mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Overhaul variable names
This commit is contained in:
parent
4917b3ebc7
commit
d2ba1ddb20
@ -54,7 +54,7 @@ echo "Deblobbing..."
|
||||
sepolicy=$sepolicy" atfwd.te";
|
||||
|
||||
#AudioFX (Audio Effects) [Qualcomm]
|
||||
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then blobs=$blobs"|libasphere.so|libqcbassboost.so|libqcreverb.so|libqcvirt.so|libshoebox.so"; fi;
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then blobs=$blobs"|libasphere.so|libqcbassboost.so|libqcreverb.so|libqcvirt.so|libshoebox.so"; fi;
|
||||
|
||||
#Camera
|
||||
#Attempted, don't waste your time...
|
||||
@ -126,12 +126,12 @@ echo "Deblobbing..."
|
||||
blobs=$blobs"|iop|libqti-iop-client.so|libqti-iop.so|QPerformance.jar";
|
||||
|
||||
#IMS (VoLTE/Wi-Fi Calling) [Qualcomm]
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|ims.apk|ims.xml|libimsmedia_jni.so"; fi; #IMS (Core) (To support carriers that have phased out 2G)
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|ims.apk|ims.xml|libimsmedia_jni.so"; fi; #IMS (Core) (To support carriers that have phased out 2G)
|
||||
blobs=$blobs"|imscmlibrary.jar|imscmservice|imscm.xml|imsdatadaemon|imsqmidaemon|imssettings.apk|lib-imsdpl.so|lib-imscamera.so|libimscamera_jni.so|lib-imsqimf.so|lib-imsSDP.so|lib-imss.so|lib-imsvt.so|lib-imsxml.so"; #IMS
|
||||
blobs=$blobs"|ims_rtp_daemon|lib-rtpcommon.so|lib-rtpcore.so|lib-rtpdaemoninterface.so|lib-rtpsl.so|vendor.qti.imsrtpservice.*.so"; #RTP
|
||||
blobs=$blobs"|lib-dplmedia.so|librcc.so|libvcel.so|libvoice-svc.so|qti_permissions.xml"; #Misc.
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|volte_modem[/]"; fi;
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then sepolicy=$sepolicy" ims.te imscm.te imswmsproxy.te"; fi;
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|volte_modem[/]"; fi;
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then sepolicy=$sepolicy" ims.te imscm.te imswmsproxy.te"; fi;
|
||||
|
||||
#IPA (Internet Packet Accelerator) [Qualcomm]
|
||||
#This is actually open source (excluding -diag)
|
||||
@ -199,7 +199,7 @@ echo "Deblobbing..."
|
||||
|
||||
#Time Service [Qualcomm]
|
||||
#Requires that android_hardware_sony_timekeep be included in repo manifest
|
||||
if [ "$DEBLOBBER_REPLACE_TIME" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REPLACE_TIME" = true ]; then
|
||||
#blobs=$blobs"|libtime_genoff.so"; #XXX: Breaks radio
|
||||
blobs=$blobs"|libTimeService.so|time_daemon|TimeService.apk";
|
||||
sepolicy=$sepolicy" qtimeservice.te";
|
||||
@ -244,16 +244,16 @@ echo "Deblobbing..."
|
||||
#
|
||||
deblobDevice() {
|
||||
devicePath="$1";
|
||||
cd "$base$devicePath";
|
||||
cd "$DOS_BUILD_BASE$devicePath";
|
||||
if [ "${PWD##*/}" == "flo" ] || [ "${PWD##*/}" == "mako" ] || [ "${PWD##*/}" == "kona-common" ] || [ "${PWD##*/}" == "n5110" ] || [ "${PWD##*/}" == "smdk4412-common" ] || [ "${PWD##*/}" == "hdx-common" ] || [ "${PWD##*/}" == "thor" ] || [ "${PWD##*/}" == "flounder" ]; then #Some devices don't need/like TimeKeep
|
||||
replaceTime="false";
|
||||
fi;
|
||||
if [ "$DEBLOBBER_REPLACE_TIME" = false ]; then replaceTime="false"; fi; #Disable replacement
|
||||
if [ "$DOS_DEBLOBBER_REPLACE_TIME" = false ]; then replaceTime="false"; fi; #Disable replacement
|
||||
if [ -f Android.mk ]; then
|
||||
#Some devices store these in a dedicated firmware partition, others in /system/vendor/firmware, either way the following are just symlinks
|
||||
#sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(CMN_SYMLINKS)//' Android.mk; #Remove CMN firmware
|
||||
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(DXHDCP2_SYMLINKS)//' Android.mk; #Remove Discretix firmware
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(IMS_SYMLINKS)//' Android.mk; fi; #Remove IMS firmware
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(IMS_SYMLINKS)//' Android.mk; fi; #Remove IMS firmware
|
||||
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(PLAYREADY_SYMLINKS)//' Android.mk; #Remove Microsoft Playready firmware
|
||||
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WIDEVINE_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
|
||||
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WV_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
|
||||
@ -294,7 +294,7 @@ deblobDevice() {
|
||||
sed -i 's/ro.bluetooth.emb_wp_mode=true/ro.bluetooth.emb_wp_mode=false/' system.prop; #Disable WiPower
|
||||
sed -i 's/ro.bluetooth.wipower=true/ro.bluetooth.wipower=false/' system.prop; #Disable WiPower
|
||||
#Disable IMS
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
sed -i 's/persist.data.iwlan.enable=true/persist.data.iwlan.enable=false/' system.prop;
|
||||
sed -i 's/persist.ims.volte=true/persist.ims.volte=false/' system.prop;
|
||||
sed -i 's/persist.ims.vt=true/persist.ims.vt=false/' system.prop;
|
||||
@ -314,7 +314,7 @@ deblobDevice() {
|
||||
if [ -f init/init_*.cpp ]; then
|
||||
sed -i 's/property_set("persist.rcs.supported", ".");/property_set("persist.rcs.supported", "0");/' init/init_*.cpp; #Disable RCS
|
||||
#Disable IMS
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
sed -i 's/property_set("persist.ims.volte", "true");/property_set("persist.ims.volte", "false");/' init/init_*.cpp;
|
||||
sed -i 's/property_set("persist.ims.vt", "true");/property_set("persist.ims.vt", "false");/' init/init_*.cpp;
|
||||
sed -i 's/property_set("persist.radio.calls.on.ims", "true");/property_set("persist.radio.calls.on.ims", "false");/' init/init_*.cpp;
|
||||
@ -328,7 +328,7 @@ deblobDevice() {
|
||||
#sed -i 's|<bool name="config_enableWifiDisplay">true</bool>|<bool name="config_enableWifiDisplay">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
|
||||
sed -i 's|<bool name="config_uiBlurEnabled">true</bool>|<bool name="config_uiBlurEnabled">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; #Disable UIBlur
|
||||
#Disable IMS
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
sed -i 's|<bool name="config_carrier_volte_available">true</bool>|<bool name="config_carrier_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
|
||||
sed -i 's|<bool name="config_carrier_vt_available">true</bool>|<bool name="config_carrier_vt_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
|
||||
sed -i 's|<bool name="config_device_volte_available">true</bool>|<bool name="config_device_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
|
||||
@ -352,40 +352,40 @@ deblobDevice() {
|
||||
rm -rf board/qcom-wipower.mk product/qcom-wipower.mk; #Remove WiPower makefiles
|
||||
if [ -f setup-makefiles.sh ]; then
|
||||
awk -i inplace '!/'$blobs'/' ./*proprietary*.txt; #Remove all blob references from blob manifest
|
||||
bash -c "cd $base$devicePath && ./setup-makefiles.sh"; #Update the makefiles
|
||||
bash -c "cd $DOS_BUILD_BASE$devicePath && ./setup-makefiles.sh"; #Update the makefiles
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f deblobDevice;
|
||||
|
||||
deblobKernel() {
|
||||
kernelPath="$1";
|
||||
cd "$base$kernelPath";
|
||||
cd "$DOS_BUILD_BASE$kernelPath";
|
||||
rm -rf $kernels;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f deblobKernel;
|
||||
|
||||
deblobSepolicy() {
|
||||
sepolicyPath="$1";
|
||||
cd "$base$sepolicyPath";
|
||||
cd "$DOS_BUILD_BASE$sepolicyPath";
|
||||
if [ -d sepolicy ]; then
|
||||
cd sepolicy;
|
||||
rm -f $sepolicy;
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f deblobSepolicy;
|
||||
|
||||
deblobVendors() {
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
find vendor -regextype posix-extended -regex '.*('$blobs')' -type f -delete; #Delete all blobs
|
||||
}
|
||||
export -f deblobVendors;
|
||||
|
||||
deblobVendor() {
|
||||
makefile="$1";
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
awk -i inplace '!/'$blobs'/' "$makefile"; #Remove all blob references from makefile
|
||||
}
|
||||
export -f deblobVendor;
|
||||
@ -409,6 +409,6 @@ rm -rf vendor/samsung/nodevice;
|
||||
#END OF DEBLOBBING
|
||||
#
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
|
||||
echo "Deblobbing complete!"
|
||||
|
@ -15,7 +15,7 @@
|
||||
#You should have received a copy of the GNU General Public License
|
||||
#along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then
|
||||
echo -e "\e[0;33mWARNING: YOU HAVE ENABLED PATCHES THAT WHILE ARE OPEN SOURCE ARE ALSO ENCUMBERED BY RESTRICTIVE LICENSES\e[0m";
|
||||
echo -e "\e[0;33mPLEASE SEE THE 'LICENSES' FILE AT THE ROOT OF THIS REPOSITORY FOR MORE INFORMATION\e[0m";
|
||||
echo -e "\e[0;33mDISABLE THEM BY SETTING 'NON_COMMERCIAL_USE_PATCHES' TO 'false' IN 'Scripts/init.sh'\e[0m";
|
||||
@ -23,15 +23,14 @@ if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then
|
||||
fi;
|
||||
|
||||
startPatcher() {
|
||||
#$cvePatcher must be set!
|
||||
java -jar "$cvePatcher" patch "$base" "$androidWorkspace""Patches/" "$cveScripts" $1;
|
||||
java -jar "$DOS_PATCHER_BINARY" patch "$DOS_BUILD_BASE" "$DOS_WORKSPACE_ROOT""Patches/" "$DOS_SCRIPTS_CVES" $1;
|
||||
}
|
||||
export -f startPatcher;
|
||||
|
||||
enter() {
|
||||
echo "================================================================================================"
|
||||
dir="$1";
|
||||
cd "$base$dir";
|
||||
cd "$DOS_BUILD_BASE$dir";
|
||||
echo "[ENTERING] $dir";
|
||||
}
|
||||
export -f enter;
|
||||
@ -53,14 +52,14 @@ scanForMalware() {
|
||||
excludes="--exclude-dir=\".git\" --exclude-dir=\".repo\"";
|
||||
scanQueue="$2";
|
||||
if [ "$1" = true ]; then
|
||||
if [ "$MALWARE_SCAN_SETTING" != "quick" ] || [ "$MALWARE_SCAN_SETTING" = "extra" ]; then
|
||||
scanQueue=$scanQueue" $base/frameworks $base/vendor";
|
||||
if [ "$DOS_MALWARE_SCAN_SETTING" != "quick" ] || [ "$DOS_MALWARE_SCAN_SETTING" = "extra" ]; then
|
||||
scanQueue=$scanQueue" $DOS_BUILD_BASE/frameworks $DOS_BUILD_BASE/vendor";
|
||||
fi;
|
||||
if [ "$MALWARE_SCAN_SETTING" = "slow" ]; then
|
||||
scanQueue=$scanQueue"$base/external $base/prebuilts $base/toolchain $base/tools";
|
||||
if [ "$DOS_MALWARE_SCAN_SETTING" = "slow" ]; then
|
||||
scanQueue=$scanQueue"$DOS_BUILD_BASE/external $DOS_BUILD_BASE/prebuilts $DOS_BUILD_BASE/toolchain $DOS_BUILD_BASE/tools";
|
||||
fi;
|
||||
if [ "$MALWARE_SCAN_SETTING" = "full" ]; then
|
||||
scanQueue="$base";
|
||||
if [ "$DOS_MALWARE_SCAN_SETTING" = "full" ]; then
|
||||
scanQueue="$DOS_BUILD_BASE";
|
||||
fi;
|
||||
fi;
|
||||
du -hsc "$scanQueue";
|
||||
@ -116,12 +115,12 @@ audit2allowADB() {
|
||||
export -f audit2allowADB;
|
||||
|
||||
disableDexPreOpt() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
sed -i "s/WITH_DEXPREOPT := true/WITH_DEXPREOPT := false/" BoardConfig.mk;
|
||||
echo "Disabled dexpreopt";
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f disableDexPreOpt;
|
||||
|
||||
@ -134,9 +133,9 @@ compressRamdisks() {
|
||||
export -f compressRamdisks;
|
||||
|
||||
enhanceLocation() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
#Enable GLONASS
|
||||
if [ "$GLONASS_FORCED_ENABLE" = false ]; then
|
||||
if [ "$DOS_GLONASS_FORCED_ENABLE" = false ]; then
|
||||
sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT/A_GLONASS_POS_PROTOCOL_SELECT/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true;
|
||||
sed -i 's/A_GLONASS_POS_PROTOCOL_SELECT = 0.*/A_GLONASS_POS_PROTOCOL_SELECT = 15/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true;
|
||||
sed -i 's|A_GLONASS_POS_PROTOCOL_SELECT=0.*</item>|A_GLONASS_POS_PROTOCOL_SELECT=15</item>|' overlay/frameworks/base/core/res/res/values-*/*.xml &>/dev/null || true;
|
||||
@ -159,33 +158,33 @@ enhanceLocation() {
|
||||
fi;
|
||||
fi;
|
||||
echo "Enhanced location services for $1";
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enhanceLocation;
|
||||
|
||||
enableZram() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
sed -i 's|#/dev/block/zram0|/dev/block/zram0|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true;
|
||||
echo "Enabled zram for $1";
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableZram;
|
||||
|
||||
enableForcedEncryption() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
sed -i 's|encryptable=/|forceencrypt=/|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true;
|
||||
echo "Enabled forceencrypt for $1";
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableForcedEncryption;
|
||||
|
||||
enableStrongEncryption() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
echo "TARGET_WANTS_STRONG_ENCRYPTION := true" >> BoardConfig.mk;
|
||||
echo "Enabled AES-256 encryption for $1";
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableStrongEncryption;
|
||||
|
||||
@ -207,43 +206,43 @@ changeDefaultDNS() {
|
||||
dnsPrimaryV6="";
|
||||
dnsSecondary="";
|
||||
dnsSecondaryV6="";
|
||||
if [ -z "$DNS_PRESET"]; then
|
||||
if [[ "$DEFAULT_DNS_PRESET" == "Cloudflare" ]]; then #https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/
|
||||
if [ -z "$DNS_PRESET" ]; then
|
||||
if [[ "$DOS_DEFAULT_DNS_PRESET" == "Cloudflare" ]]; then #https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/
|
||||
dnsPrimary="1.0.0.1";
|
||||
dnsPrimaryV6="2606:4700:4700::1001";
|
||||
dnsSecondary="1.1.1.1";
|
||||
dnsSecondaryV6="2606:4700:4700::1111";
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "OpenNIC" ]]; then #https://servers.opennicproject.org/edit.php?srv=ns3.any.dns.opennic.glue
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "OpenNIC" ]]; then #https://servers.opennicproject.org/edit.php?srv=ns3.any.dns.opennic.glue
|
||||
dnsPrimary="169.239.202.202";
|
||||
dnsPrimaryV6="2a05:dfc7:5353::53";
|
||||
dnsSecondary="185.121.177.177";
|
||||
dnsSecondaryV6="2a05:dfc7:5::53";
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "DNSWATCH" ]]; then #https://dns.watch
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "DNSWATCH" ]]; then #https://dns.watch
|
||||
dnsPrimary="84.200.69.80";
|
||||
dnsPrimaryV6="2001:1608:10:25::1c04:b12f";
|
||||
dnsSecondary="84.200.70.40";
|
||||
dnsSecondaryV6="2001:1608:10:25::9249:d69b";
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "Google" ]]; then #https://developers.google.com/speed/public-dns/privacy
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Google" ]]; then #https://developers.google.com/speed/public-dns/privacy
|
||||
dnsPrimary="8.8.8.8";
|
||||
dnsPrimaryV6="2001:4860:4860::8888";
|
||||
dnsSecondary="8.8.4.4";
|
||||
dnsSecondaryV6="2001:4860:4860::8844";
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "OpenDNS" ]]; then #https://www.cisco.com/c/en/us/about/legal/privacy-full.html
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "OpenDNS" ]]; then #https://www.cisco.com/c/en/us/about/legal/privacy-full.html
|
||||
dnsPrimary="208.67.222.222";
|
||||
dnsPrimaryV6="2620:0:ccc::2";
|
||||
dnsSecondary="208.67.220.220";
|
||||
dnsSecondaryV6="2620:0:ccd::2";
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "Quad9" ]]; then #https://www.quad9.net/privacy/
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Quad9" ]]; then #https://www.quad9.net/privacy/
|
||||
dnsPrimary="9.9.9.9";
|
||||
dnsPrimaryV6="2620:fe::fe";
|
||||
dnsSecondary="149.112.112.112";
|
||||
dnsSecondaryV6="2620:fe::fe"; #no secondary available
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "Quad9U" ]]; then #https://www.quad9.net/privacy/
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Quad9U" ]]; then #https://www.quad9.net/privacy/
|
||||
dnsPrimary="9.9.9.10";
|
||||
dnsPrimaryV6="2620:fe::10";
|
||||
dnsSecondary="149.112.112.10";
|
||||
dnsSecondaryV6="2620:fe::10"; #no secondary available
|
||||
elif [[ "$DEFAULT_DNS_PRESET" == "Verisign" ]]; then #https://www.verisign.com/en_US/security-services/public-dns/terms-of-service/index.xhtml
|
||||
elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Verisign" ]]; then #https://www.verisign.com/en_US/security-services/public-dns/terms-of-service/index.xhtml
|
||||
dnsPrimary="64.6.64.6";
|
||||
dnsPrimaryV6="2620:74:1b::1:1";
|
||||
dnsSecondary="64.6.65.6";
|
||||
@ -268,7 +267,7 @@ editKernelLocalversion() {
|
||||
export -f editKernelLocalversion;
|
||||
|
||||
hardenDefconfig() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
|
||||
#Attempts to enable/disable supported options to increase security
|
||||
#See https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
|
||||
@ -304,6 +303,6 @@ hardenDefconfig() {
|
||||
editKernelLocalversion "-dos";
|
||||
|
||||
echo "Hardened defconfig for $1";
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f hardenDefconfig;
|
||||
|
@ -17,24 +17,24 @@
|
||||
|
||||
#Attempts to patch kernels to be more secure
|
||||
|
||||
#Is this the best way to do it? No. Is it the proper way to do it? No. Do I wish device maintainers would do it? Yes. Is it better then nothing? YES!
|
||||
#Is this the best way to do it? No. Is it the proper way to do it? No. Is it better then nothing? YES!
|
||||
|
||||
#Troubleshooting a patch
|
||||
##If you get an error like the following
|
||||
#> ../../../../../../kernel/nextbit/msm8992/drivers/media/platform/msm/camera_v2/sensor/actuator/msm_actuator.c:1116:32: error: 'ACTUATOR_POWER_UP' undeclared (first use in this function)
|
||||
#$ cd $cvePatchesLinux
|
||||
#$ cd $DOS_CVES_LINUX
|
||||
#$ grep "ACTUATOR_POWER_UP" . -Ri
|
||||
#> ./CVE-2018-3585/3.10/0001.patch:+ if (a_ctrl->actuator_state != ACTUATOR_POWER_UP) {
|
||||
#$ nano $cveScripts/android_kernel_nextbit_msm8992.sh
|
||||
#$ nano $DOS_SCRIPTS_CVES/android_kernel_nextbit_msm8992.sh
|
||||
# Comment out CVE-2018-3585/3.10/0001.patch
|
||||
|
||||
echo "Patching CVEs...";
|
||||
|
||||
cd "$base";
|
||||
for patcher in "$cveScripts"/*.sh; do
|
||||
cd "$DOS_BUILD_BASE";
|
||||
for patcher in "$DOS_SCRIPTS_CVES"/*.sh; do
|
||||
echo "Running $patcher";
|
||||
source "$patcher";
|
||||
done;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Patched CVEs!";
|
||||
|
@ -1,14 +1,14 @@
|
||||
#!/bin/bash
|
||||
|
||||
#export desc='/O=Divested Computing, Inc./CN=DivestOS/emailAddress=support@divestos.xyz';
|
||||
export desc='/O=Example/CN=ExampleOS/emailAddress=support@example.com';
|
||||
export type='rsa'; #Options: rsa, ec
|
||||
#desc='/O=Divested Computing, Inc./CN=DivestOS/emailAddress=support@divestos.xyz';
|
||||
desc='/O=Example/CN=ExampleOS/emailAddress=support@example.com';
|
||||
type='rsa'; #Options: rsa, ec
|
||||
|
||||
"$base"/development/tools/make_key extra "$desc" "$type";
|
||||
"$base"/development/tools/make_key media "$desc" "$type";
|
||||
"$base"/development/tools/make_key platform "$desc" "$type";
|
||||
"$base"/development/tools/make_key releasekey "$desc" "$type";
|
||||
"$base"/development/tools/make_key shared "$desc" "$type";
|
||||
"$base"/development/tools/make_key verity "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key extra "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key media "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key platform "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key releasekey "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key shared "$desc" "$type";
|
||||
"$DOS_BUILD_BASE"/development/tools/make_key verity "$desc" "$type";
|
||||
|
||||
echo "Please copy created keys to your signing keys directory. Keep them safe!";
|
||||
|
@ -1,94 +1,94 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/amazon/hdx-common"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2012-6704/^3.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-7822/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8709/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2488/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3893/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8890/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/amazon/hdx-common"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6704/^3.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7822/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8709/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10230/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2488/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3893/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8417/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8444/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p90"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,58 +1,58 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/asus/grouper"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9895/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8890/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/asus/grouper"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9895/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p54"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,74 +1,74 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/asus/msm8916"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13174/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/asus/msm8916"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p70"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,35 +1,35 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/fairphone/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/fairphone/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p31"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,235 +1,235 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/marlin"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2847/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11013/qcacld-2.0/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11028/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11034/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11067/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13219/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9690/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/google/marlin"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11013/qcacld-2.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11028/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11067/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13219/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9690/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p231"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,51 +1,51 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/msm"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/google/msm"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p47"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,38 +1,38 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/htc/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/htc/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p34"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,120 +1,120 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/htc/msm8994"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9903/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8942/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
#git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0445/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0621/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/htc/msm8994"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9903/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8942/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0445/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0621/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p116"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,169 +1,169 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/huawei/angler"
|
||||
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13174/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/huawei/angler"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p165"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,161 +1,161 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/bullhead"
|
||||
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14903/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/bullhead"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14903/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p157"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,40 +1,40 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/g3"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/g3"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p36"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,48 +1,48 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/hammerhead"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/hammerhead"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p44"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,23 +1,23 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/mako"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/mako"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
editKernelLocalversion "-dos.p19"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,31 +1,31 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8939/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p27"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,183 +1,183 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/msm8992"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3951/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5829/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9754/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10663/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10997/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10998/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10999/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18169/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8245/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9696/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9720/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9724/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9725/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0001/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0002/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/msm8992"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3951/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9754/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10997/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10999/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11056/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18169/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8245/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8260/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8265/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9724/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9725/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
editKernelLocalversion "-dos.p179"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,148 +1,148 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/msm8996"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.18/0002-Alt2.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18066/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/msm8996"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.18/0002-Alt2.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p144"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,85 +1,85 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/motorola/msm8916"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8950/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/motorola/msm8916"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8950/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3902/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p81"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,211 +1,211 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/motorola/msm8992"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8019/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0026.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0027.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10232/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3860/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3907/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3938/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5853/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8477/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0427/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0452/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0454/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0460/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0630/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0631/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10997/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10998/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-14880/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18169/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8236/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9696/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9699/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9720/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9724/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9725/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/motorola/msm8992"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8019/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/qcacld-2.0/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/qcacld-2.0/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10230/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10232/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3860/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3902/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3938/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8417/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8444/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8477/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0427/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0454/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0460/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0631/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10997/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11056/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14880/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18169/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8260/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8265/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9724/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9725/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
editKernelLocalversion "-dos.p207"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,225 +1,225 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/motorola/msm8996"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10284/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10287/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10294/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10295/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0457/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0460/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0462/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0576/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0607/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15826/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6423/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6425/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6426/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7369/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7370/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8233/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8236/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8242/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8244/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8251/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8261/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8262/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8264/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8271/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8272/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9677/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9678/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9680/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9682/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9691/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9692/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9699/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3598/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0004/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10288/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/motorola/msm8996"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10284/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10287/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10294/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10295/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0460/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0462/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0576/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0607/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15826/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6423/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6425/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7370/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8233/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8242/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8244/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8261/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8264/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8271/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8272/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9677/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9678/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9680/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9682/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9691/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9692/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3598/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10288/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p221"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,76 +1,76 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/nextbit/msm8992"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2018-3585/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p72"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,58 +1,58 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/oneplus/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/oneplus/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p54"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,63 +1,63 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/jf"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10233/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3854/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6791/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0791/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/samsung/jf"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6791/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p59"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,32 +1,32 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/samsung/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p28"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,53 +1,53 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/smdk4412"
|
||||
git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9895/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8463/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/samsung/smdk4412"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9895/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8463/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p49"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,141 +1,141 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/universal8890"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0013.patch
|
||||
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9940/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8575/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8785/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8839/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8962/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3775/3.18/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6828/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2016-7917/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8399/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0523/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16529/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17807/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/samsung/universal8890"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9940/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8839/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3775/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4794/3.18+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4794/3.18+/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7917/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8399/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0523/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10996/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p137"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -78,5 +78,5 @@ sed -i 's/def_forward_lookup">1/def_forward_lookup">0/' packages/CMSettingsProvi
|
||||
sed -i 's/def_people_lookup">1/def_people_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml;
|
||||
sed -i 's/def_reverse_lookup">1/def_reverse_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Default settings changed!";
|
||||
|
@ -28,8 +28,8 @@ resetWorkspace() {
|
||||
export -f resetWorkspace;
|
||||
|
||||
scanWorkspaceForMalware() {
|
||||
scanQueue="$base/abi $base/android $base/art $base/bionic $base/bootable $base/build $base/dalvik $base/device $base/hardware $base/libcore $base/libnativehelper $base/ndk $base/packages $base/pdk $base/platform_testing $base/sdk $base/system";
|
||||
scanQueue=$scanQueue" $base/vendor/cm $base/vendor/cmsdk";
|
||||
scanQueue="$DOS_BUILD_BASE/abi $DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/ndk $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
|
||||
scanQueue=$scanQueue" $DOS_BUILD_BASE/vendor/cm $DOS_BUILD_BASE/vendor/cmsdk";
|
||||
scanForMalware true $scanQueue;
|
||||
}
|
||||
export -f scanWorkspaceForMalware;
|
||||
@ -47,7 +47,7 @@ buildDeviceDebug() {
|
||||
export -f buildDeviceDebug;
|
||||
|
||||
buildAll() {
|
||||
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
||||
|
||||
#Select devices are userdebug due to SELinux policy issues
|
||||
#TODO: Add victara, athene, us997, us996, pme, t0lte, hlte
|
||||
@ -88,28 +88,28 @@ buildAll() {
|
||||
export -f buildAll;
|
||||
|
||||
patchWorkspace() {
|
||||
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$prebuiltApps $base/build $base/device $base/vendor/cm"; fi;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/cm"; fi;
|
||||
#source build/envsetup.sh;
|
||||
|
||||
source "$scripts/Patch.sh";
|
||||
source "$scripts/Defaults.sh";
|
||||
if [ "$OVERCLOCKS_ENABLED" = true ]; then source "$scripts/Overclock.sh"; fi;
|
||||
source "$scripts/Optimize.sh";
|
||||
source "$scripts/Rebrand.sh";
|
||||
source "$scripts/Theme.sh";
|
||||
source "$scriptsCommon/Deblob.sh";
|
||||
source "$scriptsCommon/Patch_CVE.sh";
|
||||
source "$DOS_SCRIPTS/Patch.sh";
|
||||
source "$DOS_SCRIPTS/Defaults.sh";
|
||||
if [ "$DOS_OVERCLOCKS_ENABLED" = true ]; then source "$DOS_SCRIPTS/Overclock.sh"; fi;
|
||||
source "$DOS_SCRIPTS/Optimize.sh";
|
||||
source "$DOS_SCRIPTS/Rebrand.sh";
|
||||
source "$DOS_SCRIPTS/Theme.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Deblob.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
||||
source build/envsetup.sh;
|
||||
|
||||
#Deblobbing fixes
|
||||
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
|
||||
cd device/asus/Z00T && ./setup-makefiles.sh && cd "$base";
|
||||
cd device/lge/h850 && ./setup-makefiles.sh && cd "$base";
|
||||
cd device/asus/Z00T && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
|
||||
cd device/lge/h850 && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f patchWorkspace;
|
||||
|
||||
enableDexPreOpt() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
|
||||
@ -118,16 +118,16 @@ enableDexPreOpt() {
|
||||
echo "Enabled dexpreopt for $1";
|
||||
fi;
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableDexPreOpt;
|
||||
|
||||
enableDexPreOptFull() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
sed -i "s/WITH_DEXPREOPT_BOOT_IMG_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_ONLY := false/" BoardConfig.mk;
|
||||
echo "Enabled full dexpreopt";
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableDexPreOptFull;
|
||||
|
@ -37,5 +37,5 @@ sed -i 's|config_showTemperatureWarning">0|config_showTemperatureWarning">1|' pa
|
||||
enter "kernel"
|
||||
sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput.
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Optimizing complete!";
|
||||
|
@ -21,45 +21,45 @@
|
||||
echo "Applying overclocks...";
|
||||
|
||||
enter "kernel/amazon/hdx-common";
|
||||
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0001-Overclock.patch"; #300MHz -> 268MHz, 2.26GHz -> 2.41GHz =+0.60GHz
|
||||
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0002-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0003-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0004-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0001-Overclock.patch"; #300MHz -> 268MHz, 2.26GHz -> 2.41GHz =+0.60GHz
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0002-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0003-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0004-Overclock.patch";
|
||||
|
||||
enter "kernel/asus/grouper";
|
||||
patch -p1 < "$overclocks/android_kernel_asus_grouper/0001-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_asus_grouper/0001-Overclock.patch";
|
||||
echo "CONFIG_TEGRA_CPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.50GHz =+0.80GHz
|
||||
echo "CONFIG_TEGRA_CPU_OVERCLOCK_ULTIMATE" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.60GHz =+1.20GHz
|
||||
echo "CONFIG_TEGRA_GPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #416MHz 520MHz
|
||||
echo "CONFIG_TEGRA_GAMING_FIX=y" >> arch/arm/configs/grouper_defconfig;
|
||||
|
||||
enter "kernel/huawei/angler";
|
||||
patch -p1 < "$overclocks/android_kernel_huawei_angler/0001-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_huawei_angler/0001-Overclock.patch";
|
||||
|
||||
enter "kernel/lge/g3";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0002-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0003-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0004-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0002-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0003-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0004-Overclock.patch";
|
||||
|
||||
enter "kernel/lge/hammerhead";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
|
||||
|
||||
enter "kernel/lge/mako";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0001-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0002-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0003-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0004-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0005-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0001-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0002-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0003-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0004-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0005-Overclock.patch";
|
||||
echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz
|
||||
echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz
|
||||
#echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling
|
||||
|
||||
enter "kernel/motorola/msm8916";
|
||||
patch -p1 < "$overclocks/android_kernel_motorola_msm8916/0001-Overclock.patch"; #1.36GHz -> 1.88GHz =+ 2.07GHz
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_motorola_msm8916/0001-Overclock.patch"; #1.36GHz -> 1.88GHz =+ 2.07GHz
|
||||
|
||||
enter "kernel/oneplus/msm8974";
|
||||
patch -p1 < "$overclocks/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Overclocks applied!";
|
||||
|
@ -42,8 +42,8 @@
|
||||
#Download some (non-executable) out-of-tree files for use later on
|
||||
mkdir /tmp/ar;
|
||||
cd /tmp/ar;
|
||||
if [ "$HOSTS_BLOCKING" = true ]; then wget "$HOSTS_BLOCKING_LIST" -N; fi;
|
||||
cd "$base";
|
||||
if [ "$DOS_HOSTS_BLOCKING" = true ]; then wget "$DOS_HOSTS_BLOCKING_LIST" -N; fi;
|
||||
cd "$DOS_BUILD_BASE";
|
||||
|
||||
#Accept all SDK licences, not normally needed but Gradle managed apps fail without it
|
||||
mkdir -p "$ANDROID_HOME/licenses";
|
||||
@ -58,23 +58,23 @@ echo -e "\n84831b9409646a918e30573bab4c9c91346d8abd" > "$ANDROID_HOME/licenses/a
|
||||
#
|
||||
|
||||
#top dir
|
||||
cp -r "$prebuiltApps""Fennec_DOS-Shim" "$base""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
|
||||
cp -r "$prebuiltApps""android_vendor_FDroid_PrebuiltApps/." "$base""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
|
||||
cp -r "$DOS_PREBUILT_APPS""Fennec_DOS-Shim" "$DOS_BUILD_BASE""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
|
||||
cp -r "$DOS_PREBUILT_APPS""android_vendor_FDroid_PrebuiltApps/." "$DOS_BUILD_BASE""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
|
||||
|
||||
enterAndClear "bootable/recovery";
|
||||
patch -p1 < "$patches/android_bootable_recovery/0001-Squash_Menus.patch"; #What's a back button?
|
||||
patch -p1 < "$DOS_PATCHES/android_bootable_recovery/0001-Squash_Menus.patch"; #What's a back button?
|
||||
|
||||
enterAndClear "build";
|
||||
patch -p1 < "$patches/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
|
||||
patch -p1 < "$DOS_PATCHES/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
|
||||
sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence
|
||||
sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk;
|
||||
#sed -i 's/ro.adb.secure=0/ro.adb.secure=1/' core/main.mk;
|
||||
|
||||
enterAndClear "device/qcom/sepolicy";
|
||||
patch -p1 < "$patches/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on user builds XXX: REMOVE THIS TRASH
|
||||
patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on user builds XXX: REMOVE THIS TRASH
|
||||
|
||||
enterAndClear "external/sqlite";
|
||||
patch -p1 < "$patches/android_external_sqlite/0001-Secure_Delete.patch"; #Enable secure_delete by default (CopperheadOS-13.0)
|
||||
patch -p1 < "$DOS_PATCHES/android_external_sqlite/0001-Secure_Delete.patch"; #Enable secure_delete by default (CopperheadOS-13.0)
|
||||
|
||||
enterAndClear "frameworks/base";
|
||||
git revert 0326bb5e41219cf502727c3aa44ebf2daa19a5b3; #re-enable doze on devices without gms
|
||||
@ -82,19 +82,19 @@ sed -i 's/DEFAULT_MAX_FILES = 1000;/DEFAULT_MAX_FILES = 0;/' services/core/java/
|
||||
sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence
|
||||
sed -i 's|db_default_journal_mode" translatable="false">PERSIST|db_default_journal_mode" translatable="false">TRUNCATE|' core/res/res/values/config.xml; #Mirror SQLite secure_delete
|
||||
sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml;
|
||||
patch -p1 < "$patches/android_frameworks_base/0001-Reduced_Resolution.patch"; #Allow reducing resolution to save power TODO: Add 800x480
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0003-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0005-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
|
||||
patch -p1 < "$DOS_PATCHES/android_frameworks_base/0001-Reduced_Resolution.patch"; #Allow reducing resolution to save power TODO: Add 800x480
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0003-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0005-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
|
||||
changeDefaultDNS;
|
||||
#patch -p1 < "$patches/android_frameworks_base/0007-Connectivity.patch"; #Change connectivity check URLs to ours
|
||||
patch -p1 < "$patches/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
|
||||
#patch -p1 < "$DOS_PATCHES/android_frameworks_base/0007-Connectivity.patch"; #Change connectivity check URLs to ours
|
||||
patch -p1 < "$DOS_PATCHES/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
|
||||
rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps
|
||||
rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig;
|
||||
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
enterAndClear "frameworks/opt/net/ims";
|
||||
patch -p1 < "$patches/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
|
||||
patch -p1 < "$DOS_PATCHES/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
|
||||
fi;
|
||||
|
||||
enterAndClear "frameworks/opt/net/wifi";
|
||||
@ -108,10 +108,10 @@ awk -i inplace '!/com.android.internal.R.bool.config_permissionReviewRequired/'
|
||||
enterAndClear "packages/apps/CMParts";
|
||||
rm -rf src/org/cyanogenmod/cmparts/cmstats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml; #Nuke part of CMStats
|
||||
sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather
|
||||
patch -p1 < "$patches/android_packages_apps_CMParts/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
|
||||
patch -p1 < "$patches/android_packages_apps_CMParts/0002-Reduced_Resolution.patch"; #Allow reducing resolution to save power
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_CMParts/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_CMParts/0002-Reduced_Resolution.patch"; #Allow reducing resolution to save power
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/FakeStore";
|
||||
sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk;
|
||||
sed -i 's/ln -s /ln -sf /' Android.mk;
|
||||
@ -119,7 +119,7 @@ sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools =
|
||||
fi;
|
||||
|
||||
enterAndClear "packages/apps/FDroid";
|
||||
cp "$patchesCommon/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
|
||||
cp "$DOS_PATCHES_COMMON/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
|
||||
sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk;
|
||||
sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk;
|
||||
sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix
|
||||
@ -132,63 +132,63 @@ sed -i 's/\"org\.fdroid\.fdroid/\"org.fdroid.fdroid_dos/' app/src/main/java/org/
|
||||
#release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3
|
||||
#test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/GmsCore";
|
||||
git submodule update --init --recursive;
|
||||
fi;
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/GsfProxy";
|
||||
sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle;
|
||||
fi;
|
||||
|
||||
enterAndClear "packages/apps/PackageInstaller";
|
||||
patch -p1 < "$patches/android_packages_apps_PackageInstaller/64d8b44.diff"; #Fix an issue with Permission Review
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_PackageInstaller/64d8b44.diff"; #Fix an issue with Permission Review
|
||||
|
||||
enterAndClear "packages/apps/Settings";
|
||||
git revert 2ebe6058c546194a301c1fd22963d6be4adbf961; #don't hide oem unlock
|
||||
sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/ChooseLockPassword.java; #Increase max password length
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
|
||||
|
||||
enterAndClear "packages/apps/SetupWizard";
|
||||
patch -p1 < "$patches/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
|
||||
|
||||
enterAndClear "packages/apps/Trebuchet";
|
||||
cp -r "$patchesCommon/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
|
||||
cp -r "$DOS_PATCHES_COMMON/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
|
||||
|
||||
enterAndClear "packages/apps/Updater";
|
||||
patch -p1 < "$patchesCommon/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
|
||||
#TODO: Remove changelog
|
||||
|
||||
enterAndClear "packages/apps/WallpaperPicker";
|
||||
rm res/drawable-nodpi/{*.png,*.jpg} res/values-nodpi/wallpapers.xml; #Remove old ones
|
||||
cp -r "$dosWallpapers"'Compressed/.' res/drawable-nodpi/; #Add ours
|
||||
cp -r "$dosWallpapers""Thumbs/." res/drawable-nodpi/;
|
||||
cp "$dosWallpapers""wallpapers.xml" res/values-nodpi/wallpapers.xml;
|
||||
cp -r "$DOS_WALLPAPERS"'Compressed/.' res/drawable-nodpi/; #Add ours
|
||||
cp -r "$DOS_WALLPAPERS""Thumbs/." res/drawable-nodpi/;
|
||||
cp "$DOS_WALLPAPERS""wallpapers.xml" res/values-nodpi/wallpapers.xml;
|
||||
sed -i 's/req.touchEnabled = touchEnabled;/req.touchEnabled = true;/' src/com/android/wallpaperpicker/WallpaperCropActivity.java; #Allow scrolling
|
||||
sed -i 's/mCropView.setTouchEnabled(req.touchEnabled);/mCropView.setTouchEnabled(true);/' src/com/android/wallpaperpicker/WallpaperCropActivity.java;
|
||||
sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default
|
||||
|
||||
enterAndClear "packages/inputmethods/LatinIME";
|
||||
patch -p1 < "$patchesCommon/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
|
||||
|
||||
enterAndClear "packages/services/Telephony";
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
|
||||
|
||||
enterAndClear "system/core";
|
||||
if [ "$HOSTS_BLOCKING" = true ]; then cat /tmp/ar/hosts >> rootdir/etc/hosts; fi; #Merge in our HOSTS file
|
||||
if [ "$DOS_HOSTS_BLOCKING" = true ]; then cat /tmp/ar/hosts >> rootdir/etc/hosts; fi; #Merge in our HOSTS file
|
||||
git revert 0217dddeb5c16903c13ff6c75213619b79ea622b d7aa1231b6a0631f506c0c23816f2cd81645b15f; #Always update recovery XXX: This doesn't seem to work
|
||||
patch -p1 < "$patches/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
|
||||
patch -p1 < "$DOS_PATCHES/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
|
||||
|
||||
enterAndClear "system/keymaster";
|
||||
patch -p1 < "$patches/android_system_keymaster/0001-Backport_Fixes.patch"; #Fixes from 8.1, appears to fix https://jira.lineageos.org/browse/BUGBASH-590
|
||||
patch -p1 < "$patches/android_system_keymaster/0002-Backport_Fixes.patch";
|
||||
patch -p1 < "$DOS_PATCHES/android_system_keymaster/0001-Backport_Fixes.patch"; #Fixes from 8.1, appears to fix https://jira.lineageos.org/browse/BUGBASH-590
|
||||
patch -p1 < "$DOS_PATCHES/android_system_keymaster/0002-Backport_Fixes.patch";
|
||||
|
||||
enterAndClear "system/sepolicy";
|
||||
patch -p1 < "$patches/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
|
||||
patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
|
||||
|
||||
enterAndClear "system/vold";
|
||||
patch -p1 < "$patches/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
|
||||
patch -p1 < "$DOS_PATCHES/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
|
||||
|
||||
enterAndClear "vendor/cm";
|
||||
rm -rf overlay/common/vendor/cmsdk/packages; #Remove analytics
|
||||
@ -196,30 +196,30 @@ awk -i inplace '!/50-cm.sh/' config/common.mk; #Make sure our hosts is always us
|
||||
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys
|
||||
awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys
|
||||
sed -i '3iinclude vendor/cm/config/sce.mk' config/common.mk; #Include extra apps
|
||||
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then
|
||||
awk -i inplace '!/AudioFX/' config/common.mk;
|
||||
awk -i inplace '!/AudioService/' config/common.mk;
|
||||
fi;
|
||||
cp "$patchesCommon/android_vendor_divested/sce.mk" config/sce.mk;
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
|
||||
if [ "$MICROG_INCLUDED" != "NONE" ]; then cp "$patchesCommon/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/cm/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
|
||||
cp "$patches/android_vendor_cm/config.xml" overlay/common/vendor/cmsdk/cm/res/res/values/config.xml; #Per app performance profiles
|
||||
cp -r "$patchesCommon/android_vendor_divested/firmware_deblobber" .;
|
||||
cp "$patches/android_vendor_cm/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
|
||||
cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce.mk" config/sce.mk;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/cm/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
|
||||
cp "$DOS_PATCHES/android_vendor_cm/config.xml" overlay/common/vendor/cmsdk/cm/res/res/values/config.xml; #Per app performance profiles
|
||||
cp -r "$DOS_PATCHES_COMMON/android_vendor_divested/firmware_deblobber" .;
|
||||
cp "$DOS_PATCHES/android_vendor_cm/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
|
||||
sed -i 's/CM_BUILDTYPE := UNOFFICIAL/CM_BUILDTYPE := dos/' config/common.mk; #Change buildtype
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/CM_BUILDTYPE := dos/CM_BUILDTYPE := dosNC/' config/common.mk; fi;
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/CM_BUILDTYPE := dos/CM_BUILDTYPE := dosNC/' config/common.mk; fi;
|
||||
sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence
|
||||
#if [ "$HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
|
||||
if [ "$HOSTS_BLOCKING" = false ]; then cp "$patchesCommon/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
|
||||
if [ "$HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/cm/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
|
||||
#if [ "$DOS_HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
|
||||
if [ "$DOS_HOSTS_BLOCKING" = false ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
|
||||
if [ "$DOS_HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/cm/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
|
||||
|
||||
enterAndClear "vendor/cmsdk";
|
||||
awk -i inplace '!/WeatherManagerServiceBroker/' cm/res/res/values/config.xml; #Disable Weather
|
||||
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/CMAudioService/' cm/res/res/values/config.xml; fi;
|
||||
cp "$patchesCommon/android_lineage-sdk/profile_default.xml" cm/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/CMAudioService/' cm/res/res/values/config.xml; fi;
|
||||
cp "$DOS_PATCHES_COMMON/android_lineage-sdk/profile_default.xml" cm/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
|
||||
sed -i 's/shouldUseOptimizations(weight)/true/' cm/lib/main/java/org/cyanogenmod/platform/internal/PerformanceManagerService.java; #Per app performance profiles fix
|
||||
#
|
||||
#END OF ROM CHANGES
|
||||
@ -234,9 +234,9 @@ sed -i 's/,encryptable=footer//' rootdir/etc/fstab.qcom; #Using footer will brea
|
||||
#echo "/dev/block/platform/msm_sdcc.1/by-name/misc /misc emmc defaults defaults" >> rootdir/etc/fstab.qcom; #Add the misc (mmcblk0p5) partition for recovery flags
|
||||
|
||||
enterAndClear "device/asus/grouper";
|
||||
patch -p1 < "$patches/android_device_asus_grouper/0001-Update_Blobs.patch";
|
||||
patch -p1 < "$DOS_PATCHES/android_device_asus_grouper/0001-Update_Blobs.patch";
|
||||
rm proprietary-blobs.txt;
|
||||
cp "$patches/android_device_asus_grouper/lineage-proprietary-files.txt" lineage-proprietary-files.txt;
|
||||
cp "$DOS_PATCHES/android_device_asus_grouper/lineage-proprietary-files.txt" lineage-proprietary-files.txt;
|
||||
|
||||
enterAndClear "device/lge/g2-common";
|
||||
sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te;
|
||||
@ -257,13 +257,13 @@ enterAndClear "device/oneplus/bacon";
|
||||
sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/
|
||||
|
||||
#Make changes to all devices
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \;
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \;
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \;
|
||||
#if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi;
|
||||
find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
|
||||
#Fixes
|
||||
#Fix broken options enabled by hardenDefconfig()
|
||||
|
@ -21,36 +21,36 @@
|
||||
echo "Rebranding...";
|
||||
|
||||
enter "bootable/recovery";
|
||||
sed -i 's|Android Recovery|'"$REBRAND_NAME"' Recovery|' ./*_ui.cpp;
|
||||
sed -i 's|Android Recovery|'"$DOS_BRANDING_NAME"' Recovery|' ./*_ui.cpp;
|
||||
|
||||
enter "build";
|
||||
sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user
|
||||
sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host
|
||||
sed -i '/CM_TARGET_PACKAGE/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' core/Makefile;
|
||||
sed -i '/CM_TARGET_PACKAGE/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' core/Makefile;
|
||||
|
||||
enter "frameworks/base";
|
||||
generateBootAnimationMask "$REBRAND_NAME" "$REBRAND_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
|
||||
generateBootAnimationShine "$REBRAND_BOOTANIMATION_COLOR" "$REBRAND_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
|
||||
generateBootAnimationMask "$DOS_BRANDING_NAME" "$DOS_BRANDING_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
|
||||
generateBootAnimationShine "$DOS_BRANDING_BOOTANIMATION_COLOR" "$DOS_BRANDING_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
|
||||
|
||||
enter "packages/apps/Settings";
|
||||
sed -i '/.*cmlicense_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*cmupdate_settings_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*mod_version/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*cmlicense_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*cmupdate_settings_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*mod_version/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
|
||||
|
||||
enter "packages/apps/SetupWizard";
|
||||
sed -i 's|http://lineageos.org/legal|'"$REBRAND_LINK_PRIVACY"'|' src/com/cyanogenmod/setupwizard/LineageSettingsActivity.java;
|
||||
sed -i '/.*setup_services/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml;
|
||||
sed -i '/.*services_explanation/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml;
|
||||
cp "$patchesCommon/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
|
||||
sed -i 's|http://lineageos.org/legal|'"$DOS_BRANDING_LINK_PRIVACY"'|' src/com/cyanogenmod/setupwizard/LineageSettingsActivity.java;
|
||||
sed -i '/.*setup_services/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
|
||||
sed -i '/.*services_explanation/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
|
||||
cp "$DOS_PATCHES_COMMON/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
|
||||
|
||||
enter "packages/apps/Updater";
|
||||
sed -i 's|0OTASERVER0|'"$REBRAND_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
|
||||
sed -i 's|>LineageOS|>'"$REBRAND_NAME"'|' res/values*/strings.xml;
|
||||
sed -i 's|0OTASERVER0|'"$DOS_BRANDING_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
|
||||
sed -i 's|>LineageOS|>'"$DOS_BRANDING_NAME"'|' res/values*/strings.xml;
|
||||
|
||||
enter "vendor/cm";
|
||||
sed -i 's|https://lineageos.org/legal|'"$REBRAND_LINK_ABOUT"'|' config/common.mk;
|
||||
sed -i '/.*ZIPPATH=/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/envsetup.sh;
|
||||
sed -i 's|https://lineageos.org/legal|'"$DOS_BRANDING_LINK_ABOUT"'|' config/common.mk;
|
||||
sed -i '/.*ZIPPATH=/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/envsetup.sh;
|
||||
rm -rf bootanimation;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Rebranding complete!";
|
||||
|
@ -20,52 +20,45 @@
|
||||
|
||||
echo "Applying theme...";
|
||||
|
||||
export themeOverride50="FFCA28"; #Amber 400
|
||||
export themeOverride100="FFC107"; #Amber 500
|
||||
export themeOverride200="FFA726"; #Orange 400
|
||||
export themeOverride300="FF9800"; #Orange 500
|
||||
export themeOverride500="FF5722"; #Deep Orange 500
|
||||
export themeOverride700="E64A19"; #Deep Orange 700
|
||||
|
||||
enter "frameworks/base";
|
||||
sed -i "s/#ffe0f2f1/#ff$themeOverride50/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ffb2dfdb/#ff$themeOverride100/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff80cbc4/#ff$themeOverride200/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff4db6ac/#ff$themeOverride300/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff009688/#ff$themeOverride500/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff00796b/#ff$themeOverride700/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ffe0f2f1/#ff$DOS_THEME_50/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ffb2dfdb/#ff$DOS_THEME_100/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff80cbc4/#ff$DOS_THEME_200/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff4db6ac/#ff$DOS_THEME_300/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff009688/#ff$DOS_THEME_500/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#ff00796b/#ff$DOS_THEME_700/" core/res/res/values/colors_material.xml;
|
||||
sed -i "s/#fff4511e/#ffe53935/" core/res/res/values/colors.xml;
|
||||
|
||||
enter "packages/apps/CMParts";
|
||||
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/colors.xml;
|
||||
sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/colors.xml;
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enter "packages/apps/GmsCore";
|
||||
sed -i "s/#ff7fcac3/#ff$themeOverride300/" microg-ui-tools/src/main/res/values/colors.xml;
|
||||
sed -i "s/#ff009688/#ff$themeOverride500/" microg-ui-tools/src/main/res/values/colors.xml;
|
||||
sed -i "s/#ff7fcac3/#ff$DOS_THEME_300/" microg-ui-tools/src/main/res/values/colors.xml;
|
||||
sed -i "s/#ff009688/#ff$DOS_THEME_500/" microg-ui-tools/src/main/res/values/colors.xml;
|
||||
fi;
|
||||
|
||||
enter "packages/apps/Settings";
|
||||
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/styles.xml;
|
||||
sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/styles.xml;
|
||||
#TODO: Fix: Storage, Profiles
|
||||
|
||||
enter "packages/apps/Trebuchet";
|
||||
sed -i "s/009688/$themeOverride500/" res/values/*colors.xml;
|
||||
sed -i "s/009688/$themeOverride500/" WallpaperPicker/res/values/colors.xml;
|
||||
mogrify -format png -fill "#$themeOverride500" -opaque "#009688" -fuzz 10% res/drawable*/cling_bg.9.png;
|
||||
sed -i "s/009688/$DOS_THEME_500/" res/values/*colors.xml;
|
||||
sed -i "s/009688/$DOS_THEME_500/" WallpaperPicker/res/values/colors.xml;
|
||||
mogrify -format png -fill "#$DOS_THEME_500" -opaque "#009688" -fuzz 10% res/drawable*/cling_bg.9.png;
|
||||
#TODO: Fix: Open app icon
|
||||
|
||||
enter "packages/apps/Updater";
|
||||
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/colors.xml;
|
||||
sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/colors.xml;
|
||||
|
||||
enter "packages/inputmethods/LatinIME";
|
||||
sed -i "s/#80CBC4/#$themeOverride200/" java/res/values/colors.xml;
|
||||
sed -i "s/#4DB6AC/#$themeOverride300/" java/res/values/colors.xml;
|
||||
mogrify -format png -fill "#$themeOverride100" -opaque "#b2dfdb" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$themeOverride200" -opaque "#80cbc4" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$themeOverride300" -opaque "#4db6ac" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$themeOverride300" -opaque "#7fcac3" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$themeOverride500" -opaque "#26a69a" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
sed -i "s/#80CBC4/#$DOS_THEME_200/" java/res/values/colors.xml;
|
||||
sed -i "s/#4DB6AC/#$DOS_THEME_300/" java/res/values/colors.xml;
|
||||
mogrify -format png -fill "#$DOS_THEME_100" -opaque "#b2dfdb" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$DOS_THEME_200" -opaque "#80cbc4" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$DOS_THEME_300" -opaque "#4db6ac" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$DOS_THEME_300" -opaque "#7fcac3" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
mogrify -format png -fill "#$DOS_THEME_500" -opaque "#26a69a" -fuzz 10% java/res/drawable*/*lxx*.png;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Applied theme!";
|
||||
|
@ -1,27 +1,27 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/essential/msm8998"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0016.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0020.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-1583/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/4.4/0018.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/4.4/0026.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14875/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3564/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3597/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14875/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/essential/msm8998"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p23"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,112 +1,112 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/marlin"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0047.patch
|
||||
#git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0048.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0049.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11034/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/google/marlin"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0047.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0048.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0049.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p108"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,44 +1,44 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/msm"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/google/msm"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p40"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,80 +1,80 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/htc/flounder"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001-Alt.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8453/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0449/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13273/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/htc/flounder"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001-Alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10996/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13273/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p76"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,38 +1,38 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/htc/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/htc/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p34"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,117 +1,117 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/huawei/angler"
|
||||
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000251/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/huawei/angler"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p113"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,106 +1,106 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/bullhead"
|
||||
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000251/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/bullhead"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p102"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,41 +1,41 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/g3"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/g3"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p37"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,48 +1,47 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/hammerhead"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p44"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/hammerhead"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p43"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,22 +1,22 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/mako"
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6828/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7910/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/mako"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7910/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p18"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,31 +1,31 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8939/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0806/prima/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p27"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,70 +1,70 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/msm8996"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11077/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15846/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/lge/msm8996"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11077/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15846/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p66"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,67 +1,67 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/moto/shamu"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8269/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/moto/shamu"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p63"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,108 +1,108 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/motorola/msm8996"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17449/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18066/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8251/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3560/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3585/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.18/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5833/3.18/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/motorola/msm8996"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17449/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p104"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,76 +1,76 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/nextbit/msm8992"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
|
||||
#git apply $cvePatchesLinux/CVE-2018-3585/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p72"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,58 +1,58 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/oppo/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/oppo/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p54"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,30 +1,30 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/msm8974"
|
||||
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
|
||||
cd "$DOS_BUILD_BASE""kernel/samsung/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p26"
|
||||
cd $base
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -79,5 +79,5 @@ sed -i 's/def_stats_collection">true/def_stats_collection">false/' overlay/commo
|
||||
sed -i 's/config_storage_manager_settings_enabled">true/config_storage_manager_settings_enabled">false/' overlay/common/packages/apps/Settings/res/values/config.xml;
|
||||
#sed -i 's/config_enableRecoveryUpdater">false/config_enableRecoveryUpdater">true/' overlay/common/packages/apps/Settings/res/values/config.xml;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Default settings changed!";
|
||||
|
@ -28,8 +28,8 @@ resetWorkspace() {
|
||||
export -f resetWorkspace;
|
||||
|
||||
scanWorkspaceForMalware() {
|
||||
scanQueue="$base/android $base/art $base/bionic $base/bootable $base/build $base/compatibility $base/dalvik $base/device $base/hardware $base/libcore $base/libnativehelper $base/packages $base/pdk $base/platform_testing $base/sdk $base/system";
|
||||
scanQueue=$scanQueue" $base/lineage-sdk $base/vendor/lineage";
|
||||
scanQueue="$DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/compatibility $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
|
||||
scanQueue=$scanQueue" $DOS_BUILD_BASE/lineage-sdk $DOS_BUILD_BASE/vendor/lineage";
|
||||
scanForMalware true $scanQueue;
|
||||
}
|
||||
export -f scanWorkspaceForMalware;
|
||||
@ -47,7 +47,7 @@ buildDeviceDebug() {
|
||||
export -f buildDeviceDebug;
|
||||
|
||||
buildAll() {
|
||||
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
||||
#Select devices are userdebug due to SELinux policy issues
|
||||
#TODO: hiae star2lte starlte
|
||||
brunch lineage_mako-user;
|
||||
@ -73,29 +73,29 @@ buildAll() {
|
||||
export -f buildAll;
|
||||
|
||||
patchWorkspace() {
|
||||
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$prebuiltApps $base/build $base/device $base/vendor/lineage"; fi;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
||||
|
||||
source build/envsetup.sh;
|
||||
repopick -f 214824 209584 209585 215010 214300; #g3-common
|
||||
repopick -f 211404 211405 211406 211407 211408 211409; #d852
|
||||
|
||||
source "$scripts/Patch.sh";
|
||||
source "$scripts/Defaults.sh";
|
||||
if [ "$OVERCLOCKS_ENABLED" = true ]; then source "$scripts/Overclock.sh"; fi;
|
||||
source "$scripts/Optimize.sh";
|
||||
source "$scripts/Rebrand.sh";
|
||||
source "$scriptsCommon/Deblob.sh";
|
||||
source "$scriptsCommon/Patch_CVE.sh";
|
||||
source "$DOS_SCRIPTS/Patch.sh";
|
||||
source "$DOS_SCRIPTS/Defaults.sh";
|
||||
if [ "$DOS_OVERCLOCKS_ENABLED" = true ]; then source "$DOS_SCRIPTS/Overclock.sh"; fi;
|
||||
source "$DOS_SCRIPTS/Optimize.sh";
|
||||
source "$DOS_SCRIPTS/Rebrand.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Deblob.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
||||
source build/envsetup.sh;
|
||||
|
||||
#Deblobbing fixes
|
||||
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
|
||||
cd device/lge/h850 && ./setup-makefiles.sh && cd "$base";
|
||||
cd device/lge/h850 && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f patchWorkspace;
|
||||
|
||||
enableDexPreOpt() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
|
||||
@ -104,16 +104,16 @@ enableDexPreOpt() {
|
||||
echo "Enabled dexpreopt for $1";
|
||||
fi;
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableDexPreOpt;
|
||||
|
||||
enableDexPreOptFull() {
|
||||
cd "$base$1";
|
||||
cd "$DOS_BUILD_BASE$1";
|
||||
if [ -f BoardConfig.mk ]; then
|
||||
sed -i "s/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false/" BoardConfig.mk;
|
||||
echo "Enabled full dexpreopt";
|
||||
fi;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f enableDexPreOptFull;
|
||||
|
@ -37,5 +37,5 @@ sed -i 's|config_showTemperatureWarning">0|config_showTemperatureWarning">1|' pa
|
||||
enter "kernel"
|
||||
sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput.
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Optimizing complete!";
|
||||
|
@ -21,29 +21,29 @@
|
||||
echo "Applying overclocks...";
|
||||
|
||||
enter "kernel/huawei/angler";
|
||||
patch -p1 < "$overclocks/android_kernel_huawei_angler/0001-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_huawei_angler/0001-Overclock.patch";
|
||||
|
||||
enter "kernel/lge/g3";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0002-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0003-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_g3/0004-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0002-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0003-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0004-Overclock.patch";
|
||||
|
||||
enter "kernel/lge/hammerhead";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
|
||||
|
||||
enter "kernel/lge/mako";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0001-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0002-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0003-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0004-Overclock.patch";
|
||||
patch -p1 < "$overclocks/android_kernel_lge_mako/0005-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0001-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0002-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0003-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0004-Overclock.patch";
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0005-Overclock.patch";
|
||||
echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz
|
||||
echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz
|
||||
#echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling
|
||||
|
||||
enter "kernel/oppo/msm8974";
|
||||
patch -p1 < "$overclocks/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
|
||||
patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Overclocks applied!";
|
||||
|
@ -42,8 +42,8 @@
|
||||
#Download some (non-executable) out-of-tree files for use later on
|
||||
mkdir /tmp/ar;
|
||||
cd /tmp/ar;
|
||||
if [ "$HOSTS_BLOCKING" = true ]; then wget "$HOSTS_BLOCKING_LIST" -N; fi;
|
||||
cd "$base";
|
||||
if [ "$DOS_HOSTS_BLOCKING" = true ]; then wget "$DOS_HOSTS_BLOCKING_LIST" -N; fi;
|
||||
cd "$DOS_BUILD_BASE";
|
||||
|
||||
#Accept all SDK licences, not normally needed but Gradle managed apps fail without it
|
||||
mkdir -p "$ANDROID_HOME/licenses";
|
||||
@ -58,12 +58,12 @@ echo -e "\n84831b9409646a918e30573bab4c9c91346d8abd" > "$ANDROID_HOME/licenses/a
|
||||
#
|
||||
|
||||
#top dir
|
||||
cp -r "$prebuiltApps""Fennec_DOS-Shim" "$base""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
|
||||
cp -r "$prebuiltApps""android_vendor_FDroid_PrebuiltApps/." "$base""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
|
||||
cp -r "$DOS_PREBUILT_APPS""Fennec_DOS-Shim" "$DOS_BUILD_BASE""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
|
||||
cp -r "$DOS_PREBUILT_APPS""android_vendor_FDroid_PrebuiltApps/." "$DOS_BUILD_BASE""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
|
||||
|
||||
enterAndClear "build/make";
|
||||
patch -p1 < "$patches/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_build/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
patch -p1 < "$DOS_PATCHES/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_build/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' core/product.mk;
|
||||
sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence
|
||||
sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk;
|
||||
@ -73,7 +73,7 @@ enterAndClear "device/lineage/sepolicy";
|
||||
git revert c9b0d95630b82cd0ad1a0fc633c6d59c2cb8aad7 37422f7df389f3ae5a34ee3d6dd9354217f9c536; #neverallow violation
|
||||
|
||||
enterAndClear "device/qcom/sepolicy";
|
||||
patch -p1 < "$patches/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH
|
||||
patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH
|
||||
|
||||
enterAndClear "external/svox";
|
||||
git revert 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles
|
||||
@ -83,19 +83,19 @@ enterAndClear "frameworks/base";
|
||||
sed -i 's/DEFAULT_MAX_FILES = 1000;/DEFAULT_MAX_FILES = 0;/' services/core/java/com/android/server/DropBoxManagerService.java; #Disable DropBox
|
||||
sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence
|
||||
sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml;
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0002-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0003-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0002-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0003-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
|
||||
changeDefaultDNS;
|
||||
#patch -p1 < "$patches/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours
|
||||
patch -p1 < "$patches/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_frameworks_base/Copperhead/0005-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
#patch -p1 < "$DOS_PATCHES/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours
|
||||
patch -p1 < "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/Copperhead/0005-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps
|
||||
rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig;
|
||||
|
||||
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
||||
enterAndClear "frameworks/opt/net/ims";
|
||||
patch -p1 < "$patches/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
|
||||
patch -p1 < "$DOS_PATCHES/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
|
||||
fi
|
||||
|
||||
enterAndClear "frameworks/opt/net/wifi";
|
||||
@ -108,10 +108,10 @@ awk -i inplace '!/com.android.internal.R.bool.config_permissionReviewRequired/'
|
||||
|
||||
enterAndClear "lineage-sdk";
|
||||
awk -i inplace '!/WeatherManagerServiceBroker/' lineage/res/res/values/config.xml; #Disable Weather
|
||||
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/LineageAudioService/' lineage/res/res/values/config.xml; fi;
|
||||
cp "$patchesCommon/android_lineage-sdk/profile_default.xml" lineage/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/LineageAudioService/' lineage/res/res/values/config.xml; fi;
|
||||
cp "$DOS_PATCHES_COMMON/android_lineage-sdk/profile_default.xml" lineage/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/FakeStore";
|
||||
sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk;
|
||||
sed -i 's/ln -s /ln -sf /' Android.mk;
|
||||
@ -119,7 +119,7 @@ sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools =
|
||||
fi;
|
||||
|
||||
enterAndClear "packages/apps/FDroid";
|
||||
cp "$patchesCommon/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
|
||||
cp "$DOS_PATCHES_COMMON/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
|
||||
sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk;
|
||||
sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk;
|
||||
sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix
|
||||
@ -132,12 +132,12 @@ sed -i 's/\"org\.fdroid\.fdroid/\"org.fdroid.fdroid_dos/' app/src/main/java/org/
|
||||
#release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3
|
||||
#test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/GmsCore";
|
||||
git submodule update --init --recursive;
|
||||
fi;
|
||||
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
|
||||
enterAndClear "packages/apps/GsfProxy";
|
||||
sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle;
|
||||
fi;
|
||||
@ -145,25 +145,25 @@ fi;
|
||||
enterAndClear "packages/apps/LineageParts";
|
||||
rm -rf src/org/lineageos/lineageparts/lineagestats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml #Nuke part of the analytics
|
||||
sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather
|
||||
patch -p1 < "$patches/android_packages_apps_LineageParts/0001-Remove_Analytics.patch"; #Remove analytics
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_LineageParts/0001-Remove_Analytics.patch"; #Remove analytics
|
||||
rm AndroidManifest.xml.orig res/values/*.xml.orig;
|
||||
|
||||
enterAndClear "packages/apps/Settings";
|
||||
git revert a96df110e84123fe1273bff54feca3b4ca484dcd; #don't hide oem unlock
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_apps_Settings/Copperhead/0003-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
patch -p1 < "$patches/android_packages_apps_Settings/0004-PDB_Fixes.patch"; #Fix crashes when the PersistentDataBlockManager service isn't available
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_apps_Settings/Copperhead/0003-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_Settings/0004-PDB_Fixes.patch"; #Fix crashes when the PersistentDataBlockManager service isn't available
|
||||
sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/password/ChooseLockPassword.java; #Increase max password length
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
|
||||
rm res/values/strings.xml.orig;
|
||||
|
||||
enterAndClear "packages/apps/SetupWizard";
|
||||
patch -p1 < "$patches/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove analytics
|
||||
patch -p1 < "$DOS_PATCHES/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove analytics
|
||||
|
||||
enterAndClear "packages/apps/Trebuchet";
|
||||
cp -r "$patchesCommon/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
|
||||
cp -r "$DOS_PATCHES_COMMON/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
|
||||
|
||||
enterAndClear "packages/apps/Updater";
|
||||
patch -p1 < "$patchesCommon/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
|
||||
#TODO: Remove changelog
|
||||
|
||||
enterAndClear "packages/apps/WallpaperPicker";
|
||||
@ -173,46 +173,46 @@ sed -i 's/mCropView.setTouchEnabled(req.touchEnabled);/mCropView.setTouchEnabled
|
||||
sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default
|
||||
|
||||
enterAndClear "packages/inputmethods/LatinIME";
|
||||
patch -p1 < "$patchesCommon/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
|
||||
|
||||
enterAndClear "packages/services/Telephony";
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
|
||||
|
||||
enterAndClear "system/core";
|
||||
cat /tmp/ar/hosts >> rootdir/etc/hosts; #Merge in our HOSTS file
|
||||
git revert a6a4ce8e9a6d63014047a447c6bb3ac1fa90b3f4; #Always update recovery
|
||||
patch -p1 < "$patches/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_core/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
#if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_core/0003-Deny_USB-Aggressive.patch"; fi; #Deny USB on boot, may break things
|
||||
patch -p1 < "$DOS_PATCHES/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_core/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
#if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_core/0003-Deny_USB-Aggressive.patch"; fi; #Deny USB on boot, may break things
|
||||
|
||||
enterAndClear "system/sepolicy";
|
||||
patch -p1 < "$patches/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_sepolicy/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_sepolicy/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
|
||||
|
||||
enterAndClear "system/vold";
|
||||
patch -p1 < "$patches/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
|
||||
patch -p1 < "$DOS_PATCHES/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
|
||||
|
||||
enterAndClear "vendor/lineage";
|
||||
rm -rf overlay/common/vendor/lineage-sdk/packages; #Remove analytics
|
||||
if [ "$HOSTS_BLOCKING" = true ]; then awk -i inplace '!/50-lineage.sh/' config/common.mk; fi; #Make sure our hosts is always used
|
||||
if [ "$DOS_HOSTS_BLOCKING" = true ]; then awk -i inplace '!/50-lineage.sh/' config/common.mk; fi; #Make sure our hosts is always used
|
||||
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys
|
||||
awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys
|
||||
sed -i '3iinclude vendor/lineage/config/sce.mk' config/common.mk; #Include extra apps
|
||||
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/AudioFX/' config/common.mk; fi;
|
||||
cp "$patchesCommon/android_vendor_divested/sce.mk" config/sce.mk;
|
||||
if [ "$MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
|
||||
if [ "$MICROG_INCLUDED" != "NONE" ]; then cp "$patchesCommon/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
|
||||
if [ "$MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/lineage/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
|
||||
cp -r "$patchesCommon/android_vendor_divested/firmware_deblobber" .;
|
||||
cp "$patches/android_vendor_lineage/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
|
||||
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/AudioFX/' config/common.mk; fi;
|
||||
cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce.mk" config/sce.mk;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
|
||||
if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/lineage/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
|
||||
cp -r "$DOS_PATCHES_COMMON/android_vendor_divested/firmware_deblobber" .;
|
||||
cp "$DOS_PATCHES/android_vendor_lineage/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
|
||||
sed -i 's/LINEAGE_BUILDTYPE := UNOFFICIAL/LINEAGE_BUILDTYPE := dos/' config/common.mk; #Change buildtype
|
||||
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/LINEAGE_BUILDTYPE := dos/LINEAGE_BUILDTYPE := dosNC/' config/common.mk; fi;
|
||||
if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/LINEAGE_BUILDTYPE := dos/LINEAGE_BUILDTYPE := dosNC/' config/common.mk; fi;
|
||||
sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence
|
||||
#if [ "$HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
|
||||
if [ "$HOSTS_BLOCKING" = false ]; then cp "$patchesCommon/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
|
||||
if [ "$HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/lineage/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
|
||||
#if [ "$DOS_HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
|
||||
if [ "$DOS_HOSTS_BLOCKING" = false ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
|
||||
if [ "$DOS_HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/lineage/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
|
||||
#
|
||||
#END OF ROM CHANGES
|
||||
#
|
||||
@ -230,21 +230,21 @@ echo "allow wcnss_service block_device:dir search;" >> sepolicy/wcnss_service.te
|
||||
echo "/dev/block/platform/msm_sdcc\.1/by-name/pad u:object_r:misc_block_device:s0" >> sepolicy/file_contexts; #fix uncrypt denial
|
||||
|
||||
enterAndClear "device/lge/mako";
|
||||
cp "$patches/android_device_lge_mako/proprietary-blobs.txt" proprietary-blobs.txt; #Out of sync
|
||||
cp "$DOS_PATCHES/android_device_lge_mako/proprietary-blobs.txt" proprietary-blobs.txt; #Out of sync
|
||||
echo "allow kickstart usbfs:dir search;" >> sepolicy/kickstart.te; #Fix forceencrypt on first boot
|
||||
patch -p1 < "$patches/android_device_lge_mako/0001-Enable_LTE.patch";
|
||||
patch -p1 < "$DOS_PATCHES/android_device_lge_mako/0001-Enable_LTE.patch";
|
||||
|
||||
enterAndClear "device/oppo/msm8974-common";
|
||||
sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/
|
||||
|
||||
#Make changes to all devices
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \;
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \;
|
||||
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \;
|
||||
#if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi;
|
||||
find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \;
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
|
||||
#Fix broken options enabled by hardenDefconfig()
|
||||
sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile
|
||||
|
@ -22,48 +22,48 @@ echo "Rebranding...";
|
||||
|
||||
enter "bootable/recovery";
|
||||
git revert bc57208dfcd0958d03a00bbcf5345be6ceac9988 6ac3bb48f9d10e604d4b2d6c4152be9d35d17ea0;
|
||||
patch -p1 < "$patches/android_bootable_recovery/0001-Remove_Logo.patch"; #Remove logo rendering code
|
||||
patch -p1 < "$DOS_PATCHES/android_bootable_recovery/0001-Remove_Logo.patch"; #Remove logo rendering code
|
||||
rm res*/images/logo_image.png; #Remove logo images
|
||||
mogrify -format png -fill "#FF5722" -opaque "#167C80" -fuzz 10% res-*/images/*sel.png; #Recolor icons
|
||||
sed -i 's|grid_h \* 2 / 3|grid_h * 0.25|' screen_ui.cpp; #Center icons
|
||||
sed -i 's|0x16, 0x7c, 0x80|100, 34, 13|' screen_ui.cpp; #Recolor text
|
||||
sed -i 's|Android Recovery|'"$REBRAND_NAME"' Recovery|' ./*_ui.cpp;
|
||||
sed -i 's|LineageOS|'"$REBRAND_NAME"'|' ui.cpp;
|
||||
sed -i 's|Android Recovery|'"$DOS_BRANDING_NAME"' Recovery|' ./*_ui.cpp;
|
||||
sed -i 's|LineageOS|'"$DOS_BRANDING_NAME"'|' ui.cpp;
|
||||
|
||||
enter "build/make";
|
||||
sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user
|
||||
sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host
|
||||
|
||||
enter "frameworks/base";
|
||||
generateBootAnimationMask "$REBRAND_NAME" "$REBRAND_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
|
||||
generateBootAnimationShine "$REBRAND_BOOTANIMATION_COLOR" "$REBRAND_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
|
||||
generateBootAnimationMask "$DOS_BRANDING_NAME" "$DOS_BRANDING_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
|
||||
generateBootAnimationShine "$DOS_BRANDING_BOOTANIMATION_COLOR" "$DOS_BRANDING_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
|
||||
|
||||
enter "lineage-sdk";
|
||||
sed -i '/.*lineage_version/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
sed -i '/.*lineage_updates/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
sed -i '/.*lineageos_system_label/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
sed -i '/.*lineage_version/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
sed -i '/.*lineage_updates/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
sed -i '/.*lineageos_system_label/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
|
||||
|
||||
enter "packages/apps/LineageParts";
|
||||
sed -i '/.*trust_feature_security_patches_explain/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml;
|
||||
sed -i '/.*trust_feature_security_patches_explain/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
|
||||
|
||||
enter "packages/apps/Settings";
|
||||
sed -i '/.*lineagelicense_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml;
|
||||
sed -i '/.*lineagelicense_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
|
||||
|
||||
enter "packages/apps/SetupWizard";
|
||||
sed -i 's|http://lineageos.org/legal|'"$REBRAND_LINK_PRIVACY"'|' src/org/lineageos/setupwizard/LineageSettingsActivity.java;
|
||||
sed -i '/.*setup_services/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml;
|
||||
sed -i '/.*services_explanation/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml;
|
||||
cp "$patchesCommon/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
|
||||
sed -i 's|http://lineageos.org/legal|'"$DOS_BRANDING_LINK_PRIVACY"'|' src/org/lineageos/setupwizard/LineageSettingsActivity.java;
|
||||
sed -i '/.*setup_services/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
|
||||
sed -i '/.*services_explanation/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
|
||||
cp "$DOS_PATCHES_COMMON/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
|
||||
|
||||
enter "packages/apps/Updater";
|
||||
sed -i 's|0OTASERVER0|'"$REBRAND_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
|
||||
sed -i 's|>LineageOS|>'"$REBRAND_NAME"'|' res/values*/strings.xml;
|
||||
sed -i 's|0OTASERVER0|'"$DOS_BRANDING_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
|
||||
sed -i 's|>LineageOS|>'"$DOS_BRANDING_NAME"'|' res/values*/strings.xml;
|
||||
|
||||
enter "vendor/lineage";
|
||||
sed -i 's|https://lineageos.org/legal|'"$REBRAND_LINK_ABOUT"'|' build/core/main_version.mk
|
||||
sed -i '/.*ZIPPATH=/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/envsetup.sh;
|
||||
sed -i '/LINEAGE_TARGET_PACKAGE/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/tasks/bacon.mk;
|
||||
sed -i 's|https://lineageos.org/legal|'"$DOS_BRANDING_LINK_ABOUT"'|' build/core/main_version.mk
|
||||
sed -i '/.*ZIPPATH=/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/envsetup.sh;
|
||||
sed -i '/LINEAGE_TARGET_PACKAGE/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/tasks/bacon.mk;
|
||||
rm -rf bootanimation;
|
||||
|
||||
cd "$base";
|
||||
cd "$DOS_BUILD_BASE";
|
||||
echo "Rebranding complete!";
|
||||
|
@ -18,31 +18,41 @@
|
||||
#Sets settings used by all other scripts
|
||||
|
||||
#START OF USER CONFIGURABLE OPTIONS
|
||||
export androidWorkspace="/mnt/Drive-3/"; #XXX: THIS MUST BE CORRECT TO BUILD!
|
||||
export DOS_WORKSPACE_ROOT="/mnt/Drive-3/"; #XXX: THIS MUST BE CORRECT TO BUILD!
|
||||
export DOS_SIGNING_KEYS=$DOS_WORKSPACE_ROOT"Signing_Keys";
|
||||
#export DOS_PATCHER_BINARY="";
|
||||
export ANDROID_HOME="/home/$USER/Android/Sdk";
|
||||
|
||||
export DEBLOBBER_REMOVE_AUDIOFX=true; #Set true to remove AudioFX
|
||||
export DEBLOBBER_REMOVE_IMS=false; #Set true to remove all IMS blobs
|
||||
export DEBLOBBER_REPLACE_TIME=false; #Set true to replace Qualcomm Time Services with the open source Sony TimeKeep reimplementation
|
||||
export DEFAULT_DNS_PRESET="OpenNIC"; #Sets default DNS. Options: Cloudflare, OpenNIC, DNSWATCH, Google, OpenDNS, Quad9, Quad9U, Verisign
|
||||
export GLONASS_FORCED_ENABLE=true; #Enables GLONASS on all devices
|
||||
export MALWARE_SCAN_ENABLED=true; #Set true to perform a fast scan on patchWorkspace() and a through scan on buildAll()
|
||||
export MALWARE_SCAN_SETTING="quick"; #buildAll() scan speed. Options: quick, extra, slow, full
|
||||
export MICROG_INCLUDED="NLP"; #Determines inclusion of microG. Options: NONE, NLP, FULL
|
||||
export HOSTS_BLOCKING=true; #Switch to false to prevent inclusion of our HOSTS file
|
||||
export HOSTS_BLOCKING_LIST="https://spotco.us/hosts"; #Must be in the format "127.0.0.0 bad.domain.tld". XXX: /hosts is built from non-commercial use files, switch to /hsc for release
|
||||
export OVERCLOCKS_ENABLED=true; #Switch to false to disable overclocks
|
||||
export STRONG_ENCRYPTION_ENABLED=false; #Switch to true to enable AES-256bit encryption XXX: THIS WILL **DESTROY** EXISTING INSTALLS!
|
||||
export NON_COMMERCIAL_USE_PATCHES=false; #Switch to false to prevent inclusion of non-commercial use patches
|
||||
export DOS_DEBLOBBER_REMOVE_AUDIOFX=true; #Set true to remove AudioFX
|
||||
export DOS_DEBLOBBER_REMOVE_IMS=false; #Set true to remove all IMS blobs
|
||||
export DOS_DEBLOBBER_REPLACE_TIME=false; #Set true to replace Qualcomm Time Services with the open source Sony TimeKeep reimplementation
|
||||
export DOS_DEFAULT_DNS_PRESET="OpenNIC"; #Sets default DNS. Options: Cloudflare, OpenNIC, DNSWATCH, Google, OpenDNS, Quad9, Quad9U, Verisign
|
||||
export DOS_GLONASS_FORCED_ENABLE=true; #Enables GLONASS on all devices
|
||||
export DOS_MALWARE_SCAN_ENABLED=true; #Set true to perform a fast scan on patchWorkspace() and a through scan on buildAll()
|
||||
export DOS_MALWARE_SCAN_SETTING="quick"; #buildAll() scan speed. Options: quick, extra, slow, full
|
||||
export DOS_MICROG_INCLUDED="NLP"; #Determines inclusion of microG. Options: NONE, NLP, FULL
|
||||
export DOS_HOSTS_BLOCKING=true; #Switch to false to prevent inclusion of our HOSTS file
|
||||
export DOS_HOSTS_BLOCKING_LIST="https://spotco.us/hosts"; #Must be in the format "127.0.0.0 bad.domain.tld". XXX: /hosts is built from non-commercial use files, switch to /hsc for release
|
||||
export DOS_OVERCLOCKS_ENABLED=true; #Switch to false to disable overclocks
|
||||
export DOS_STRONG_ENCRYPTION_ENABLED=false; #Switch to true to enable AES-256bit encryption XXX: THIS WILL **DESTROY** EXISTING INSTALLS!
|
||||
export DOS_NON_COMMERCIAL_USE_PATCHES=false; #Switch to false to prevent inclusion of non-commercial use patches
|
||||
|
||||
export REBRAND_NAME="DivestOS";
|
||||
export REBRAND_ZIP_PREFIX="divested";
|
||||
export REBRAND_BOOTANIMATION_FONT="Fira-Sans-Bold"; #Options: $ convert -list font
|
||||
export REBRAND_BOOTANIMATION_STYLE="plasma"; #Options: gradient, plasma
|
||||
#export REBRAND_BOOTANIMATION_COLOR="#FF5722-#FF8A65"; #gradient
|
||||
export REBRAND_BOOTANIMATION_COLOR="#FF5722-#03A9F4"; #plasma
|
||||
export REBRAND_LINK_ABOUT="https://divestos.xyz/index.php?page=about";
|
||||
export REBRAND_LINK_PRIVACY="https://divestos.xyz/index.php?page=privacy_policy";
|
||||
export REBRAND_SERVER_OTA="https://divestos.xyz/updater.php";
|
||||
export DOS_BRANDING_NAME="DivestOS";
|
||||
export DOS_BRANDING_ZIP_PREFIX="divested";
|
||||
export DOS_BRANDING_BOOTANIMATION_FONT="Fira-Sans-Bold"; #Options: $ convert -list font
|
||||
export DOS_BRANDING_BOOTANIMATION_STYLE="plasma"; #Options: gradient, plasma
|
||||
#export DOS_BRANDING_BOOTANIMATION_COLOR="#FF5722-#FF8A65"; #gradient
|
||||
export DOS_BRANDING_BOOTANIMATION_COLOR="#FF5722-#03A9F4"; #plasma
|
||||
export DOS_BRANDING_LINK_ABOUT="https://divestos.xyz/index.php?page=about";
|
||||
export DOS_BRANDING_LINK_PRIVACY="https://divestos.xyz/index.php?page=privacy_policy";
|
||||
export DOS_BRANDING_SERVER_OTA="https://divestos.xyz/updater.php";
|
||||
|
||||
export DOS_THEME_50="FFCA28"; #Amber 400
|
||||
export DOS_THEME_100="FFC107"; #Amber 500
|
||||
export DOS_THEME_200="FFA726"; #Orange 400
|
||||
export DOS_THEME_300="FF9800"; #Orange 500
|
||||
export DOS_THEME_500="FF5722"; #Deep Orange 500
|
||||
export DOS_THEME_700="E64A19"; #Deep Orange 700
|
||||
#END OF USER CONFIGURABLE OPTIONS
|
||||
|
||||
BUILD_WORKING_DIR=${PWD##*/};
|
||||
@ -53,45 +63,42 @@ else
|
||||
return 1;
|
||||
fi;
|
||||
|
||||
export base=$androidWorkspace"Build/$BUILD_WORKING_DIR/";
|
||||
if [ ! -d "$base" ]; then
|
||||
export DOS_BUILD_BASE=$DOS_WORKSPACE_ROOT"Build/$BUILD_WORKING_DIR/";
|
||||
if [ ! -d "$DOS_BUILD_BASE" ]; then
|
||||
echo "Path mismatch! Please update init.sh!";
|
||||
return 1;
|
||||
fi;
|
||||
|
||||
export prebuiltApps=$androidWorkspace"PrebuiltApps/";
|
||||
export patchesCommon=$androidWorkspace"Patches/Common/";
|
||||
export patches=$androidWorkspace"Patches/$BUILD_WORKING_DIR/";
|
||||
export overclocks=$androidWorkspace"Patches/Overclocks/";
|
||||
export cvePatchesLinux=$androidWorkspace"Patches/Linux/";
|
||||
export cvePatchesAndroid=$androidWorkspace"Patches/Android/";
|
||||
export dosWallpapers=$androidWorkspace"Patches/Wallpapers/";
|
||||
export DOS_PREBUILT_APPS=$DOS_WORKSPACE_ROOT"PrebuiltApps/";
|
||||
export DOS_PATCHES_COMMON=$DOS_WORKSPACE_ROOT"Patches/Common/";
|
||||
export DOS_PATCHES=$DOS_WORKSPACE_ROOT"Patches/$BUILD_WORKING_DIR/";
|
||||
export DOS_PATCHES_OVERCLOCKS=$DOS_WORKSPACE_ROOT"Patches/Overclocks/";
|
||||
export DOS_PATCHES_LINUX_CVES=$DOS_WORKSPACE_ROOT"Patches/Linux/";
|
||||
export DOS_PATCHES_ANDROID_CVES=$DOS_WORKSPACE_ROOT"Patches/Android/";
|
||||
export DOS_WALLPAPERS=$DOS_WORKSPACE_ROOT"Patches/Wallpapers/";
|
||||
|
||||
export scriptsCommon=$androidWorkspace"Scripts/Common/";
|
||||
export scripts=$androidWorkspace"Scripts/$BUILD_WORKING_DIR/";
|
||||
if [ ! -d "$scripts" ]; then
|
||||
export DOS_SCRIPTS_COMMON=$DOS_WORKSPACE_ROOT"Scripts/Common/";
|
||||
export DOS_SCRIPTS=$DOS_WORKSPACE_ROOT"Scripts/$BUILD_WORKING_DIR/";
|
||||
if [ ! -d "$DOS_SCRIPTS" ]; then
|
||||
echo "$BUILD_WORKING_DIR is not supported!";
|
||||
return 1;
|
||||
fi;
|
||||
export cveScripts=$scripts"CVE_Patchers/";
|
||||
export DOS_SCRIPTS_CVES=$DOS_SCRIPTS"CVE_Patchers/";
|
||||
|
||||
export SIGNING_KEY_DIR=$androidWorkspace"Signing_Keys";
|
||||
export SIGNING_KEY_DIR=$DOS_SIGNING_KEYS;
|
||||
export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey";
|
||||
|
||||
export ANDROID_HOME="/home/$USER/Android/Sdk";
|
||||
|
||||
export KBUILD_BUILD_USER="emy";
|
||||
export KBUILD_BUILD_HOST="dosbm";
|
||||
|
||||
export ANDROID_JACK_VM_ARGS="-Xmx6144m -Xms512m -Dfile.encoding=UTF-8 -XX:+TieredCompilation";
|
||||
export JACK_SERVER_VM_ARGUMENTS="${ANDROID_JACK_VM_ARGS}";
|
||||
export GRADLE_OPTS="-Xmx2048m";
|
||||
|
||||
source "$scriptsCommon/Functions.sh";
|
||||
source "$scripts/Functions.sh";
|
||||
|
||||
export LC_ALL=C;
|
||||
|
||||
source "$DOS_SCRIPTS_COMMON/Functions.sh";
|
||||
source "$DOS_SCRIPTS/Functions.sh";
|
||||
|
||||
unalias cp &>/dev/null || true;
|
||||
unalias mv &>/dev/null || true;
|
||||
unalias rm &>/dev/null || true;
|
||||
|
Loading…
Reference in New Issue
Block a user