' 'alioth' 'aura' 'aurora' 'avicii' 'barbet' 'beryllium' 'bluejay' 'blueline' 'bonito' 'bramble' 'cheetah' 'coral' 'crosshatch' 'davinci' 'enchilada' 'fajita' 'flame' 'FP3' 'FP4' 'guacamole' 'guacamoleb' 'hotdog' 'hotdogb' 'instantnoodle' 'instantnoodlep' 'kebab' 'lavender' 'lemonade' 'lemonadep' 'lmi' 'oriole' 'panther' 'pro1' 'pro1x' 'raphael' 'raven' 'redfin' 'sargo' 'sunfish' 'taimen' 'vayu' 'walleye' 'xz2c');
#TODO: Make this a function?
echo "================================================================================";
diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh
deleted file mode 100644
index 0aaeaaa1..00000000
--- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh
+++ /dev/null
@@ -1,484 +0,0 @@
-#!/bin/bash
-if cd "$DOS_BUILD_BASE""kernel/xiaomi/msm8937"; then
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024-other2.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch
-git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
-git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9605/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.4/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/3.18/0007.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3699/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0007.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26146/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36557/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0920/3.18/0008-backport.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0021.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0017.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/^6.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
-editKernelLocalversion "-dos.p478"
-else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
-fi;
-cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh
index 7a815dec..dcc6771c 100644
--- a/Scripts/LineageOS-16.0/Functions.sh
+++ b/Scripts/LineageOS-16.0/Functions.sh
@@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2021-10-16
patchAllKernels() {
- startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_samsung_apq8084 kernel_xiaomi_msm8937";
+ startPatcher "kernel_asus_fugu kernel_asus_msm8953 kernel_cyanogen_msm8916 kernel_cyanogen_msm8974 kernel_google_yellowstone kernel_lge_hammerhead kernel_samsung_apq8084";
}
export -f patchAllKernels;
@@ -61,10 +61,6 @@ buildAll() {
buildDevice lentislte;
#SD615
buildDevice kipper;
- #SD430
- buildDevice land;
- #SD435
- buildDevice santoni;
#Tegra
buildDevice yellowstone; #broken sepolicy?
}
diff --git a/Scripts/LineageOS-16.0/Patch.sh b/Scripts/LineageOS-16.0/Patch.sh
index 26b575b2..64cc2b63 100644
--- a/Scripts/LineageOS-16.0/Patch.sh
+++ b/Scripts/LineageOS-16.0/Patch.sh
@@ -424,7 +424,6 @@ cd "$DOS_BUILD_BASE";
#Fix broken options enabled by hardenDefconfig()
[[ -d kernel/google/yellowstone ]] && sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/yellowstone/arch/arm*/configs/*_defconfig; #Breaks on compile
-[[ -d kernel/xiaomi/msm8937 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/xiaomi/msm8937/arch/arm64/configs/*_defconfig; #Breaks on compile
sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10
rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true;
diff --git a/Scripts/LineageOS-17.1/Functions.sh b/Scripts/LineageOS-17.1/Functions.sh
index 5e28f645..210a4e8c 100644
--- a/Scripts/LineageOS-17.1/Functions.sh
+++ b/Scripts/LineageOS-17.1/Functions.sh
@@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2021-10-16
patchAllKernels() {
- startPatcher "kernel_cyanogen_msm8916 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_samsung_universal9810 kernel_xiaomi_sm6150 kernel_yandex_sdm660";
+ startPatcher "kernel_cyanogen_msm8916 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_oneplus_msm8994 kernel_xiaomi_sm6150 kernel_yandex_sdm660";
}
export -f patchAllKernels;
@@ -62,15 +62,10 @@ buildAll() {
buildDevice clark;
#SD810
buildDevice oneplus2;
- #SD820
- buildDevice griffin;
#SD730
buildDevice davinci avb; #broken - missing deps
#SD660
buildDevice Amber verity;
- #Exynos
- buildDevice starlte;
- buildDevice star2lte;
}
export -f buildAll;
diff --git a/Scripts/LineageOS-17.1/Patch.sh b/Scripts/LineageOS-17.1/Patch.sh
index 00db358c..06ec9da4 100644
--- a/Scripts/LineageOS-17.1/Patch.sh
+++ b/Scripts/LineageOS-17.1/Patch.sh
@@ -529,8 +529,7 @@ enableLowRam "device/cyanogen/msm8916-common" "msm8916-common";
enableLowRam "device/wileyfox/crackling" "crackling";
#Fix broken options enabled by hardenDefconfig()
-[[ -d kernel/motorola/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/motorola/msm8996/arch/arm64/configs/*_defconfig; #Breaks on compile
-[[ -d kernel/samsung/universal9810 ]] && sed -i "s/CONFIG_RANDOMIZE_BASE=y/# CONFIG_RANDOMIZE_BASE is not set/" kernel/samsung/universal9810/arch/arm64/configs/*_defconfig; #Breaks on compile
+#none yet
sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10
rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true;
diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh
index 291e326b..38c0b274 100644
--- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh
+++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh
@@ -14,54 +14,21 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.p
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2324/3.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/^6.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
-editKernelLocalversion "-dos.p61"
+editKernelLocalversion "-dos.p28"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
similarity index 82%
rename from Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
rename to Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
index c9d23fe0..5871fc85 100644
--- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
+++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
@@ -1,6 +1,5 @@
#!/bin/bash
if cd "$DOS_BUILD_BASE""kernel/motorola/msm8996"; then
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0121-0122.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch
@@ -34,12 +33,9 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.pat
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
@@ -54,12 +50,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.18/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch
@@ -73,7 +69,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
@@ -87,11 +82,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch
@@ -103,29 +94,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15853/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15854/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15856/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16913/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16914/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18056/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch
@@ -133,49 +116,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3562/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3565/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3567/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3576/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3577/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3580/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3581/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5820/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5821/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5822/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5824/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5828/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5830/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5843/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5851/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5865/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5919/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11296/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11891/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
@@ -187,58 +137,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11955/qcacld-2.0/0002.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13890/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17182/3.18/0002.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.4/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2268/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2297/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2299/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2307/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch
@@ -258,31 +182,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10480/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10507/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^3.18/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
@@ -292,11 +202,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch
@@ -311,7 +216,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch
@@ -388,7 +292,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
@@ -398,7 +301,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3665/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch
@@ -410,6 +312,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
@@ -418,8 +321,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11118/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
@@ -472,6 +374,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch
@@ -491,7 +394,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0920/3.18/0008-backport.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
@@ -534,10 +442,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
@@ -625,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
-editKernelLocalversion "-dos.p625"
+editKernelLocalversion "-dos.p533"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh
index 689f26e1..9fbbd3ff 100644
--- a/Scripts/LineageOS-18.1/Functions.sh
+++ b/Scripts/LineageOS-18.1/Functions.sh
@@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2021-10-16
patchAllKernels() {
- startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996";
+ startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996";
}
export -f patchAllKernels;
@@ -87,6 +87,7 @@ buildAll() {
#SD808
buildDevice ether;
#SD820
+ buildDevice griffin;
buildDevice h830;
buildDevice h850;
buildDevice rs988;
@@ -113,11 +114,10 @@ patchWorkspaceReal() {
verifyAllPlatformTags;
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
- source build/envsetup.sh;
+ #source build/envsetup.sh;
#repopick -it eleven-firewall;
#repopick -i 314453; #TaskViewTouchController: Null check current animation on drag
#repopick -i 325011; #lineage: Opt-in to shipping full recovery image by default
- repopick -it R_asb_2023-04;
sh "$DOS_SCRIPTS/Patch.sh";
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh
index c24a390c..eb91b677 100644
--- a/Scripts/LineageOS-18.1/Patch.sh
+++ b/Scripts/LineageOS-18.1/Patch.sh
@@ -600,6 +600,8 @@ enableLowRam "device/samsung/msm8974-common" "msm8974-common";
[[ -d kernel/lge/mako ]] && sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/lge/mako/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile
[[ -d kernel/lge/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/lge/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile
[[ -d kernel/motorola/msm8974 ]] && sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/motorola/msm8974/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile
+[[ -d kernel/motorola/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/motorola/msm8996/arch/arm64/configs/*_defconfig; #Breaks on compile
+[[ -d kernel/motorola/msm8996 ]] && sed -i "s/CONFIG_SYSTEM_TRUSTED_KEYRING=y/# CONFIG_SYSTEM_TRUSTED_KEYRING is not set/" kernel/motorola/msm8996/arch/arm64/configs/*_defconfig; #Breaks on compile
[[ -d kernel/oneplus/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/oneplus/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile
sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10
diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh
new file mode 100644
index 00000000..6a0cad51
--- /dev/null
+++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh
@@ -0,0 +1,88 @@
+#!/bin/bash
+if cd "$DOS_BUILD_BASE""kernel/fxtec/sm6115"; then
+git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.19/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.19/0022.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.19/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.19/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.19/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.19/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0024.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.19/0035.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.19/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.19/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/4.19/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18786/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4744/4.19/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.19/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.19/0003.patch
+editKernelLocalversion "-dos.p82"
+else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
+fi;
+cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh
similarity index 63%
rename from Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh
rename to Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh
index 948eb604..456e169a 100644
--- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh
+++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh
@@ -1,11 +1,12 @@
#!/bin/bash
-if cd "$DOS_BUILD_BASE""kernel/samsung/universal9810"; then
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0218-0219.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0239-0240.patch --exclude=Makefile
+if cd "$DOS_BUILD_BASE""kernel/samsung/exynos9810"; then
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0118-0119.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0181-0182.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0183-0184.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile
-git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0260-0261.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0300-0301.patch --exclude=Makefile
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0313-0314.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
@@ -17,7 +18,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0002.patch
@@ -25,86 +25,258 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0009.p
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0017.patch
git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1128/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1129/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5995/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/4.0-^4.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/4.14/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14610/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14611/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14617/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14678/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15471/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15572/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16871/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19407/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20976/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.8+/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000026/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0136/4.9/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3900/4.9/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/4.14/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8980/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/4.9/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10124/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10207/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.9/0017.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11815/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13272/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15030/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.9/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15538/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15917/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15924/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/4.9/0006.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/4.9/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/^5.3/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/4.9/0007.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18282/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19049/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19525/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/4.9/0006.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0026.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0027.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0028.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0029.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0030.patch
-#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0032.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0033.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0034.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0035.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12655/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch
@@ -113,18 +285,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch
@@ -135,15 +306,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0049.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0050.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0051.patch
@@ -168,6 +338,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0069.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0070.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0071.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27067/4.9/0072.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27784/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch
@@ -178,6 +349,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch
@@ -185,36 +357,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36322/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.9/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36557/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch
@@ -227,12 +385,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch
@@ -252,8 +410,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch
@@ -268,9 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch
@@ -287,34 +441,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0015.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.9/0004.patch
@@ -346,7 +492,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
@@ -363,24 +508,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4095/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.9/0005.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.9/0005.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
@@ -414,7 +553,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.9/0005.patch
@@ -424,18 +562,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1390/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.14/0003.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
-git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
-editKernelLocalversion "-dos.p435"
-else echo "kernel_samsung_universal9810 is unavailable, not patching.";
+editKernelLocalversion "-dos.p570"
+else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh
new file mode 100644
index 00000000..20a90e56
--- /dev/null
+++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh
@@ -0,0 +1,97 @@
+#!/bin/bash
+if cd "$DOS_BUILD_BASE""kernel/xiaomi/msm8937"; then
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.9/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-sanitize/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.14/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
+editKernelLocalversion "-dos.p91"
+else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
+fi;
+cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-20.0/Functions.sh b/Scripts/LineageOS-20.0/Functions.sh
index 1ea238e2..611ea668 100644
--- a/Scripts/LineageOS-20.0/Functions.sh
+++ b/Scripts/LineageOS-20.0/Functions.sh
@@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2022-10-15
patchAllKernels() {
- startPatcher "kernel_essential_msm8998 kernel_fairphone_sdm632 kernel_fairphone_sm7225 kernel_fxtec_msm8998 kernel_google_gs101_private_gs-google kernel_google_gs201_private_gs-google kernel_google_msm-4.9 kernel_google_msm-4.14 kernel_google_redbull kernel_google_wahoo kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_oneplus_sm8250 kernel_oneplus_sm8350 kernel_razer_msm8998 kernel_razer_sdm845 kernel_sony_sdm845 kernel_xiaomi_sdm845";
+ startPatcher "kernel_essential_msm8998 kernel_fairphone_sdm632 kernel_fairphone_sm7225 kernel_fxtec_msm8998 kernel_fxtec_sm6115 kernel_google_gs101_private_gs-google kernel_google_gs201_private_gs-google kernel_google_msm-4.9 kernel_google_msm-4.14 kernel_google_redbull kernel_google_wahoo kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_oneplus_sm8250 kernel_oneplus_sm8350 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_exynos9810 kernel_sony_sdm845 kernel_xiaomi_msm8937 kernel_xiaomi_sdm845";
}
export -f patchAllKernels;
@@ -61,6 +61,8 @@ buildAll() {
buildDevice dumpling verity;
buildDevice mata verity; #unb
buildDevice cheryl verity;
+ #SD435
+ buildDevice Mi8937;
#SD845
buildDevice fajita avb;
buildDevice enchilada avb;
@@ -92,6 +94,8 @@ buildAll() {
#SD888
buildDevice lemonade avb;
buildDevice lemonadep avb;
+ #SD662
+ buildDevice pro1x avb;
#SD765
buildDevice avicii avb;
buildDevice bramble avb;
@@ -105,6 +109,10 @@ buildAll() {
buildDevice raven avb;
buildDevice panther avb;
buildDevice cheetah avb;
+ #Exynos
+ buildDevice starlte;
+ buildDevice star2lte;
+ buildDevice crownlte;
}
export -f buildAll;
diff --git a/Scripts/LineageOS-20.0/Patch.sh b/Scripts/LineageOS-20.0/Patch.sh
index bbe03f1a..15ddd33b 100644
--- a/Scripts/LineageOS-20.0/Patch.sh
+++ b/Scripts/LineageOS-20.0/Patch.sh
@@ -464,6 +464,10 @@ sed -i '/PRODUCT_SYSTEM_VERITY_PARTITION/iPRODUCT_VENDOR_VERITY_PARTITION := /de
awk -i inplace '!/vendor_sensors_dbg_prop/' sepolicy/vendor/hal_camera_default.te; #fixup
fi;
+if enterAndClear "device/xiaomi/mithorium-common"; then
+awk -i inplace '!/vendor_sensors_dbg_prop/' sepolicy/vendor/vendor_init.te; #fixup
+fi;
+
if enterAndClear "device/xiaomi/sdm845-common"; then
echo "persist.vendor.bt.aac_frm_ctl.enabled=true" >> vendor.prop; #Fixup stutters: https://review.lineageos.org/c/LineageOS/android_device_oneplus_sdm845-common/+/346925
fi;
@@ -514,6 +518,8 @@ cd "$DOS_BUILD_BASE";
[[ -d kernel/oneplus/sm8150 ]] && echo -e "\nCONFIG_DEBUG_FS=y" >> kernel/oneplus/sm8150/arch/arm64/configs/vendor/sm8150-perf_defconfig; #compile failure
[[ -d kernel/oneplus/sm7250 ]] && echo -e "\nCONFIG_DEBUG_FS=n" >> kernel/oneplus/sm7250/arch/arm64/configs/vendor/lito-perf_defconfig; #compile failure
[[ -d kernel/oneplus/sm8250 ]] && echo -e "\nCONFIG_DEBUG_FS=n" >> kernel/oneplus/sm8250/arch/arm64/configs/vendor/kona-perf_defconfig; #vintf failure
+[[ -d kernel/samsung/exynos9810 ]] && sed -i "s/CONFIG_RANDOMIZE_BASE=y/# CONFIG_RANDOMIZE_BASE is not set/" kernel/samsung/exynos9810/arch/arm64/configs/*_defconfig; #Breaks on compile
+#[[ -d kernel/xiaomi/msm8937 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/xiaomi/msm8937/arch/arm64/configs/*_defconfig; #Breaks on compile
sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10
rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true;