Overhaul variable names

This commit is contained in:
Tad 2018-06-29 00:55:21 -04:00
parent 4917b3ebc7
commit d2ba1ddb20
60 changed files with 3800 additions and 3802 deletions

View File

@ -54,7 +54,7 @@ echo "Deblobbing..."
sepolicy=$sepolicy" atfwd.te"; sepolicy=$sepolicy" atfwd.te";
#AudioFX (Audio Effects) [Qualcomm] #AudioFX (Audio Effects) [Qualcomm]
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then blobs=$blobs"|libasphere.so|libqcbassboost.so|libqcreverb.so|libqcvirt.so|libshoebox.so"; fi; if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then blobs=$blobs"|libasphere.so|libqcbassboost.so|libqcreverb.so|libqcvirt.so|libshoebox.so"; fi;
#Camera #Camera
#Attempted, don't waste your time... #Attempted, don't waste your time...
@ -126,12 +126,12 @@ echo "Deblobbing..."
blobs=$blobs"|iop|libqti-iop-client.so|libqti-iop.so|QPerformance.jar"; blobs=$blobs"|iop|libqti-iop-client.so|libqti-iop.so|QPerformance.jar";
#IMS (VoLTE/Wi-Fi Calling) [Qualcomm] #IMS (VoLTE/Wi-Fi Calling) [Qualcomm]
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|ims.apk|ims.xml|libimsmedia_jni.so"; fi; #IMS (Core) (To support carriers that have phased out 2G) if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|ims.apk|ims.xml|libimsmedia_jni.so"; fi; #IMS (Core) (To support carriers that have phased out 2G)
blobs=$blobs"|imscmlibrary.jar|imscmservice|imscm.xml|imsdatadaemon|imsqmidaemon|imssettings.apk|lib-imsdpl.so|lib-imscamera.so|libimscamera_jni.so|lib-imsqimf.so|lib-imsSDP.so|lib-imss.so|lib-imsvt.so|lib-imsxml.so"; #IMS blobs=$blobs"|imscmlibrary.jar|imscmservice|imscm.xml|imsdatadaemon|imsqmidaemon|imssettings.apk|lib-imsdpl.so|lib-imscamera.so|libimscamera_jni.so|lib-imsqimf.so|lib-imsSDP.so|lib-imss.so|lib-imsvt.so|lib-imsxml.so"; #IMS
blobs=$blobs"|ims_rtp_daemon|lib-rtpcommon.so|lib-rtpcore.so|lib-rtpdaemoninterface.so|lib-rtpsl.so|vendor.qti.imsrtpservice.*.so"; #RTP blobs=$blobs"|ims_rtp_daemon|lib-rtpcommon.so|lib-rtpcore.so|lib-rtpdaemoninterface.so|lib-rtpsl.so|vendor.qti.imsrtpservice.*.so"; #RTP
blobs=$blobs"|lib-dplmedia.so|librcc.so|libvcel.so|libvoice-svc.so|qti_permissions.xml"; #Misc. blobs=$blobs"|lib-dplmedia.so|librcc.so|libvcel.so|libvoice-svc.so|qti_permissions.xml"; #Misc.
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|volte_modem[/]"; fi; if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then blobs=$blobs"|volte_modem[/]"; fi;
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then sepolicy=$sepolicy" ims.te imscm.te imswmsproxy.te"; fi; if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then sepolicy=$sepolicy" ims.te imscm.te imswmsproxy.te"; fi;
#IPA (Internet Packet Accelerator) [Qualcomm] #IPA (Internet Packet Accelerator) [Qualcomm]
#This is actually open source (excluding -diag) #This is actually open source (excluding -diag)
@ -199,7 +199,7 @@ echo "Deblobbing..."
#Time Service [Qualcomm] #Time Service [Qualcomm]
#Requires that android_hardware_sony_timekeep be included in repo manifest #Requires that android_hardware_sony_timekeep be included in repo manifest
if [ "$DEBLOBBER_REPLACE_TIME" = true ]; then if [ "$DOS_DEBLOBBER_REPLACE_TIME" = true ]; then
#blobs=$blobs"|libtime_genoff.so"; #XXX: Breaks radio #blobs=$blobs"|libtime_genoff.so"; #XXX: Breaks radio
blobs=$blobs"|libTimeService.so|time_daemon|TimeService.apk"; blobs=$blobs"|libTimeService.so|time_daemon|TimeService.apk";
sepolicy=$sepolicy" qtimeservice.te"; sepolicy=$sepolicy" qtimeservice.te";
@ -244,16 +244,16 @@ echo "Deblobbing..."
# #
deblobDevice() { deblobDevice() {
devicePath="$1"; devicePath="$1";
cd "$base$devicePath"; cd "$DOS_BUILD_BASE$devicePath";
if [ "${PWD##*/}" == "flo" ] || [ "${PWD##*/}" == "mako" ] || [ "${PWD##*/}" == "kona-common" ] || [ "${PWD##*/}" == "n5110" ] || [ "${PWD##*/}" == "smdk4412-common" ] || [ "${PWD##*/}" == "hdx-common" ] || [ "${PWD##*/}" == "thor" ] || [ "${PWD##*/}" == "flounder" ]; then #Some devices don't need/like TimeKeep if [ "${PWD##*/}" == "flo" ] || [ "${PWD##*/}" == "mako" ] || [ "${PWD##*/}" == "kona-common" ] || [ "${PWD##*/}" == "n5110" ] || [ "${PWD##*/}" == "smdk4412-common" ] || [ "${PWD##*/}" == "hdx-common" ] || [ "${PWD##*/}" == "thor" ] || [ "${PWD##*/}" == "flounder" ]; then #Some devices don't need/like TimeKeep
replaceTime="false"; replaceTime="false";
fi; fi;
if [ "$DEBLOBBER_REPLACE_TIME" = false ]; then replaceTime="false"; fi; #Disable replacement if [ "$DOS_DEBLOBBER_REPLACE_TIME" = false ]; then replaceTime="false"; fi; #Disable replacement
if [ -f Android.mk ]; then if [ -f Android.mk ]; then
#Some devices store these in a dedicated firmware partition, others in /system/vendor/firmware, either way the following are just symlinks #Some devices store these in a dedicated firmware partition, others in /system/vendor/firmware, either way the following are just symlinks
#sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(CMN_SYMLINKS)//' Android.mk; #Remove CMN firmware #sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(CMN_SYMLINKS)//' Android.mk; #Remove CMN firmware
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(DXHDCP2_SYMLINKS)//' Android.mk; #Remove Discretix firmware sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(DXHDCP2_SYMLINKS)//' Android.mk; #Remove Discretix firmware
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(IMS_SYMLINKS)//' Android.mk; fi; #Remove IMS firmware if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(IMS_SYMLINKS)//' Android.mk; fi; #Remove IMS firmware
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(PLAYREADY_SYMLINKS)//' Android.mk; #Remove Microsoft Playready firmware sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(PLAYREADY_SYMLINKS)//' Android.mk; #Remove Microsoft Playready firmware
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WIDEVINE_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WIDEVINE_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WV_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WV_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
@ -294,7 +294,7 @@ deblobDevice() {
sed -i 's/ro.bluetooth.emb_wp_mode=true/ro.bluetooth.emb_wp_mode=false/' system.prop; #Disable WiPower sed -i 's/ro.bluetooth.emb_wp_mode=true/ro.bluetooth.emb_wp_mode=false/' system.prop; #Disable WiPower
sed -i 's/ro.bluetooth.wipower=true/ro.bluetooth.wipower=false/' system.prop; #Disable WiPower sed -i 's/ro.bluetooth.wipower=true/ro.bluetooth.wipower=false/' system.prop; #Disable WiPower
#Disable IMS #Disable IMS
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
sed -i 's/persist.data.iwlan.enable=true/persist.data.iwlan.enable=false/' system.prop; sed -i 's/persist.data.iwlan.enable=true/persist.data.iwlan.enable=false/' system.prop;
sed -i 's/persist.ims.volte=true/persist.ims.volte=false/' system.prop; sed -i 's/persist.ims.volte=true/persist.ims.volte=false/' system.prop;
sed -i 's/persist.ims.vt=true/persist.ims.vt=false/' system.prop; sed -i 's/persist.ims.vt=true/persist.ims.vt=false/' system.prop;
@ -314,7 +314,7 @@ deblobDevice() {
if [ -f init/init_*.cpp ]; then if [ -f init/init_*.cpp ]; then
sed -i 's/property_set("persist.rcs.supported", ".");/property_set("persist.rcs.supported", "0");/' init/init_*.cpp; #Disable RCS sed -i 's/property_set("persist.rcs.supported", ".");/property_set("persist.rcs.supported", "0");/' init/init_*.cpp; #Disable RCS
#Disable IMS #Disable IMS
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
sed -i 's/property_set("persist.ims.volte", "true");/property_set("persist.ims.volte", "false");/' init/init_*.cpp; sed -i 's/property_set("persist.ims.volte", "true");/property_set("persist.ims.volte", "false");/' init/init_*.cpp;
sed -i 's/property_set("persist.ims.vt", "true");/property_set("persist.ims.vt", "false");/' init/init_*.cpp; sed -i 's/property_set("persist.ims.vt", "true");/property_set("persist.ims.vt", "false");/' init/init_*.cpp;
sed -i 's/property_set("persist.radio.calls.on.ims", "true");/property_set("persist.radio.calls.on.ims", "false");/' init/init_*.cpp; sed -i 's/property_set("persist.radio.calls.on.ims", "true");/property_set("persist.radio.calls.on.ims", "false");/' init/init_*.cpp;
@ -328,7 +328,7 @@ deblobDevice() {
#sed -i 's|<bool name="config_enableWifiDisplay">true</bool>|<bool name="config_enableWifiDisplay">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; #sed -i 's|<bool name="config_enableWifiDisplay">true</bool>|<bool name="config_enableWifiDisplay">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
sed -i 's|<bool name="config_uiBlurEnabled">true</bool>|<bool name="config_uiBlurEnabled">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; #Disable UIBlur sed -i 's|<bool name="config_uiBlurEnabled">true</bool>|<bool name="config_uiBlurEnabled">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; #Disable UIBlur
#Disable IMS #Disable IMS
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
sed -i 's|<bool name="config_carrier_volte_available">true</bool>|<bool name="config_carrier_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; sed -i 's|<bool name="config_carrier_volte_available">true</bool>|<bool name="config_carrier_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
sed -i 's|<bool name="config_carrier_vt_available">true</bool>|<bool name="config_carrier_vt_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; sed -i 's|<bool name="config_carrier_vt_available">true</bool>|<bool name="config_carrier_vt_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
sed -i 's|<bool name="config_device_volte_available">true</bool>|<bool name="config_device_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml; sed -i 's|<bool name="config_device_volte_available">true</bool>|<bool name="config_device_volte_available">false</bool>|' overlay/frameworks/base/core/res/res/values/config.xml;
@ -352,40 +352,40 @@ deblobDevice() {
rm -rf board/qcom-wipower.mk product/qcom-wipower.mk; #Remove WiPower makefiles rm -rf board/qcom-wipower.mk product/qcom-wipower.mk; #Remove WiPower makefiles
if [ -f setup-makefiles.sh ]; then if [ -f setup-makefiles.sh ]; then
awk -i inplace '!/'$blobs'/' ./*proprietary*.txt; #Remove all blob references from blob manifest awk -i inplace '!/'$blobs'/' ./*proprietary*.txt; #Remove all blob references from blob manifest
bash -c "cd $base$devicePath && ./setup-makefiles.sh"; #Update the makefiles bash -c "cd $DOS_BUILD_BASE$devicePath && ./setup-makefiles.sh"; #Update the makefiles
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f deblobDevice; export -f deblobDevice;
deblobKernel() { deblobKernel() {
kernelPath="$1"; kernelPath="$1";
cd "$base$kernelPath"; cd "$DOS_BUILD_BASE$kernelPath";
rm -rf $kernels; rm -rf $kernels;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f deblobKernel; export -f deblobKernel;
deblobSepolicy() { deblobSepolicy() {
sepolicyPath="$1"; sepolicyPath="$1";
cd "$base$sepolicyPath"; cd "$DOS_BUILD_BASE$sepolicyPath";
if [ -d sepolicy ]; then if [ -d sepolicy ]; then
cd sepolicy; cd sepolicy;
rm -f $sepolicy; rm -f $sepolicy;
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f deblobSepolicy; export -f deblobSepolicy;
deblobVendors() { deblobVendors() {
cd "$base"; cd "$DOS_BUILD_BASE";
find vendor -regextype posix-extended -regex '.*('$blobs')' -type f -delete; #Delete all blobs find vendor -regextype posix-extended -regex '.*('$blobs')' -type f -delete; #Delete all blobs
} }
export -f deblobVendors; export -f deblobVendors;
deblobVendor() { deblobVendor() {
makefile="$1"; makefile="$1";
cd "$base"; cd "$DOS_BUILD_BASE";
awk -i inplace '!/'$blobs'/' "$makefile"; #Remove all blob references from makefile awk -i inplace '!/'$blobs'/' "$makefile"; #Remove all blob references from makefile
} }
export -f deblobVendor; export -f deblobVendor;
@ -409,6 +409,6 @@ rm -rf vendor/samsung/nodevice;
#END OF DEBLOBBING #END OF DEBLOBBING
# #
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Deblobbing complete!" echo "Deblobbing complete!"

View File

@ -15,7 +15,7 @@
#You should have received a copy of the GNU General Public License #You should have received a copy of the GNU General Public License
#along with this program. If not, see <https://www.gnu.org/licenses/>. #along with this program. If not, see <https://www.gnu.org/licenses/>.
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then
echo -e "\e[0;33mWARNING: YOU HAVE ENABLED PATCHES THAT WHILE ARE OPEN SOURCE ARE ALSO ENCUMBERED BY RESTRICTIVE LICENSES\e[0m"; echo -e "\e[0;33mWARNING: YOU HAVE ENABLED PATCHES THAT WHILE ARE OPEN SOURCE ARE ALSO ENCUMBERED BY RESTRICTIVE LICENSES\e[0m";
echo -e "\e[0;33mPLEASE SEE THE 'LICENSES' FILE AT THE ROOT OF THIS REPOSITORY FOR MORE INFORMATION\e[0m"; echo -e "\e[0;33mPLEASE SEE THE 'LICENSES' FILE AT THE ROOT OF THIS REPOSITORY FOR MORE INFORMATION\e[0m";
echo -e "\e[0;33mDISABLE THEM BY SETTING 'NON_COMMERCIAL_USE_PATCHES' TO 'false' IN 'Scripts/init.sh'\e[0m"; echo -e "\e[0;33mDISABLE THEM BY SETTING 'NON_COMMERCIAL_USE_PATCHES' TO 'false' IN 'Scripts/init.sh'\e[0m";
@ -23,15 +23,14 @@ if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then
fi; fi;
startPatcher() { startPatcher() {
#$cvePatcher must be set! java -jar "$DOS_PATCHER_BINARY" patch "$DOS_BUILD_BASE" "$DOS_WORKSPACE_ROOT""Patches/" "$DOS_SCRIPTS_CVES" $1;
java -jar "$cvePatcher" patch "$base" "$androidWorkspace""Patches/" "$cveScripts" $1;
} }
export -f startPatcher; export -f startPatcher;
enter() { enter() {
echo "================================================================================================" echo "================================================================================================"
dir="$1"; dir="$1";
cd "$base$dir"; cd "$DOS_BUILD_BASE$dir";
echo "[ENTERING] $dir"; echo "[ENTERING] $dir";
} }
export -f enter; export -f enter;
@ -53,14 +52,14 @@ scanForMalware() {
excludes="--exclude-dir=\".git\" --exclude-dir=\".repo\""; excludes="--exclude-dir=\".git\" --exclude-dir=\".repo\"";
scanQueue="$2"; scanQueue="$2";
if [ "$1" = true ]; then if [ "$1" = true ]; then
if [ "$MALWARE_SCAN_SETTING" != "quick" ] || [ "$MALWARE_SCAN_SETTING" = "extra" ]; then if [ "$DOS_MALWARE_SCAN_SETTING" != "quick" ] || [ "$DOS_MALWARE_SCAN_SETTING" = "extra" ]; then
scanQueue=$scanQueue" $base/frameworks $base/vendor"; scanQueue=$scanQueue" $DOS_BUILD_BASE/frameworks $DOS_BUILD_BASE/vendor";
fi; fi;
if [ "$MALWARE_SCAN_SETTING" = "slow" ]; then if [ "$DOS_MALWARE_SCAN_SETTING" = "slow" ]; then
scanQueue=$scanQueue"$base/external $base/prebuilts $base/toolchain $base/tools"; scanQueue=$scanQueue"$DOS_BUILD_BASE/external $DOS_BUILD_BASE/prebuilts $DOS_BUILD_BASE/toolchain $DOS_BUILD_BASE/tools";
fi; fi;
if [ "$MALWARE_SCAN_SETTING" = "full" ]; then if [ "$DOS_MALWARE_SCAN_SETTING" = "full" ]; then
scanQueue="$base"; scanQueue="$DOS_BUILD_BASE";
fi; fi;
fi; fi;
du -hsc "$scanQueue"; du -hsc "$scanQueue";
@ -116,12 +115,12 @@ audit2allowADB() {
export -f audit2allowADB; export -f audit2allowADB;
disableDexPreOpt() { disableDexPreOpt() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
sed -i "s/WITH_DEXPREOPT := true/WITH_DEXPREOPT := false/" BoardConfig.mk; sed -i "s/WITH_DEXPREOPT := true/WITH_DEXPREOPT := false/" BoardConfig.mk;
echo "Disabled dexpreopt"; echo "Disabled dexpreopt";
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f disableDexPreOpt; export -f disableDexPreOpt;
@ -134,9 +133,9 @@ compressRamdisks() {
export -f compressRamdisks; export -f compressRamdisks;
enhanceLocation() { enhanceLocation() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
#Enable GLONASS #Enable GLONASS
if [ "$GLONASS_FORCED_ENABLE" = false ]; then if [ "$DOS_GLONASS_FORCED_ENABLE" = false ]; then
sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT/A_GLONASS_POS_PROTOCOL_SELECT/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT/A_GLONASS_POS_PROTOCOL_SELECT/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true;
sed -i 's/A_GLONASS_POS_PROTOCOL_SELECT = 0.*/A_GLONASS_POS_PROTOCOL_SELECT = 15/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; sed -i 's/A_GLONASS_POS_PROTOCOL_SELECT = 0.*/A_GLONASS_POS_PROTOCOL_SELECT = 15/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true;
sed -i 's|A_GLONASS_POS_PROTOCOL_SELECT=0.*</item>|A_GLONASS_POS_PROTOCOL_SELECT=15</item>|' overlay/frameworks/base/core/res/res/values-*/*.xml &>/dev/null || true; sed -i 's|A_GLONASS_POS_PROTOCOL_SELECT=0.*</item>|A_GLONASS_POS_PROTOCOL_SELECT=15</item>|' overlay/frameworks/base/core/res/res/values-*/*.xml &>/dev/null || true;
@ -159,33 +158,33 @@ enhanceLocation() {
fi; fi;
fi; fi;
echo "Enhanced location services for $1"; echo "Enhanced location services for $1";
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enhanceLocation; export -f enhanceLocation;
enableZram() { enableZram() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
sed -i 's|#/dev/block/zram0|/dev/block/zram0|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true; sed -i 's|#/dev/block/zram0|/dev/block/zram0|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true;
echo "Enabled zram for $1"; echo "Enabled zram for $1";
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableZram; export -f enableZram;
enableForcedEncryption() { enableForcedEncryption() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
sed -i 's|encryptable=/|forceencrypt=/|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true; sed -i 's|encryptable=/|forceencrypt=/|' fstab.* root/fstab.* rootdir/fstab.* rootdir/etc/fstab.* &>/dev/null || true;
echo "Enabled forceencrypt for $1"; echo "Enabled forceencrypt for $1";
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableForcedEncryption; export -f enableForcedEncryption;
enableStrongEncryption() { enableStrongEncryption() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
echo "TARGET_WANTS_STRONG_ENCRYPTION := true" >> BoardConfig.mk; echo "TARGET_WANTS_STRONG_ENCRYPTION := true" >> BoardConfig.mk;
echo "Enabled AES-256 encryption for $1"; echo "Enabled AES-256 encryption for $1";
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableStrongEncryption; export -f enableStrongEncryption;
@ -207,43 +206,43 @@ changeDefaultDNS() {
dnsPrimaryV6=""; dnsPrimaryV6="";
dnsSecondary=""; dnsSecondary="";
dnsSecondaryV6=""; dnsSecondaryV6="";
if [ -z "$DNS_PRESET"]; then if [ -z "$DNS_PRESET" ]; then
if [[ "$DEFAULT_DNS_PRESET" == "Cloudflare" ]]; then #https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/ if [[ "$DOS_DEFAULT_DNS_PRESET" == "Cloudflare" ]]; then #https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/
dnsPrimary="1.0.0.1"; dnsPrimary="1.0.0.1";
dnsPrimaryV6="2606:4700:4700::1001"; dnsPrimaryV6="2606:4700:4700::1001";
dnsSecondary="1.1.1.1"; dnsSecondary="1.1.1.1";
dnsSecondaryV6="2606:4700:4700::1111"; dnsSecondaryV6="2606:4700:4700::1111";
elif [[ "$DEFAULT_DNS_PRESET" == "OpenNIC" ]]; then #https://servers.opennicproject.org/edit.php?srv=ns3.any.dns.opennic.glue elif [[ "$DOS_DEFAULT_DNS_PRESET" == "OpenNIC" ]]; then #https://servers.opennicproject.org/edit.php?srv=ns3.any.dns.opennic.glue
dnsPrimary="169.239.202.202"; dnsPrimary="169.239.202.202";
dnsPrimaryV6="2a05:dfc7:5353::53"; dnsPrimaryV6="2a05:dfc7:5353::53";
dnsSecondary="185.121.177.177"; dnsSecondary="185.121.177.177";
dnsSecondaryV6="2a05:dfc7:5::53"; dnsSecondaryV6="2a05:dfc7:5::53";
elif [[ "$DEFAULT_DNS_PRESET" == "DNSWATCH" ]]; then #https://dns.watch elif [[ "$DOS_DEFAULT_DNS_PRESET" == "DNSWATCH" ]]; then #https://dns.watch
dnsPrimary="84.200.69.80"; dnsPrimary="84.200.69.80";
dnsPrimaryV6="2001:1608:10:25::1c04:b12f"; dnsPrimaryV6="2001:1608:10:25::1c04:b12f";
dnsSecondary="84.200.70.40"; dnsSecondary="84.200.70.40";
dnsSecondaryV6="2001:1608:10:25::9249:d69b"; dnsSecondaryV6="2001:1608:10:25::9249:d69b";
elif [[ "$DEFAULT_DNS_PRESET" == "Google" ]]; then #https://developers.google.com/speed/public-dns/privacy elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Google" ]]; then #https://developers.google.com/speed/public-dns/privacy
dnsPrimary="8.8.8.8"; dnsPrimary="8.8.8.8";
dnsPrimaryV6="2001:4860:4860::8888"; dnsPrimaryV6="2001:4860:4860::8888";
dnsSecondary="8.8.4.4"; dnsSecondary="8.8.4.4";
dnsSecondaryV6="2001:4860:4860::8844"; dnsSecondaryV6="2001:4860:4860::8844";
elif [[ "$DEFAULT_DNS_PRESET" == "OpenDNS" ]]; then #https://www.cisco.com/c/en/us/about/legal/privacy-full.html elif [[ "$DOS_DEFAULT_DNS_PRESET" == "OpenDNS" ]]; then #https://www.cisco.com/c/en/us/about/legal/privacy-full.html
dnsPrimary="208.67.222.222"; dnsPrimary="208.67.222.222";
dnsPrimaryV6="2620:0:ccc::2"; dnsPrimaryV6="2620:0:ccc::2";
dnsSecondary="208.67.220.220"; dnsSecondary="208.67.220.220";
dnsSecondaryV6="2620:0:ccd::2"; dnsSecondaryV6="2620:0:ccd::2";
elif [[ "$DEFAULT_DNS_PRESET" == "Quad9" ]]; then #https://www.quad9.net/privacy/ elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Quad9" ]]; then #https://www.quad9.net/privacy/
dnsPrimary="9.9.9.9"; dnsPrimary="9.9.9.9";
dnsPrimaryV6="2620:fe::fe"; dnsPrimaryV6="2620:fe::fe";
dnsSecondary="149.112.112.112"; dnsSecondary="149.112.112.112";
dnsSecondaryV6="2620:fe::fe"; #no secondary available dnsSecondaryV6="2620:fe::fe"; #no secondary available
elif [[ "$DEFAULT_DNS_PRESET" == "Quad9U" ]]; then #https://www.quad9.net/privacy/ elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Quad9U" ]]; then #https://www.quad9.net/privacy/
dnsPrimary="9.9.9.10"; dnsPrimary="9.9.9.10";
dnsPrimaryV6="2620:fe::10"; dnsPrimaryV6="2620:fe::10";
dnsSecondary="149.112.112.10"; dnsSecondary="149.112.112.10";
dnsSecondaryV6="2620:fe::10"; #no secondary available dnsSecondaryV6="2620:fe::10"; #no secondary available
elif [[ "$DEFAULT_DNS_PRESET" == "Verisign" ]]; then #https://www.verisign.com/en_US/security-services/public-dns/terms-of-service/index.xhtml elif [[ "$DOS_DEFAULT_DNS_PRESET" == "Verisign" ]]; then #https://www.verisign.com/en_US/security-services/public-dns/terms-of-service/index.xhtml
dnsPrimary="64.6.64.6"; dnsPrimary="64.6.64.6";
dnsPrimaryV6="2620:74:1b::1:1"; dnsPrimaryV6="2620:74:1b::1:1";
dnsSecondary="64.6.65.6"; dnsSecondary="64.6.65.6";
@ -268,7 +267,7 @@ editKernelLocalversion() {
export -f editKernelLocalversion; export -f editKernelLocalversion;
hardenDefconfig() { hardenDefconfig() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
#Attempts to enable/disable supported options to increase security #Attempts to enable/disable supported options to increase security
#See https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings #See https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
@ -304,6 +303,6 @@ hardenDefconfig() {
editKernelLocalversion "-dos"; editKernelLocalversion "-dos";
echo "Hardened defconfig for $1"; echo "Hardened defconfig for $1";
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f hardenDefconfig; export -f hardenDefconfig;

View File

@ -17,24 +17,24 @@
#Attempts to patch kernels to be more secure #Attempts to patch kernels to be more secure
#Is this the best way to do it? No. Is it the proper way to do it? No. Do I wish device maintainers would do it? Yes. Is it better then nothing? YES! #Is this the best way to do it? No. Is it the proper way to do it? No. Is it better then nothing? YES!
#Troubleshooting a patch #Troubleshooting a patch
##If you get an error like the following ##If you get an error like the following
#> ../../../../../../kernel/nextbit/msm8992/drivers/media/platform/msm/camera_v2/sensor/actuator/msm_actuator.c:1116:32: error: 'ACTUATOR_POWER_UP' undeclared (first use in this function) #> ../../../../../../kernel/nextbit/msm8992/drivers/media/platform/msm/camera_v2/sensor/actuator/msm_actuator.c:1116:32: error: 'ACTUATOR_POWER_UP' undeclared (first use in this function)
#$ cd $cvePatchesLinux #$ cd $DOS_CVES_LINUX
#$ grep "ACTUATOR_POWER_UP" . -Ri #$ grep "ACTUATOR_POWER_UP" . -Ri
#> ./CVE-2018-3585/3.10/0001.patch:+ if (a_ctrl->actuator_state != ACTUATOR_POWER_UP) { #> ./CVE-2018-3585/3.10/0001.patch:+ if (a_ctrl->actuator_state != ACTUATOR_POWER_UP) {
#$ nano $cveScripts/android_kernel_nextbit_msm8992.sh #$ nano $DOS_SCRIPTS_CVES/android_kernel_nextbit_msm8992.sh
# Comment out CVE-2018-3585/3.10/0001.patch # Comment out CVE-2018-3585/3.10/0001.patch
echo "Patching CVEs..."; echo "Patching CVEs...";
cd "$base"; cd "$DOS_BUILD_BASE";
for patcher in "$cveScripts"/*.sh; do for patcher in "$DOS_SCRIPTS_CVES"/*.sh; do
echo "Running $patcher"; echo "Running $patcher";
source "$patcher"; source "$patcher";
done; done;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Patched CVEs!"; echo "Patched CVEs!";

View File

@ -1,14 +1,14 @@
#!/bin/bash #!/bin/bash
#export desc='/O=Divested Computing, Inc./CN=DivestOS/emailAddress=support@divestos.xyz'; #desc='/O=Divested Computing, Inc./CN=DivestOS/emailAddress=support@divestos.xyz';
export desc='/O=Example/CN=ExampleOS/emailAddress=support@example.com'; desc='/O=Example/CN=ExampleOS/emailAddress=support@example.com';
export type='rsa'; #Options: rsa, ec type='rsa'; #Options: rsa, ec
"$base"/development/tools/make_key extra "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key extra "$desc" "$type";
"$base"/development/tools/make_key media "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key media "$desc" "$type";
"$base"/development/tools/make_key platform "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key platform "$desc" "$type";
"$base"/development/tools/make_key releasekey "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key releasekey "$desc" "$type";
"$base"/development/tools/make_key shared "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key shared "$desc" "$type";
"$base"/development/tools/make_key verity "$desc" "$type"; "$DOS_BUILD_BASE"/development/tools/make_key verity "$desc" "$type";
echo "Please copy created keys to your signing keys directory. Keep them safe!"; echo "Please copy created keys to your signing keys directory. Keep them safe!";

View File

@ -1,94 +1,94 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/amazon/hdx-common" cd "$DOS_BUILD_BASE""kernel/amazon/hdx-common"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2012-6704/^3.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6704/^3.5/0001.patch
git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-7822/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7822/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2014-8709/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8709/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10230/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2488/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2488/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3893/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3893/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8417/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8444/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8890/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
editKernelLocalversion "-dos.p90" editKernelLocalversion "-dos.p90"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,58 +1,58 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/asus/grouper" cd "$DOS_BUILD_BASE""kernel/asus/grouper"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9895/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9895/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8890/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
editKernelLocalversion "-dos.p54" editKernelLocalversion "-dos.p54"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,74 +1,74 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/asus/msm8916" cd "$DOS_BUILD_BASE""kernel/asus/msm8916"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13174/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p70" editKernelLocalversion "-dos.p70"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,35 +1,35 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/fairphone/msm8974" cd "$DOS_BUILD_BASE""kernel/fairphone/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p31" editKernelLocalversion "-dos.p31"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,235 +1,235 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/google/marlin" cd "$DOS_BUILD_BASE""kernel/google/marlin"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0044.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15+/0001.patch
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2847/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-11013/qcacld-2.0/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11013/qcacld-2.0/0002.patch
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11028/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11028/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-11034/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11067/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11067/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
git apply $cvePatchesLinux/CVE-2017-13219/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13219/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9690/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9690/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-5853/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
editKernelLocalversion "-dos.p231" editKernelLocalversion "-dos.p231"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,51 +1,51 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/google/msm" cd "$DOS_BUILD_BASE""kernel/google/msm"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080-Extra/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p47" editKernelLocalversion "-dos.p47"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,38 +1,38 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/htc/msm8974" cd "$DOS_BUILD_BASE""kernel/htc/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p34" editKernelLocalversion "-dos.p34"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,120 +1,120 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/htc/msm8994" cd "$DOS_BUILD_BASE""kernel/htc/msm8994"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9903/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9903/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8942/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8942/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
#git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0445/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0445/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0621/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0621/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
#git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
editKernelLocalversion "-dos.p116" editKernelLocalversion "-dos.p116"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,169 +1,169 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/huawei/angler" cd "$DOS_BUILD_BASE""kernel/huawei/angler"
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13174/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13174/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
editKernelLocalversion "-dos.p165" editKernelLocalversion "-dos.p165"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,161 +1,161 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/bullhead" cd "$DOS_BUILD_BASE""kernel/lge/bullhead"
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-14903/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14903/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9710/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
editKernelLocalversion "-dos.p157" editKernelLocalversion "-dos.p157"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,40 +1,40 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/g3" cd "$DOS_BUILD_BASE""kernel/lge/g3"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p36" editKernelLocalversion "-dos.p36"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,48 +1,48 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/hammerhead" cd "$DOS_BUILD_BASE""kernel/lge/hammerhead"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p44" editKernelLocalversion "-dos.p44"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,23 +1,23 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/mako" cd "$DOS_BUILD_BASE""kernel/lge/mako"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
editKernelLocalversion "-dos.p19" editKernelLocalversion "-dos.p19"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,31 +1,31 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/msm8974" cd "$DOS_BUILD_BASE""kernel/lge/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2015-8939/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p27" editKernelLocalversion "-dos.p27"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,183 +1,183 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/msm8992" cd "$DOS_BUILD_BASE""kernel/lge/msm8992"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3951/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3951/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-5829/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9754/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9754/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-10663/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-10997/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10997/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-10998/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-10999/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10999/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11056/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18169/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18169/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8245/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8245/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8260/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8265/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9696/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9720/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9724/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9724/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9725/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9725/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0001/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.10/0003.patch
git apply $cvePatchesLinux/LVT-2017-0002/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.10/0002.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
editKernelLocalversion "-dos.p179" editKernelLocalversion "-dos.p179"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,148 +1,148 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/msm8996" cd "$DOS_BUILD_BASE""kernel/lge/msm8996"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.18/0002-Alt2.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.18/0002-Alt2.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18066/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p144" editKernelLocalversion "-dos.p144"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,85 +1,85 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/motorola/msm8916" cd "$DOS_BUILD_BASE""kernel/motorola/msm8916"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-8950/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8950/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3902/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p81" editKernelLocalversion "-dos.p81"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,211 +1,211 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/motorola/msm8992" cd "$DOS_BUILD_BASE""kernel/motorola/msm8992"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3/0003.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8019/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8019/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0026.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/qcacld-2.0/0026.patch
git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0027.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/qcacld-2.0/0027.patch
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10230/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10232/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10232/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3860/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3860/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3902/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3907/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-3938/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3938/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5853/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8417/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8444/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8477/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8477/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0427/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0427/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0452/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0454/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0454/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0460/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0460/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0630/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0631/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0631/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-10997/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10997/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-10998/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11056/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
#git apply $cvePatchesLinux/CVE-2017-14880/3.10/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14880/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15833/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18169/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18169/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0005.patch
git apply $cvePatchesLinux/CVE-2017-7187/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0006.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8236/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8260/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8265/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9696/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9699/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9702/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9703/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9720/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-9724/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9724/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9725/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9725/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
editKernelLocalversion "-dos.p207" editKernelLocalversion "-dos.p207"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,225 +1,225 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/motorola/msm8996" cd "$DOS_BUILD_BASE""kernel/motorola/msm8996"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10200/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10284/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10284/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2016-10287/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10287/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10294/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10294/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10295/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10295/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0457/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-0460/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0460/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-0462/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0462/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-0576/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0576/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0607/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0008.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0009.patch
git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000364/3.18/0010.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11001/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/qcacld-2.0/0002.patch
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0003.patch
git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/qcacld-2.0/0004.patch
git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11016/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11025/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11030/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11032/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11044/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11046/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11047/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11048/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11049/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11059/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11091/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11093/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12146/3.16+/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0005.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0006.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0022.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14873/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14884/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14891/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14897/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15826/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15826/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15834/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15847/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-6423/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6423/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6425/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6425/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6426/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7369/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7369/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-7370/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7370/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2017-8233/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8233/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-8236/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8242/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8242/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8244/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8244/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8251/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8261/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8261/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8262/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8262/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8264/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8264/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-8271/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8271/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-8272/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8272/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9676/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9677/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9677/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9678/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9678/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9680/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9680/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9682/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9682/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9686/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9687/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9691/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9691/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9692/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9692/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9696/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9697/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9699/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9699/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9700/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9716/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9720/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9722/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-3598/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3598/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0004/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-10288/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10288/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p221" editKernelLocalversion "-dos.p221"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,76 +1,76 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/nextbit/msm8992" cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
#git apply $cvePatchesLinux/CVE-2018-3585/3.10/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p72" editKernelLocalversion "-dos.p72"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,58 +1,58 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/oneplus/msm8974" cd "$DOS_BUILD_BASE""kernel/oneplus/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p54" editKernelLocalversion "-dos.p54"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,63 +1,63 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/samsung/jf" cd "$DOS_BUILD_BASE""kernel/samsung/jf"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10233/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3854/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6791/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6791/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8402/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0791/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p59" editKernelLocalversion "-dos.p59"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,32 +1,32 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/samsung/msm8974" cd "$DOS_BUILD_BASE""kernel/samsung/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p28" editKernelLocalversion "-dos.p28"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,53 +1,53 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/samsung/smdk4412" cd "$DOS_BUILD_BASE""kernel/samsung/smdk4412"
git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3153/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9895/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9895/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8463/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8463/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
editKernelLocalversion "-dos.p49" editKernelLocalversion "-dos.p49"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,141 +1,141 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/samsung/universal8890" cd "$DOS_BUILD_BASE""kernel/samsung/universal8890"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0002.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0010.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0011.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0013.patch
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3/0003.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9940/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9940/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8575/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8785/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8839/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8839/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2015-8962/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8966/3.15+/0001.patch
git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9016/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10088/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3156/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3775/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3775/3.18/0004.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4794/3.18+/0001.patch
git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4794/3.18+/0002.patch
git apply $cvePatchesLinux/CVE-2016-6828/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
#git apply $cvePatchesLinux/CVE-2016-7917/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7917/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8399/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8399/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9793/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0523/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0523/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10996/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0011.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0003.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16529/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17807/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7495/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7618/^4.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9698/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
editKernelLocalversion "-dos.p137" editKernelLocalversion "-dos.p137"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -78,5 +78,5 @@ sed -i 's/def_forward_lookup">1/def_forward_lookup">0/' packages/CMSettingsProvi
sed -i 's/def_people_lookup">1/def_people_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml; sed -i 's/def_people_lookup">1/def_people_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml;
sed -i 's/def_reverse_lookup">1/def_reverse_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml; sed -i 's/def_reverse_lookup">1/def_reverse_lookup">0/' packages/CMSettingsProvider/res/values/defaults.xml;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Default settings changed!"; echo "Default settings changed!";

View File

@ -28,8 +28,8 @@ resetWorkspace() {
export -f resetWorkspace; export -f resetWorkspace;
scanWorkspaceForMalware() { scanWorkspaceForMalware() {
scanQueue="$base/abi $base/android $base/art $base/bionic $base/bootable $base/build $base/dalvik $base/device $base/hardware $base/libcore $base/libnativehelper $base/ndk $base/packages $base/pdk $base/platform_testing $base/sdk $base/system"; scanQueue="$DOS_BUILD_BASE/abi $DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/ndk $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
scanQueue=$scanQueue" $base/vendor/cm $base/vendor/cmsdk"; scanQueue=$scanQueue" $DOS_BUILD_BASE/vendor/cm $DOS_BUILD_BASE/vendor/cmsdk";
scanForMalware true $scanQueue; scanForMalware true $scanQueue;
} }
export -f scanWorkspaceForMalware; export -f scanWorkspaceForMalware;
@ -47,7 +47,7 @@ buildDeviceDebug() {
export -f buildDeviceDebug; export -f buildDeviceDebug;
buildAll() { buildAll() {
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
#Select devices are userdebug due to SELinux policy issues #Select devices are userdebug due to SELinux policy issues
#TODO: Add victara, athene, us997, us996, pme, t0lte, hlte #TODO: Add victara, athene, us997, us996, pme, t0lte, hlte
@ -88,28 +88,28 @@ buildAll() {
export -f buildAll; export -f buildAll;
patchWorkspace() { patchWorkspace() {
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$prebuiltApps $base/build $base/device $base/vendor/cm"; fi; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/cm"; fi;
#source build/envsetup.sh; #source build/envsetup.sh;
source "$scripts/Patch.sh"; source "$DOS_SCRIPTS/Patch.sh";
source "$scripts/Defaults.sh"; source "$DOS_SCRIPTS/Defaults.sh";
if [ "$OVERCLOCKS_ENABLED" = true ]; then source "$scripts/Overclock.sh"; fi; if [ "$DOS_OVERCLOCKS_ENABLED" = true ]; then source "$DOS_SCRIPTS/Overclock.sh"; fi;
source "$scripts/Optimize.sh"; source "$DOS_SCRIPTS/Optimize.sh";
source "$scripts/Rebrand.sh"; source "$DOS_SCRIPTS/Rebrand.sh";
source "$scripts/Theme.sh"; source "$DOS_SCRIPTS/Theme.sh";
source "$scriptsCommon/Deblob.sh"; source "$DOS_SCRIPTS_COMMON/Deblob.sh";
source "$scriptsCommon/Patch_CVE.sh"; source "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
source build/envsetup.sh; source build/envsetup.sh;
#Deblobbing fixes #Deblobbing fixes
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong ##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
cd device/asus/Z00T && ./setup-makefiles.sh && cd "$base"; cd device/asus/Z00T && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
cd device/lge/h850 && ./setup-makefiles.sh && cd "$base"; cd device/lge/h850 && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
} }
export -f patchWorkspace; export -f patchWorkspace;
enableDexPreOpt() { enableDexPreOpt() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk; echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
@ -118,16 +118,16 @@ enableDexPreOpt() {
echo "Enabled dexpreopt for $1"; echo "Enabled dexpreopt for $1";
fi; fi;
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableDexPreOpt; export -f enableDexPreOpt;
enableDexPreOptFull() { enableDexPreOptFull() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
sed -i "s/WITH_DEXPREOPT_BOOT_IMG_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_ONLY := false/" BoardConfig.mk; sed -i "s/WITH_DEXPREOPT_BOOT_IMG_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_ONLY := false/" BoardConfig.mk;
echo "Enabled full dexpreopt"; echo "Enabled full dexpreopt";
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableDexPreOptFull; export -f enableDexPreOptFull;

View File

@ -37,5 +37,5 @@ sed -i 's|config_showTemperatureWarning">0|config_showTemperatureWarning">1|' pa
enter "kernel" enter "kernel"
sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput. sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput.
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Optimizing complete!"; echo "Optimizing complete!";

View File

@ -21,45 +21,45 @@
echo "Applying overclocks..."; echo "Applying overclocks...";
enter "kernel/amazon/hdx-common"; enter "kernel/amazon/hdx-common";
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0001-Overclock.patch"; #300MHz -> 268MHz, 2.26GHz -> 2.41GHz =+0.60GHz patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0001-Overclock.patch"; #300MHz -> 268MHz, 2.26GHz -> 2.41GHz =+0.60GHz
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0002-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0002-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0003-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0003-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_amazon_hdx-common/0004-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_amazon_hdx-common/0004-Overclock.patch";
enter "kernel/asus/grouper"; enter "kernel/asus/grouper";
patch -p1 < "$overclocks/android_kernel_asus_grouper/0001-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_asus_grouper/0001-Overclock.patch";
echo "CONFIG_TEGRA_CPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.50GHz =+0.80GHz echo "CONFIG_TEGRA_CPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.50GHz =+0.80GHz
echo "CONFIG_TEGRA_CPU_OVERCLOCK_ULTIMATE" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.60GHz =+1.20GHz echo "CONFIG_TEGRA_CPU_OVERCLOCK_ULTIMATE" >> arch/arm/configs/grouper_defconfig; #1.30GHz -> 1.60GHz =+1.20GHz
echo "CONFIG_TEGRA_GPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #416MHz 520MHz echo "CONFIG_TEGRA_GPU_OVERCLOCK=y" >> arch/arm/configs/grouper_defconfig; #416MHz 520MHz
echo "CONFIG_TEGRA_GAMING_FIX=y" >> arch/arm/configs/grouper_defconfig; echo "CONFIG_TEGRA_GAMING_FIX=y" >> arch/arm/configs/grouper_defconfig;
enter "kernel/huawei/angler"; enter "kernel/huawei/angler";
patch -p1 < "$overclocks/android_kernel_huawei_angler/0001-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_huawei_angler/0001-Overclock.patch";
enter "kernel/lge/g3"; enter "kernel/lge/g3";
patch -p1 < "$overclocks/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
patch -p1 < "$overclocks/android_kernel_lge_g3/0002-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0002-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_g3/0003-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0003-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_g3/0004-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0004-Overclock.patch";
enter "kernel/lge/hammerhead"; enter "kernel/lge/hammerhead";
patch -p1 < "$overclocks/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested! patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
enter "kernel/lge/mako"; enter "kernel/lge/mako";
patch -p1 < "$overclocks/android_kernel_lge_mako/0001-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0001-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0002-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0002-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0003-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0003-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0004-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0004-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0005-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0005-Overclock.patch";
echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz
echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz
#echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling #echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling
enter "kernel/motorola/msm8916"; enter "kernel/motorola/msm8916";
patch -p1 < "$overclocks/android_kernel_motorola_msm8916/0001-Overclock.patch"; #1.36GHz -> 1.88GHz =+ 2.07GHz patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_motorola_msm8916/0001-Overclock.patch"; #1.36GHz -> 1.88GHz =+ 2.07GHz
enter "kernel/oneplus/msm8974"; enter "kernel/oneplus/msm8974";
patch -p1 < "$overclocks/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Overclocks applied!"; echo "Overclocks applied!";

View File

@ -42,8 +42,8 @@
#Download some (non-executable) out-of-tree files for use later on #Download some (non-executable) out-of-tree files for use later on
mkdir /tmp/ar; mkdir /tmp/ar;
cd /tmp/ar; cd /tmp/ar;
if [ "$HOSTS_BLOCKING" = true ]; then wget "$HOSTS_BLOCKING_LIST" -N; fi; if [ "$DOS_HOSTS_BLOCKING" = true ]; then wget "$DOS_HOSTS_BLOCKING_LIST" -N; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
#Accept all SDK licences, not normally needed but Gradle managed apps fail without it #Accept all SDK licences, not normally needed but Gradle managed apps fail without it
mkdir -p "$ANDROID_HOME/licenses"; mkdir -p "$ANDROID_HOME/licenses";
@ -58,23 +58,23 @@ echo -e "\n84831b9409646a918e30573bab4c9c91346d8abd" > "$ANDROID_HOME/licenses/a
# #
#top dir #top dir
cp -r "$prebuiltApps""Fennec_DOS-Shim" "$base""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK cp -r "$DOS_PREBUILT_APPS""Fennec_DOS-Shim" "$DOS_BUILD_BASE""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
cp -r "$prebuiltApps""android_vendor_FDroid_PrebuiltApps/." "$base""vendor/fdroid_prebuilt/"; #Add the prebuilt apps cp -r "$DOS_PREBUILT_APPS""android_vendor_FDroid_PrebuiltApps/." "$DOS_BUILD_BASE""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
enterAndClear "bootable/recovery"; enterAndClear "bootable/recovery";
patch -p1 < "$patches/android_bootable_recovery/0001-Squash_Menus.patch"; #What's a back button? patch -p1 < "$DOS_PATCHES/android_bootable_recovery/0001-Squash_Menus.patch"; #What's a back button?
enterAndClear "build"; enterAndClear "build";
patch -p1 < "$patches/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0) patch -p1 < "$DOS_PATCHES/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence
sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk; sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk;
#sed -i 's/ro.adb.secure=0/ro.adb.secure=1/' core/main.mk; #sed -i 's/ro.adb.secure=0/ro.adb.secure=1/' core/main.mk;
enterAndClear "device/qcom/sepolicy"; enterAndClear "device/qcom/sepolicy";
patch -p1 < "$patches/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on user builds XXX: REMOVE THIS TRASH patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on user builds XXX: REMOVE THIS TRASH
enterAndClear "external/sqlite"; enterAndClear "external/sqlite";
patch -p1 < "$patches/android_external_sqlite/0001-Secure_Delete.patch"; #Enable secure_delete by default (CopperheadOS-13.0) patch -p1 < "$DOS_PATCHES/android_external_sqlite/0001-Secure_Delete.patch"; #Enable secure_delete by default (CopperheadOS-13.0)
enterAndClear "frameworks/base"; enterAndClear "frameworks/base";
git revert 0326bb5e41219cf502727c3aa44ebf2daa19a5b3; #re-enable doze on devices without gms git revert 0326bb5e41219cf502727c3aa44ebf2daa19a5b3; #re-enable doze on devices without gms
@ -82,19 +82,19 @@ sed -i 's/DEFAULT_MAX_FILES = 1000;/DEFAULT_MAX_FILES = 0;/' services/core/java/
sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence
sed -i 's|db_default_journal_mode" translatable="false">PERSIST|db_default_journal_mode" translatable="false">TRUNCATE|' core/res/res/values/config.xml; #Mirror SQLite secure_delete sed -i 's|db_default_journal_mode" translatable="false">PERSIST|db_default_journal_mode" translatable="false">TRUNCATE|' core/res/res/values/config.xml; #Mirror SQLite secure_delete
sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml; sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml;
patch -p1 < "$patches/android_frameworks_base/0001-Reduced_Resolution.patch"; #Allow reducing resolution to save power TODO: Add 800x480 patch -p1 < "$DOS_PATCHES/android_frameworks_base/0001-Reduced_Resolution.patch"; #Allow reducing resolution to save power TODO: Add 800x480
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0003-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG) if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0003-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0005-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0005-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
changeDefaultDNS; changeDefaultDNS;
#patch -p1 < "$patches/android_frameworks_base/0007-Connectivity.patch"; #Change connectivity check URLs to ours #patch -p1 < "$DOS_PATCHES/android_frameworks_base/0007-Connectivity.patch"; #Change connectivity check URLs to ours
patch -p1 < "$patches/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries patch -p1 < "$DOS_PATCHES/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps
rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig; rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig;
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
enterAndClear "frameworks/opt/net/ims"; enterAndClear "frameworks/opt/net/ims";
patch -p1 < "$patches/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed patch -p1 < "$DOS_PATCHES/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
fi; fi;
enterAndClear "frameworks/opt/net/wifi"; enterAndClear "frameworks/opt/net/wifi";
@ -108,10 +108,10 @@ awk -i inplace '!/com.android.internal.R.bool.config_permissionReviewRequired/'
enterAndClear "packages/apps/CMParts"; enterAndClear "packages/apps/CMParts";
rm -rf src/org/cyanogenmod/cmparts/cmstats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml; #Nuke part of CMStats rm -rf src/org/cyanogenmod/cmparts/cmstats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml; #Nuke part of CMStats
sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather
patch -p1 < "$patches/android_packages_apps_CMParts/0001-Remove_Analytics.patch"; #Remove the rest of CMStats patch -p1 < "$DOS_PATCHES/android_packages_apps_CMParts/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
patch -p1 < "$patches/android_packages_apps_CMParts/0002-Reduced_Resolution.patch"; #Allow reducing resolution to save power patch -p1 < "$DOS_PATCHES/android_packages_apps_CMParts/0002-Reduced_Resolution.patch"; #Allow reducing resolution to save power
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/FakeStore"; enterAndClear "packages/apps/FakeStore";
sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk; sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk;
sed -i 's/ln -s /ln -sf /' Android.mk; sed -i 's/ln -s /ln -sf /' Android.mk;
@ -119,7 +119,7 @@ sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools =
fi; fi;
enterAndClear "packages/apps/FDroid"; enterAndClear "packages/apps/FDroid";
cp "$patchesCommon/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos cp "$DOS_PATCHES_COMMON/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk; sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk;
sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk; sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk;
sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix
@ -132,63 +132,63 @@ sed -i 's/\"org\.fdroid\.fdroid/\"org.fdroid.fdroid_dos/' app/src/main/java/org/
#release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3 #release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3
#test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8 #test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/GmsCore"; enterAndClear "packages/apps/GmsCore";
git submodule update --init --recursive; git submodule update --init --recursive;
fi; fi;
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/GsfProxy"; enterAndClear "packages/apps/GsfProxy";
sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle; sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle;
fi; fi;
enterAndClear "packages/apps/PackageInstaller"; enterAndClear "packages/apps/PackageInstaller";
patch -p1 < "$patches/android_packages_apps_PackageInstaller/64d8b44.diff"; #Fix an issue with Permission Review patch -p1 < "$DOS_PATCHES/android_packages_apps_PackageInstaller/64d8b44.diff"; #Fix an issue with Permission Review
enterAndClear "packages/apps/Settings"; enterAndClear "packages/apps/Settings";
git revert 2ebe6058c546194a301c1fd22963d6be4adbf961; #don't hide oem unlock git revert 2ebe6058c546194a301c1fd22963d6be4adbf961; #don't hide oem unlock
sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/ChooseLockPassword.java; #Increase max password length sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/ChooseLockPassword.java; #Increase max password length
if [ "$MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
enterAndClear "packages/apps/SetupWizard"; enterAndClear "packages/apps/SetupWizard";
patch -p1 < "$patches/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove the rest of CMStats patch -p1 < "$DOS_PATCHES/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove the rest of CMStats
enterAndClear "packages/apps/Trebuchet"; enterAndClear "packages/apps/Trebuchet";
cp -r "$patchesCommon/android_packages_apps_Trebuchet/default_workspace/." "res/xml/"; cp -r "$DOS_PATCHES_COMMON/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
enterAndClear "packages/apps/Updater"; enterAndClear "packages/apps/Updater";
patch -p1 < "$patchesCommon/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server patch -p1 < "$DOS_PATCHES_COMMON/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
#TODO: Remove changelog #TODO: Remove changelog
enterAndClear "packages/apps/WallpaperPicker"; enterAndClear "packages/apps/WallpaperPicker";
rm res/drawable-nodpi/{*.png,*.jpg} res/values-nodpi/wallpapers.xml; #Remove old ones rm res/drawable-nodpi/{*.png,*.jpg} res/values-nodpi/wallpapers.xml; #Remove old ones
cp -r "$dosWallpapers"'Compressed/.' res/drawable-nodpi/; #Add ours cp -r "$DOS_WALLPAPERS"'Compressed/.' res/drawable-nodpi/; #Add ours
cp -r "$dosWallpapers""Thumbs/." res/drawable-nodpi/; cp -r "$DOS_WALLPAPERS""Thumbs/." res/drawable-nodpi/;
cp "$dosWallpapers""wallpapers.xml" res/values-nodpi/wallpapers.xml; cp "$DOS_WALLPAPERS""wallpapers.xml" res/values-nodpi/wallpapers.xml;
sed -i 's/req.touchEnabled = touchEnabled;/req.touchEnabled = true;/' src/com/android/wallpaperpicker/WallpaperCropActivity.java; #Allow scrolling sed -i 's/req.touchEnabled = touchEnabled;/req.touchEnabled = true;/' src/com/android/wallpaperpicker/WallpaperCropActivity.java; #Allow scrolling
sed -i 's/mCropView.setTouchEnabled(req.touchEnabled);/mCropView.setTouchEnabled(true);/' src/com/android/wallpaperpicker/WallpaperCropActivity.java; sed -i 's/mCropView.setTouchEnabled(req.touchEnabled);/mCropView.setTouchEnabled(true);/' src/com/android/wallpaperpicker/WallpaperCropActivity.java;
sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default
enterAndClear "packages/inputmethods/LatinIME"; enterAndClear "packages/inputmethods/LatinIME";
patch -p1 < "$patchesCommon/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key patch -p1 < "$DOS_PATCHES_COMMON/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
enterAndClear "packages/services/Telephony"; enterAndClear "packages/services/Telephony";
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
enterAndClear "system/core"; enterAndClear "system/core";
if [ "$HOSTS_BLOCKING" = true ]; then cat /tmp/ar/hosts >> rootdir/etc/hosts; fi; #Merge in our HOSTS file if [ "$DOS_HOSTS_BLOCKING" = true ]; then cat /tmp/ar/hosts >> rootdir/etc/hosts; fi; #Merge in our HOSTS file
git revert 0217dddeb5c16903c13ff6c75213619b79ea622b d7aa1231b6a0631f506c0c23816f2cd81645b15f; #Always update recovery XXX: This doesn't seem to work git revert 0217dddeb5c16903c13ff6c75213619b79ea622b d7aa1231b6a0631f506c0c23816f2cd81645b15f; #Always update recovery XXX: This doesn't seem to work
patch -p1 < "$patches/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0) patch -p1 < "$DOS_PATCHES/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
enterAndClear "system/keymaster"; enterAndClear "system/keymaster";
patch -p1 < "$patches/android_system_keymaster/0001-Backport_Fixes.patch"; #Fixes from 8.1, appears to fix https://jira.lineageos.org/browse/BUGBASH-590 patch -p1 < "$DOS_PATCHES/android_system_keymaster/0001-Backport_Fixes.patch"; #Fixes from 8.1, appears to fix https://jira.lineageos.org/browse/BUGBASH-590
patch -p1 < "$patches/android_system_keymaster/0002-Backport_Fixes.patch"; patch -p1 < "$DOS_PATCHES/android_system_keymaster/0002-Backport_Fixes.patch";
enterAndClear "system/sepolicy"; enterAndClear "system/sepolicy";
patch -p1 < "$patches/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
enterAndClear "system/vold"; enterAndClear "system/vold";
patch -p1 < "$patches/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption patch -p1 < "$DOS_PATCHES/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
enterAndClear "vendor/cm"; enterAndClear "vendor/cm";
rm -rf overlay/common/vendor/cmsdk/packages; #Remove analytics rm -rf overlay/common/vendor/cmsdk/packages; #Remove analytics
@ -196,30 +196,30 @@ awk -i inplace '!/50-cm.sh/' config/common.mk; #Make sure our hosts is always us
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys
awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys
sed -i '3iinclude vendor/cm/config/sce.mk' config/common.mk; #Include extra apps sed -i '3iinclude vendor/cm/config/sce.mk' config/common.mk; #Include extra apps
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then
awk -i inplace '!/AudioFX/' config/common.mk; awk -i inplace '!/AudioFX/' config/common.mk;
awk -i inplace '!/AudioService/' config/common.mk; awk -i inplace '!/AudioService/' config/common.mk;
fi; fi;
cp "$patchesCommon/android_vendor_divested/sce.mk" config/sce.mk; cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce.mk" config/sce.mk;
if [ "$MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
if [ "$MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi; if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
if [ "$MICROG_INCLUDED" != "NONE" ]; then cp "$patchesCommon/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi; if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
if [ "$MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/cm/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/cm/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
cp "$patches/android_vendor_cm/config.xml" overlay/common/vendor/cmsdk/cm/res/res/values/config.xml; #Per app performance profiles cp "$DOS_PATCHES/android_vendor_cm/config.xml" overlay/common/vendor/cmsdk/cm/res/res/values/config.xml; #Per app performance profiles
cp -r "$patchesCommon/android_vendor_divested/firmware_deblobber" .; cp -r "$DOS_PATCHES_COMMON/android_vendor_divested/firmware_deblobber" .;
cp "$patches/android_vendor_cm/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk; cp "$DOS_PATCHES/android_vendor_cm/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
sed -i 's/CM_BUILDTYPE := UNOFFICIAL/CM_BUILDTYPE := dos/' config/common.mk; #Change buildtype sed -i 's/CM_BUILDTYPE := UNOFFICIAL/CM_BUILDTYPE := dos/' config/common.mk; #Change buildtype
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/CM_BUILDTYPE := dos/CM_BUILDTYPE := dosNC/' config/common.mk; fi; if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/CM_BUILDTYPE := dos/CM_BUILDTYPE := dosNC/' config/common.mk; fi;
sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence
#if [ "$HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative #if [ "$DOS_HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
if [ "$HOSTS_BLOCKING" = false ]; then cp "$patchesCommon/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi; if [ "$DOS_HOSTS_BLOCKING" = false ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
if [ "$HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/cm/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config if [ "$DOS_HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/cm/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
enterAndClear "vendor/cmsdk"; enterAndClear "vendor/cmsdk";
awk -i inplace '!/WeatherManagerServiceBroker/' cm/res/res/values/config.xml; #Disable Weather awk -i inplace '!/WeatherManagerServiceBroker/' cm/res/res/values/config.xml; #Disable Weather
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/CMAudioService/' cm/res/res/values/config.xml; fi; if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/CMAudioService/' cm/res/res/values/config.xml; fi;
cp "$patchesCommon/android_lineage-sdk/profile_default.xml" cm/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones cp "$DOS_PATCHES_COMMON/android_lineage-sdk/profile_default.xml" cm/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
sed -i 's/shouldUseOptimizations(weight)/true/' cm/lib/main/java/org/cyanogenmod/platform/internal/PerformanceManagerService.java; #Per app performance profiles fix sed -i 's/shouldUseOptimizations(weight)/true/' cm/lib/main/java/org/cyanogenmod/platform/internal/PerformanceManagerService.java; #Per app performance profiles fix
# #
#END OF ROM CHANGES #END OF ROM CHANGES
@ -234,9 +234,9 @@ sed -i 's/,encryptable=footer//' rootdir/etc/fstab.qcom; #Using footer will brea
#echo "/dev/block/platform/msm_sdcc.1/by-name/misc /misc emmc defaults defaults" >> rootdir/etc/fstab.qcom; #Add the misc (mmcblk0p5) partition for recovery flags #echo "/dev/block/platform/msm_sdcc.1/by-name/misc /misc emmc defaults defaults" >> rootdir/etc/fstab.qcom; #Add the misc (mmcblk0p5) partition for recovery flags
enterAndClear "device/asus/grouper"; enterAndClear "device/asus/grouper";
patch -p1 < "$patches/android_device_asus_grouper/0001-Update_Blobs.patch"; patch -p1 < "$DOS_PATCHES/android_device_asus_grouper/0001-Update_Blobs.patch";
rm proprietary-blobs.txt; rm proprietary-blobs.txt;
cp "$patches/android_device_asus_grouper/lineage-proprietary-files.txt" lineage-proprietary-files.txt; cp "$DOS_PATCHES/android_device_asus_grouper/lineage-proprietary-files.txt" lineage-proprietary-files.txt;
enterAndClear "device/lge/g2-common"; enterAndClear "device/lge/g2-common";
sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te;
@ -257,13 +257,13 @@ enterAndClear "device/oneplus/bacon";
sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/ sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/
#Make changes to all devices #Make changes to all devices
cd "$base"; cd "$DOS_BUILD_BASE";
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \;
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \;
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \;
#if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi; #if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi;
find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \; find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \;
cd "$base"; cd "$DOS_BUILD_BASE";
#Fixes #Fixes
#Fix broken options enabled by hardenDefconfig() #Fix broken options enabled by hardenDefconfig()

View File

@ -21,36 +21,36 @@
echo "Rebranding..."; echo "Rebranding...";
enter "bootable/recovery"; enter "bootable/recovery";
sed -i 's|Android Recovery|'"$REBRAND_NAME"' Recovery|' ./*_ui.cpp; sed -i 's|Android Recovery|'"$DOS_BRANDING_NAME"' Recovery|' ./*_ui.cpp;
enter "build"; enter "build";
sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user
sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host
sed -i '/CM_TARGET_PACKAGE/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' core/Makefile; sed -i '/CM_TARGET_PACKAGE/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' core/Makefile;
enter "frameworks/base"; enter "frameworks/base";
generateBootAnimationMask "$REBRAND_NAME" "$REBRAND_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png; generateBootAnimationMask "$DOS_BRANDING_NAME" "$DOS_BRANDING_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
generateBootAnimationShine "$REBRAND_BOOTANIMATION_COLOR" "$REBRAND_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png; generateBootAnimationShine "$DOS_BRANDING_BOOTANIMATION_COLOR" "$DOS_BRANDING_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
enter "packages/apps/Settings"; enter "packages/apps/Settings";
sed -i '/.*cmlicense_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml; sed -i '/.*cmlicense_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
sed -i '/.*cmupdate_settings_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml; sed -i '/.*cmupdate_settings_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
sed -i '/.*mod_version/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml; sed -i '/.*mod_version/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
enter "packages/apps/SetupWizard"; enter "packages/apps/SetupWizard";
sed -i 's|http://lineageos.org/legal|'"$REBRAND_LINK_PRIVACY"'|' src/com/cyanogenmod/setupwizard/LineageSettingsActivity.java; sed -i 's|http://lineageos.org/legal|'"$DOS_BRANDING_LINK_PRIVACY"'|' src/com/cyanogenmod/setupwizard/LineageSettingsActivity.java;
sed -i '/.*setup_services/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml; sed -i '/.*setup_services/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
sed -i '/.*services_explanation/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml; sed -i '/.*services_explanation/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
cp "$patchesCommon/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours cp "$DOS_PATCHES_COMMON/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
enter "packages/apps/Updater"; enter "packages/apps/Updater";
sed -i 's|0OTASERVER0|'"$REBRAND_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java; sed -i 's|0OTASERVER0|'"$DOS_BRANDING_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
sed -i 's|>LineageOS|>'"$REBRAND_NAME"'|' res/values*/strings.xml; sed -i 's|>LineageOS|>'"$DOS_BRANDING_NAME"'|' res/values*/strings.xml;
enter "vendor/cm"; enter "vendor/cm";
sed -i 's|https://lineageos.org/legal|'"$REBRAND_LINK_ABOUT"'|' config/common.mk; sed -i 's|https://lineageos.org/legal|'"$DOS_BRANDING_LINK_ABOUT"'|' config/common.mk;
sed -i '/.*ZIPPATH=/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/envsetup.sh; sed -i '/.*ZIPPATH=/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/envsetup.sh;
rm -rf bootanimation; rm -rf bootanimation;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Rebranding complete!"; echo "Rebranding complete!";

View File

@ -20,52 +20,45 @@
echo "Applying theme..."; echo "Applying theme...";
export themeOverride50="FFCA28"; #Amber 400
export themeOverride100="FFC107"; #Amber 500
export themeOverride200="FFA726"; #Orange 400
export themeOverride300="FF9800"; #Orange 500
export themeOverride500="FF5722"; #Deep Orange 500
export themeOverride700="E64A19"; #Deep Orange 700
enter "frameworks/base"; enter "frameworks/base";
sed -i "s/#ffe0f2f1/#ff$themeOverride50/" core/res/res/values/colors_material.xml; sed -i "s/#ffe0f2f1/#ff$DOS_THEME_50/" core/res/res/values/colors_material.xml;
sed -i "s/#ffb2dfdb/#ff$themeOverride100/" core/res/res/values/colors_material.xml; sed -i "s/#ffb2dfdb/#ff$DOS_THEME_100/" core/res/res/values/colors_material.xml;
sed -i "s/#ff80cbc4/#ff$themeOverride200/" core/res/res/values/colors_material.xml; sed -i "s/#ff80cbc4/#ff$DOS_THEME_200/" core/res/res/values/colors_material.xml;
sed -i "s/#ff4db6ac/#ff$themeOverride300/" core/res/res/values/colors_material.xml; sed -i "s/#ff4db6ac/#ff$DOS_THEME_300/" core/res/res/values/colors_material.xml;
sed -i "s/#ff009688/#ff$themeOverride500/" core/res/res/values/colors_material.xml; sed -i "s/#ff009688/#ff$DOS_THEME_500/" core/res/res/values/colors_material.xml;
sed -i "s/#ff00796b/#ff$themeOverride700/" core/res/res/values/colors_material.xml; sed -i "s/#ff00796b/#ff$DOS_THEME_700/" core/res/res/values/colors_material.xml;
sed -i "s/#fff4511e/#ffe53935/" core/res/res/values/colors.xml; sed -i "s/#fff4511e/#ffe53935/" core/res/res/values/colors.xml;
enter "packages/apps/CMParts"; enter "packages/apps/CMParts";
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/colors.xml; sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/colors.xml;
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enter "packages/apps/GmsCore"; enter "packages/apps/GmsCore";
sed -i "s/#ff7fcac3/#ff$themeOverride300/" microg-ui-tools/src/main/res/values/colors.xml; sed -i "s/#ff7fcac3/#ff$DOS_THEME_300/" microg-ui-tools/src/main/res/values/colors.xml;
sed -i "s/#ff009688/#ff$themeOverride500/" microg-ui-tools/src/main/res/values/colors.xml; sed -i "s/#ff009688/#ff$DOS_THEME_500/" microg-ui-tools/src/main/res/values/colors.xml;
fi; fi;
enter "packages/apps/Settings"; enter "packages/apps/Settings";
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/styles.xml; sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/styles.xml;
#TODO: Fix: Storage, Profiles #TODO: Fix: Storage, Profiles
enter "packages/apps/Trebuchet"; enter "packages/apps/Trebuchet";
sed -i "s/009688/$themeOverride500/" res/values/*colors.xml; sed -i "s/009688/$DOS_THEME_500/" res/values/*colors.xml;
sed -i "s/009688/$themeOverride500/" WallpaperPicker/res/values/colors.xml; sed -i "s/009688/$DOS_THEME_500/" WallpaperPicker/res/values/colors.xml;
mogrify -format png -fill "#$themeOverride500" -opaque "#009688" -fuzz 10% res/drawable*/cling_bg.9.png; mogrify -format png -fill "#$DOS_THEME_500" -opaque "#009688" -fuzz 10% res/drawable*/cling_bg.9.png;
#TODO: Fix: Open app icon #TODO: Fix: Open app icon
enter "packages/apps/Updater"; enter "packages/apps/Updater";
sed -i "s/#ff009688/#ff$themeOverride500/" res/values/colors.xml; sed -i "s/#ff009688/#ff$DOS_THEME_500/" res/values/colors.xml;
enter "packages/inputmethods/LatinIME"; enter "packages/inputmethods/LatinIME";
sed -i "s/#80CBC4/#$themeOverride200/" java/res/values/colors.xml; sed -i "s/#80CBC4/#$DOS_THEME_200/" java/res/values/colors.xml;
sed -i "s/#4DB6AC/#$themeOverride300/" java/res/values/colors.xml; sed -i "s/#4DB6AC/#$DOS_THEME_300/" java/res/values/colors.xml;
mogrify -format png -fill "#$themeOverride100" -opaque "#b2dfdb" -fuzz 10% java/res/drawable*/*lxx*.png; mogrify -format png -fill "#$DOS_THEME_100" -opaque "#b2dfdb" -fuzz 10% java/res/drawable*/*lxx*.png;
mogrify -format png -fill "#$themeOverride200" -opaque "#80cbc4" -fuzz 10% java/res/drawable*/*lxx*.png; mogrify -format png -fill "#$DOS_THEME_200" -opaque "#80cbc4" -fuzz 10% java/res/drawable*/*lxx*.png;
mogrify -format png -fill "#$themeOverride300" -opaque "#4db6ac" -fuzz 10% java/res/drawable*/*lxx*.png; mogrify -format png -fill "#$DOS_THEME_300" -opaque "#4db6ac" -fuzz 10% java/res/drawable*/*lxx*.png;
mogrify -format png -fill "#$themeOverride300" -opaque "#7fcac3" -fuzz 10% java/res/drawable*/*lxx*.png; mogrify -format png -fill "#$DOS_THEME_300" -opaque "#7fcac3" -fuzz 10% java/res/drawable*/*lxx*.png;
mogrify -format png -fill "#$themeOverride500" -opaque "#26a69a" -fuzz 10% java/res/drawable*/*lxx*.png; mogrify -format png -fill "#$DOS_THEME_500" -opaque "#26a69a" -fuzz 10% java/res/drawable*/*lxx*.png;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Applied theme!"; echo "Applied theme!";

View File

@ -1,27 +1,27 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/essential/msm8998" cd "$DOS_BUILD_BASE""kernel/essential/msm8998"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0016.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0020.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-1583/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/4.4/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0018.patch
git apply $cvePatchesLinux/CVE-2017-13218/4.4/0026.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0026.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14875/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2018-3564/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3597/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14875/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
editKernelLocalversion "-dos.p23" editKernelLocalversion "-dos.p23"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,112 +1,112 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/google/marlin" cd "$DOS_BUILD_BASE""kernel/google/marlin"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0044.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0047.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0047.patch
#git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0048.patch #git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0048.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0049.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0049.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0579/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11034/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $cvePatchesLinux/CVE-2016-5853/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
editKernelLocalversion "-dos.p108" editKernelLocalversion "-dos.p108"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,44 +1,44 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/google/msm" cd "$DOS_BUILD_BASE""kernel/google/msm"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4738/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p40" editKernelLocalversion "-dos.p40"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,80 +1,80 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/htc/flounder" cd "$DOS_BUILD_BASE""kernel/htc/flounder"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001-Alt.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001-Alt.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8453/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0449/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10996/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13273/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13273/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
editKernelLocalversion "-dos.p76" editKernelLocalversion "-dos.p76"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,38 +1,38 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/htc/msm8974" cd "$DOS_BUILD_BASE""kernel/htc/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p34" editKernelLocalversion "-dos.p34"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,117 +1,117 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/huawei/angler" cd "$DOS_BUILD_BASE""kernel/huawei/angler"
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5868/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000251/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8280/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/ANY/0001.patch
editKernelLocalversion "-dos.p113" editKernelLocalversion "-dos.p113"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,106 +1,106 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/bullhead" cd "$DOS_BUILD_BASE""kernel/lge/bullhead"
git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.10/0001.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch
git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0805/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2063/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch
git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2469/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0516/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000251/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11037/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14877/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
editKernelLocalversion "-dos.p102" editKernelLocalversion "-dos.p102"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,41 +1,41 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/g3" cd "$DOS_BUILD_BASE""kernel/lge/g3"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6640/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p37" editKernelLocalversion "-dos.p37"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,48 +1,47 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/hammerhead" cd "$DOS_BUILD_BASE""kernel/lge/hammerhead"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1593/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch editKernelLocalversion "-dos.p43"
editKernelLocalversion "-dos.p44" cd "$DOS_BUILD_BASE"
cd $base

View File

@ -1,22 +1,22 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/mako" cd "$DOS_BUILD_BASE""kernel/lge/mako"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6828/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6828/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7910/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7910/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p18" editKernelLocalversion "-dos.p18"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,31 +1,31 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/msm8974" cd "$DOS_BUILD_BASE""kernel/lge/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2015-8939/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8939/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0001.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0006.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0007.patch
git apply $cvePatchesLinux/CVE-2016-0806/prima/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0806/prima/0010.patch
git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p27" editKernelLocalversion "-dos.p27"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,70 +1,70 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/lge/msm8996" cd "$DOS_BUILD_BASE""kernel/lge/msm8996"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11077/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11077/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0009.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15846/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15846/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p66" editKernelLocalversion "-dos.p66"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,67 +1,67 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/moto/shamu" cd "$DOS_BUILD_BASE""kernel/moto/shamu"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8269/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8269/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p63" editKernelLocalversion "-dos.p63"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,108 +1,108 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/motorola/msm8996" cd "$DOS_BUILD_BASE""kernel/motorola/msm8996"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0029.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0030.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0030.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch
git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0009.patch
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16530/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16646/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2017-17449/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17449/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18066/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18066/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9/0002.patch
git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-8251/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8251/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3560/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3560/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-3585/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3599/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0002.patch
git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5831/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5833/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/3.18/0001.patch
git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-14883/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
editKernelLocalversion "-dos.p104" editKernelLocalversion "-dos.p104"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,76 +1,76 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/nextbit/msm8992" cd "$DOS_BUILD_BASE""kernel/nextbit/msm8992"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13163/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch
git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch
git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch
#git apply $cvePatchesLinux/CVE-2018-3585/3.10/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch
git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p72" editKernelLocalversion "-dos.p72"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,58 +1,58 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/oppo/msm8974" cd "$DOS_BUILD_BASE""kernel/oppo/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0774/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0801/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch
git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0510/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11000/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11019/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9706/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p54" editKernelLocalversion "-dos.p54"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -1,30 +1,30 @@
#!/bin/bash #!/bin/bash
cd $base"kernel/samsung/msm8974" cd "$DOS_BUILD_BASE""kernel/samsung/msm8974"
git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch git apply $DOS_PATCHES_LINUX_CVES/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/^4.13/0002.patch
git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch
git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p26" editKernelLocalversion "-dos.p26"
cd $base cd "$DOS_BUILD_BASE"

View File

@ -79,5 +79,5 @@ sed -i 's/def_stats_collection">true/def_stats_collection">false/' overlay/commo
sed -i 's/config_storage_manager_settings_enabled">true/config_storage_manager_settings_enabled">false/' overlay/common/packages/apps/Settings/res/values/config.xml; sed -i 's/config_storage_manager_settings_enabled">true/config_storage_manager_settings_enabled">false/' overlay/common/packages/apps/Settings/res/values/config.xml;
#sed -i 's/config_enableRecoveryUpdater">false/config_enableRecoveryUpdater">true/' overlay/common/packages/apps/Settings/res/values/config.xml; #sed -i 's/config_enableRecoveryUpdater">false/config_enableRecoveryUpdater">true/' overlay/common/packages/apps/Settings/res/values/config.xml;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Default settings changed!"; echo "Default settings changed!";

View File

@ -28,8 +28,8 @@ resetWorkspace() {
export -f resetWorkspace; export -f resetWorkspace;
scanWorkspaceForMalware() { scanWorkspaceForMalware() {
scanQueue="$base/android $base/art $base/bionic $base/bootable $base/build $base/compatibility $base/dalvik $base/device $base/hardware $base/libcore $base/libnativehelper $base/packages $base/pdk $base/platform_testing $base/sdk $base/system"; scanQueue="$DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/compatibility $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
scanQueue=$scanQueue" $base/lineage-sdk $base/vendor/lineage"; scanQueue=$scanQueue" $DOS_BUILD_BASE/lineage-sdk $DOS_BUILD_BASE/vendor/lineage";
scanForMalware true $scanQueue; scanForMalware true $scanQueue;
} }
export -f scanWorkspaceForMalware; export -f scanWorkspaceForMalware;
@ -47,7 +47,7 @@ buildDeviceDebug() {
export -f buildDeviceDebug; export -f buildDeviceDebug;
buildAll() { buildAll() {
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
#Select devices are userdebug due to SELinux policy issues #Select devices are userdebug due to SELinux policy issues
#TODO: hiae star2lte starlte #TODO: hiae star2lte starlte
brunch lineage_mako-user; brunch lineage_mako-user;
@ -73,29 +73,29 @@ buildAll() {
export -f buildAll; export -f buildAll;
patchWorkspace() { patchWorkspace() {
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$prebuiltApps $base/build $base/device $base/vendor/lineage"; fi; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
source build/envsetup.sh; source build/envsetup.sh;
repopick -f 214824 209584 209585 215010 214300; #g3-common repopick -f 214824 209584 209585 215010 214300; #g3-common
repopick -f 211404 211405 211406 211407 211408 211409; #d852 repopick -f 211404 211405 211406 211407 211408 211409; #d852
source "$scripts/Patch.sh"; source "$DOS_SCRIPTS/Patch.sh";
source "$scripts/Defaults.sh"; source "$DOS_SCRIPTS/Defaults.sh";
if [ "$OVERCLOCKS_ENABLED" = true ]; then source "$scripts/Overclock.sh"; fi; if [ "$DOS_OVERCLOCKS_ENABLED" = true ]; then source "$DOS_SCRIPTS/Overclock.sh"; fi;
source "$scripts/Optimize.sh"; source "$DOS_SCRIPTS/Optimize.sh";
source "$scripts/Rebrand.sh"; source "$DOS_SCRIPTS/Rebrand.sh";
source "$scriptsCommon/Deblob.sh"; source "$DOS_SCRIPTS_COMMON/Deblob.sh";
source "$scriptsCommon/Patch_CVE.sh"; source "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
source build/envsetup.sh; source build/envsetup.sh;
#Deblobbing fixes #Deblobbing fixes
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong ##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
cd device/lge/h850 && ./setup-makefiles.sh && cd "$base"; cd device/lge/h850 && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
} }
export -f patchWorkspace; export -f patchWorkspace;
enableDexPreOpt() { enableDexPreOpt() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition if [ "$1" != "device/amazon/thor" ] && [ "$1" != "device/samsung/i9100" ] && [ "$1" != "device/lge/h850" ] && [ "$1" != "device/lge/mako" ]; then #Some devices won't compile, or have too small of a /system partition
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk; echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
@ -104,16 +104,16 @@ enableDexPreOpt() {
echo "Enabled dexpreopt for $1"; echo "Enabled dexpreopt for $1";
fi; fi;
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableDexPreOpt; export -f enableDexPreOpt;
enableDexPreOptFull() { enableDexPreOptFull() {
cd "$base$1"; cd "$DOS_BUILD_BASE$1";
if [ -f BoardConfig.mk ]; then if [ -f BoardConfig.mk ]; then
sed -i "s/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false/" BoardConfig.mk; sed -i "s/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true/WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false/" BoardConfig.mk;
echo "Enabled full dexpreopt"; echo "Enabled full dexpreopt";
fi; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
} }
export -f enableDexPreOptFull; export -f enableDexPreOptFull;

View File

@ -37,5 +37,5 @@ sed -i 's|config_showTemperatureWarning">0|config_showTemperatureWarning">1|' pa
enter "kernel" enter "kernel"
sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput. sed -i "s/#define VM_MAX_READAHEAD\t128/#define VM_MAX_READAHEAD\t512/" ./*/*/include/linux/mm.h; #Lee Susman <lsusman@codeaurora.org>: Change the VM_MAX_READAHEAD value from the default 128KB to 512KB. This will allow the readahead window to grow to a maximum size of 512KB, which greatly benefits to sequential read throughput.
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Optimizing complete!"; echo "Optimizing complete!";

View File

@ -21,29 +21,29 @@
echo "Applying overclocks..."; echo "Applying overclocks...";
enter "kernel/huawei/angler"; enter "kernel/huawei/angler";
patch -p1 < "$overclocks/android_kernel_huawei_angler/0001-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_huawei_angler/0001-Overclock.patch";
enter "kernel/lge/g3"; enter "kernel/lge/g3";
patch -p1 < "$overclocks/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0001-Overclock.patch"; #2.45GHz -> 2.76GHz =+1.24GHz
patch -p1 < "$overclocks/android_kernel_lge_g3/0002-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0002-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_g3/0003-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0003-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_g3/0004-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_g3/0004-Overclock.patch";
enter "kernel/lge/hammerhead"; enter "kernel/lge/hammerhead";
patch -p1 < "$overclocks/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested! patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_hammerhead/0001-Overclock.patch"; #2.26GHz -> 2.95GHz =+2.76GHz XXX: Untested!
enter "kernel/lge/mako"; enter "kernel/lge/mako";
patch -p1 < "$overclocks/android_kernel_lge_mako/0001-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0001-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0002-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0002-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0003-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0003-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0004-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0004-Overclock.patch";
patch -p1 < "$overclocks/android_kernel_lge_mako/0005-Overclock.patch"; patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_lge_mako/0005-Overclock.patch";
echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz echo "CONFIG_LOW_CPUCLOCKS=y" >> arch/arm/configs/lineageos_mako_defconfig; #384MHz -> 81MHz
echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz echo "CONFIG_CPU_OVERCLOCK=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.70GHz =+0.90GHz
#echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling #echo "CPU_OVERCLOCK_ULTRA=y" >> arch/arm/configs/lineageos_mako_defconfig; #1.51GHz -> 1.94GHz =+1.72GHz XXX: Causes excessive throttling
enter "kernel/oppo/msm8974"; enter "kernel/oppo/msm8974";
patch -p1 < "$overclocks/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads patch -p1 < "$DOS_PATCHES_OVERCLOCKS/android_kernel_oppo_msm8974/0001-OverUnderClock-EXTREME.patch"; #300MHz -> 268MHz, 2.45GHz -> 2.95GHz =+2.02GHz XXX: Not 100% stable under intense workloads
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Overclocks applied!"; echo "Overclocks applied!";

View File

@ -42,8 +42,8 @@
#Download some (non-executable) out-of-tree files for use later on #Download some (non-executable) out-of-tree files for use later on
mkdir /tmp/ar; mkdir /tmp/ar;
cd /tmp/ar; cd /tmp/ar;
if [ "$HOSTS_BLOCKING" = true ]; then wget "$HOSTS_BLOCKING_LIST" -N; fi; if [ "$DOS_HOSTS_BLOCKING" = true ]; then wget "$DOS_HOSTS_BLOCKING_LIST" -N; fi;
cd "$base"; cd "$DOS_BUILD_BASE";
#Accept all SDK licences, not normally needed but Gradle managed apps fail without it #Accept all SDK licences, not normally needed but Gradle managed apps fail without it
mkdir -p "$ANDROID_HOME/licenses"; mkdir -p "$ANDROID_HOME/licenses";
@ -58,12 +58,12 @@ echo -e "\n84831b9409646a918e30573bab4c9c91346d8abd" > "$ANDROID_HOME/licenses/a
# #
#top dir #top dir
cp -r "$prebuiltApps""Fennec_DOS-Shim" "$base""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK cp -r "$DOS_PREBUILT_APPS""Fennec_DOS-Shim" "$DOS_BUILD_BASE""packages/apps/"; #Add a shim to install Fennec DOS without actually including the large APK
cp -r "$prebuiltApps""android_vendor_FDroid_PrebuiltApps/." "$base""vendor/fdroid_prebuilt/"; #Add the prebuilt apps cp -r "$DOS_PREBUILT_APPS""android_vendor_FDroid_PrebuiltApps/." "$DOS_BUILD_BASE""vendor/fdroid_prebuilt/"; #Add the prebuilt apps
enterAndClear "build/make"; enterAndClear "build/make";
patch -p1 < "$patches/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0) patch -p1 < "$DOS_PATCHES/android_build/0001-Automated_Build_Signing.patch"; #Automated build signing (CopperheadOS-13.0)
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_build/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_build/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' core/product.mk; awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' core/product.mk;
sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence sed -i 's/messaging/Silence/' target/product/*.mk; #Replace AOSP Messaging app with Silence
sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk; sed -i 's/ro.secure=0/ro.secure=1/' core/main.mk;
@ -73,7 +73,7 @@ enterAndClear "device/lineage/sepolicy";
git revert c9b0d95630b82cd0ad1a0fc633c6d59c2cb8aad7 37422f7df389f3ae5a34ee3d6dd9354217f9c536; #neverallow violation git revert c9b0d95630b82cd0ad1a0fc633c6d59c2cb8aad7 37422f7df389f3ae5a34ee3d6dd9354217f9c536; #neverallow violation
enterAndClear "device/qcom/sepolicy"; enterAndClear "device/qcom/sepolicy";
patch -p1 < "$patches/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH patch -p1 < "$DOS_PATCHES/android_device_qcom_sepolicy/0001-Camera_Fix.patch"; #Fix camera on -user builds XXX: REMOVE THIS TRASH
enterAndClear "external/svox"; enterAndClear "external/svox";
git revert 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles git revert 1419d63b4889a26d22443fd8df1f9073bf229d3d; #Add back Makefiles
@ -83,19 +83,19 @@ enterAndClear "frameworks/base";
sed -i 's/DEFAULT_MAX_FILES = 1000;/DEFAULT_MAX_FILES = 0;/' services/core/java/com/android/server/DropBoxManagerService.java; #Disable DropBox sed -i 's/DEFAULT_MAX_FILES = 1000;/DEFAULT_MAX_FILES = 0;/' services/core/java/com/android/server/DropBoxManagerService.java; #Disable DropBox
sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence sed -i 's/com.android.messaging/org.smssecure.smssecure/' core/res/res/values/config.xml; #Change default SMS app to Silence
sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml; sed -i 's|config_permissionReviewRequired">false|config_permissionReviewRequired">true|' core/res/res/values/config.xml;
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0002-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG) if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0002-Signature_Spoofing.patch"; fi; #Allow packages to spoof their signature (microG)
if [ "$MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$patches/android_frameworks_base/0003-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0003-Harden_Sig_Spoofing.patch"; fi; #Restrict signature spoofing to system apps signed with the platform key
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/<item>com.android.location.fused<\/item>/a \ \ \ \ \ \ \ \ <item>org.microg.nlp</item>' core/res/res/values/config.xml; fi; #Add UnifiedNLP to location providers
changeDefaultDNS; changeDefaultDNS;
#patch -p1 < "$patches/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours #patch -p1 < "$DOS_PATCHES/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours
patch -p1 < "$patches/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries patch -p1 < "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_frameworks_base/Copperhead/0005-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/Copperhead/0005-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps rm -rf packages/PrintRecommendationService; #App that just creates popups to install proprietary print apps
rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig; rm core/res/res/values/config.xml.orig core/res/res/values/strings.xml.orig;
if [ "$DEBLOBBER_REMOVE_IMS" = true ]; then if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
enterAndClear "frameworks/opt/net/ims"; enterAndClear "frameworks/opt/net/ims";
patch -p1 < "$patches/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed patch -p1 < "$DOS_PATCHES/android_frameworks_opt_net_ims/0001-Fix_Calling.patch"; #Fix calling when IMS is removed
fi fi
enterAndClear "frameworks/opt/net/wifi"; enterAndClear "frameworks/opt/net/wifi";
@ -108,10 +108,10 @@ awk -i inplace '!/com.android.internal.R.bool.config_permissionReviewRequired/'
enterAndClear "lineage-sdk"; enterAndClear "lineage-sdk";
awk -i inplace '!/WeatherManagerServiceBroker/' lineage/res/res/values/config.xml; #Disable Weather awk -i inplace '!/WeatherManagerServiceBroker/' lineage/res/res/values/config.xml; #Disable Weather
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/LineageAudioService/' lineage/res/res/values/config.xml; fi; if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/LineageAudioService/' lineage/res/res/values/config.xml; fi;
cp "$patchesCommon/android_lineage-sdk/profile_default.xml" lineage/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones cp "$DOS_PATCHES_COMMON/android_lineage-sdk/profile_default.xml" lineage/res/res/xml/profile_default.xml; #Replace default profiles with *way* better ones
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/FakeStore"; enterAndClear "packages/apps/FakeStore";
sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk; sed -i 's|$(OUT_DIR)/target/|$(PWD)/$(OUT_DIR)/target/|' Android.mk;
sed -i 's/ln -s /ln -sf /' Android.mk; sed -i 's/ln -s /ln -sf /' Android.mk;
@ -119,7 +119,7 @@ sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools =
fi; fi;
enterAndClear "packages/apps/FDroid"; enterAndClear "packages/apps/FDroid";
cp "$patchesCommon/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos cp "$DOS_PATCHES_COMMON/android_packages_apps_FDroid/default_repos.xml" app/src/main/res/values/default_repos.xml; #Add extra repos
sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk; sed -i 's|outputs/apk/|outputs/apk/full/release/|' Android.mk;
sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk; sed -i 's|-release-unsigned|-full-release-unsigned|' Android.mk;
sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix sed -i 's|gradle|./gradlew|' Android.mk; #Gradle 4.0 fix
@ -132,12 +132,12 @@ sed -i 's/\"org\.fdroid\.fdroid/\"org.fdroid.fdroid_dos/' app/src/main/java/org/
#release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3 #release-key: CB:1E:E2:EC:40:D0:5E:D6:78:F4:2A:E7:01:CD:FA:29:EE:A7:9D:0E:6D:63:32:76:DE:23:0B:F3:49:40:67:C3
#test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8 #test-key: C8:A2:E9:BC:CF:59:7C:2F:B6:DC:66:BE:E2:93:FC:13:F2:FC:47:EC:77:BC:6B:2B:0D:52:C1:1F:51:19:2A:B8
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/GmsCore"; enterAndClear "packages/apps/GmsCore";
git submodule update --init --recursive; git submodule update --init --recursive;
fi; fi;
if [ "$MICROG_INCLUDED" = "FULL" ]; then if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then
enterAndClear "packages/apps/GsfProxy"; enterAndClear "packages/apps/GsfProxy";
sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle; sed -i 's/ext.androidBuildVersionTools = "24.0.3"/ext.androidBuildVersionTools = "25.0.3"/' build.gradle;
fi; fi;
@ -145,25 +145,25 @@ fi;
enterAndClear "packages/apps/LineageParts"; enterAndClear "packages/apps/LineageParts";
rm -rf src/org/lineageos/lineageparts/lineagestats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml #Nuke part of the analytics rm -rf src/org/lineageos/lineageparts/lineagestats/ res/xml/anonymous_stats.xml res/xml/preview_data.xml #Nuke part of the analytics
sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather sed -i 's|config_showWeatherMenu">true|config_showWeatherMenu">false|' res/values/config.xml; #Disable Weather
patch -p1 < "$patches/android_packages_apps_LineageParts/0001-Remove_Analytics.patch"; #Remove analytics patch -p1 < "$DOS_PATCHES/android_packages_apps_LineageParts/0001-Remove_Analytics.patch"; #Remove analytics
rm AndroidManifest.xml.orig res/values/*.xml.orig; rm AndroidManifest.xml.orig res/values/*.xml.orig;
enterAndClear "packages/apps/Settings"; enterAndClear "packages/apps/Settings";
git revert a96df110e84123fe1273bff54feca3b4ca484dcd; #don't hide oem unlock git revert a96df110e84123fe1273bff54feca3b4ca484dcd; #don't hide oem unlock
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_apps_Settings/Copperhead/0003-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_apps_Settings/Copperhead/0003-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
patch -p1 < "$patches/android_packages_apps_Settings/0004-PDB_Fixes.patch"; #Fix crashes when the PersistentDataBlockManager service isn't available patch -p1 < "$DOS_PATCHES/android_packages_apps_Settings/0004-PDB_Fixes.patch"; #Fix crashes when the PersistentDataBlockManager service isn't available
sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/password/ChooseLockPassword.java; #Increase max password length sed -i 's/private int mPasswordMaxLength = 16;/private int mPasswordMaxLength = 48;/' src/com/android/settings/password/ChooseLockPassword.java; #Increase max password length
if [ "$MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then sed -i 's/GSETTINGS_PROVIDER = "com.google.settings";/GSETTINGS_PROVIDER = "com.google.oQuae4av";/' src/com/android/settings/PrivacySettings.java; fi; #microG doesn't support Backup, hide the options
rm res/values/strings.xml.orig; rm res/values/strings.xml.orig;
enterAndClear "packages/apps/SetupWizard"; enterAndClear "packages/apps/SetupWizard";
patch -p1 < "$patches/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove analytics patch -p1 < "$DOS_PATCHES/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch"; #Remove analytics
enterAndClear "packages/apps/Trebuchet"; enterAndClear "packages/apps/Trebuchet";
cp -r "$patchesCommon/android_packages_apps_Trebuchet/default_workspace/." "res/xml/"; cp -r "$DOS_PATCHES_COMMON/android_packages_apps_Trebuchet/default_workspace/." "res/xml/";
enterAndClear "packages/apps/Updater"; enterAndClear "packages/apps/Updater";
patch -p1 < "$patchesCommon/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server patch -p1 < "$DOS_PATCHES_COMMON/android_packages_apps_Updater/0001-Server.patch"; #Switch to our server
#TODO: Remove changelog #TODO: Remove changelog
enterAndClear "packages/apps/WallpaperPicker"; enterAndClear "packages/apps/WallpaperPicker";
@ -173,46 +173,46 @@ sed -i 's/mCropView.setTouchEnabled(req.touchEnabled);/mCropView.setTouchEnabled
sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default sed -i 's/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0);/WallpaperUtils.EXTRA_WALLPAPER_OFFSET, 0.5f);/' src/com/android/wallpaperpicker/WallpaperPickerActivity.java; #Center aligned by default
enterAndClear "packages/inputmethods/LatinIME"; enterAndClear "packages/inputmethods/LatinIME";
patch -p1 < "$patchesCommon/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key patch -p1 < "$DOS_PATCHES_COMMON/android_packages_inputmethods_LatinIME/0001-Voice.patch"; #Remove voice input key
enterAndClear "packages/services/Telephony"; enterAndClear "packages/services/Telephony";
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_packages_services_Telephony/Copperhead/0001-LTE_Only.patch"; fi; #LTE only preferred network mode choice (Copperhead CC BY-NC-SA)
enterAndClear "system/core"; enterAndClear "system/core";
cat /tmp/ar/hosts >> rootdir/etc/hosts; #Merge in our HOSTS file cat /tmp/ar/hosts >> rootdir/etc/hosts; #Merge in our HOSTS file
git revert a6a4ce8e9a6d63014047a447c6bb3ac1fa90b3f4; #Always update recovery git revert a6a4ce8e9a6d63014047a447c6bb3ac1fa90b3f4; #Always update recovery
patch -p1 < "$patches/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0) patch -p1 < "$DOS_PATCHES/android_system_core/0001-Harden_Mounts.patch"; #Harden mounts with nodev/noexec/nosuid (CopperheadOS-13.0)
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_core/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_core/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
#if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_core/0003-Deny_USB-Aggressive.patch"; fi; #Deny USB on boot, may break things #if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_core/0003-Deny_USB-Aggressive.patch"; fi; #Deny USB on boot, may break things
enterAndClear "system/sepolicy"; enterAndClear "system/sepolicy";
patch -p1 < "$patches/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$patches/android_system_sepolicy/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA) if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then patch -p1 < "$DOS_PATCHES/android_system_sepolicy/Copperhead/0002-Deny_USB.patch"; fi; #Deny USB support (Copperhead CC BY-NC-SA)
enterAndClear "system/vold"; enterAndClear "system/vold";
patch -p1 < "$patches/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption patch -p1 < "$DOS_PATCHES/android_system_vold/0001-AES256.patch"; #Add a variable for enabling AES-256 bit encryption
enterAndClear "vendor/lineage"; enterAndClear "vendor/lineage";
rm -rf overlay/common/vendor/lineage-sdk/packages; #Remove analytics rm -rf overlay/common/vendor/lineage-sdk/packages; #Remove analytics
if [ "$HOSTS_BLOCKING" = true ]; then awk -i inplace '!/50-lineage.sh/' config/common.mk; fi; #Make sure our hosts is always used if [ "$DOS_HOSTS_BLOCKING" = true ]; then awk -i inplace '!/50-lineage.sh/' config/common.mk; fi; #Make sure our hosts is always used
awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys awk -i inplace '!/PRODUCT_EXTRA_RECOVERY_KEYS/' config/common.mk; #Remove extra keys
awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys awk -i inplace '!/security\/lineage/' config/common.mk; #Remove extra keys
sed -i '3iinclude vendor/lineage/config/sce.mk' config/common.mk; #Include extra apps sed -i '3iinclude vendor/lineage/config/sce.mk' config/common.mk; #Include extra apps
if [ "$DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/AudioFX/' config/common.mk; fi; if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then awk -i inplace '!/AudioFX/' config/common.mk; fi;
cp "$patchesCommon/android_vendor_divested/sce.mk" config/sce.mk; cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce.mk" config/sce.mk;
if [ "$MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" = "FULL" ]; then echo "PRODUCT_PACKAGES += GmsCore GsfProxy FakeStore" >> config/sce.mk; fi;
if [ "$MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP" >> config/sce.mk; fi;
if [ "$MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi; if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then sed -i '/Google provider/!b;n;s/com.google.android.gms/org.microg.nlp/' overlay/common/frameworks/base/core/res/res/values/config.xml; fi;
if [ "$MICROG_INCLUDED" != "NONE" ]; then cp "$patchesCommon/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi; if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/sce-UnifiedNLP-Backends.mk" config/sce-UnifiedNLP-Backends.mk; fi;
if [ "$MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/lineage/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi; if [ "$DOS_MICROG_INCLUDED" != "NONE" ]; then echo "include vendor/lineage/config/sce-UnifiedNLP-Backends.mk" >> config/sce.mk; fi;
cp -r "$patchesCommon/android_vendor_divested/firmware_deblobber" .; cp -r "$DOS_PATCHES_COMMON/android_vendor_divested/firmware_deblobber" .;
cp "$patches/android_vendor_lineage/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk; cp "$DOS_PATCHES/android_vendor_lineage/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk;
sed -i 's/LINEAGE_BUILDTYPE := UNOFFICIAL/LINEAGE_BUILDTYPE := dos/' config/common.mk; #Change buildtype sed -i 's/LINEAGE_BUILDTYPE := UNOFFICIAL/LINEAGE_BUILDTYPE := dos/' config/common.mk; #Change buildtype
if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/LINEAGE_BUILDTYPE := dos/LINEAGE_BUILDTYPE := dosNC/' config/common.mk; fi; if [ "$DOS_NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/LINEAGE_BUILDTYPE := dos/LINEAGE_BUILDTYPE := dosNC/' config/common.mk; fi;
sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence
#if [ "$HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative #if [ "$DOS_HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative
if [ "$HOSTS_BLOCKING" = false ]; then cp "$patchesCommon/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi; if [ "$DOS_HOSTS_BLOCKING" = false ]; then cp "$DOS_PATCHES_COMMON/android_vendor_divested/dns66.json" prebuilt/common/etc/dns66.json; fi;
if [ "$HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/lineage/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config if [ "$DOS_HOSTS_BLOCKING" = false ]; then sed -i '4iPRODUCT_COPY_FILES += vendor/lineage/prebuilt/common/etc/dns66.json:system/etc/dns66/settings.json' config/common.mk; fi; #Include DNS66 default config
# #
#END OF ROM CHANGES #END OF ROM CHANGES
# #
@ -230,21 +230,21 @@ echo "allow wcnss_service block_device:dir search;" >> sepolicy/wcnss_service.te
echo "/dev/block/platform/msm_sdcc\.1/by-name/pad u:object_r:misc_block_device:s0" >> sepolicy/file_contexts; #fix uncrypt denial echo "/dev/block/platform/msm_sdcc\.1/by-name/pad u:object_r:misc_block_device:s0" >> sepolicy/file_contexts; #fix uncrypt denial
enterAndClear "device/lge/mako"; enterAndClear "device/lge/mako";
cp "$patches/android_device_lge_mako/proprietary-blobs.txt" proprietary-blobs.txt; #Out of sync cp "$DOS_PATCHES/android_device_lge_mako/proprietary-blobs.txt" proprietary-blobs.txt; #Out of sync
echo "allow kickstart usbfs:dir search;" >> sepolicy/kickstart.te; #Fix forceencrypt on first boot echo "allow kickstart usbfs:dir search;" >> sepolicy/kickstart.te; #Fix forceencrypt on first boot
patch -p1 < "$patches/android_device_lge_mako/0001-Enable_LTE.patch"; patch -p1 < "$DOS_PATCHES/android_device_lge_mako/0001-Enable_LTE.patch";
enterAndClear "device/oppo/msm8974-common"; enterAndClear "device/oppo/msm8974-common";
sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/ sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/
#Make changes to all devices #Make changes to all devices
cd "$base"; cd "$DOS_BUILD_BASE";
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enhanceLocation "$0"' {} \;
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableDexPreOpt "$0"' {} \;
find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \; find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableForcedEncryption "$0"' {} \;
#if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi; #if [ "$STRONG_ENCRYPTION_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableStrongEncryption "$0"' {} \; fi;
find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \; find "kernel" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'hardenDefconfig "$0"' {} \;
cd "$base"; cd "$DOS_BUILD_BASE";
#Fix broken options enabled by hardenDefconfig() #Fix broken options enabled by hardenDefconfig()
sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile

View File

@ -22,48 +22,48 @@ echo "Rebranding...";
enter "bootable/recovery"; enter "bootable/recovery";
git revert bc57208dfcd0958d03a00bbcf5345be6ceac9988 6ac3bb48f9d10e604d4b2d6c4152be9d35d17ea0; git revert bc57208dfcd0958d03a00bbcf5345be6ceac9988 6ac3bb48f9d10e604d4b2d6c4152be9d35d17ea0;
patch -p1 < "$patches/android_bootable_recovery/0001-Remove_Logo.patch"; #Remove logo rendering code patch -p1 < "$DOS_PATCHES/android_bootable_recovery/0001-Remove_Logo.patch"; #Remove logo rendering code
rm res*/images/logo_image.png; #Remove logo images rm res*/images/logo_image.png; #Remove logo images
mogrify -format png -fill "#FF5722" -opaque "#167C80" -fuzz 10% res-*/images/*sel.png; #Recolor icons mogrify -format png -fill "#FF5722" -opaque "#167C80" -fuzz 10% res-*/images/*sel.png; #Recolor icons
sed -i 's|grid_h \* 2 / 3|grid_h * 0.25|' screen_ui.cpp; #Center icons sed -i 's|grid_h \* 2 / 3|grid_h * 0.25|' screen_ui.cpp; #Center icons
sed -i 's|0x16, 0x7c, 0x80|100, 34, 13|' screen_ui.cpp; #Recolor text sed -i 's|0x16, 0x7c, 0x80|100, 34, 13|' screen_ui.cpp; #Recolor text
sed -i 's|Android Recovery|'"$REBRAND_NAME"' Recovery|' ./*_ui.cpp; sed -i 's|Android Recovery|'"$DOS_BRANDING_NAME"' Recovery|' ./*_ui.cpp;
sed -i 's|LineageOS|'"$REBRAND_NAME"'|' ui.cpp; sed -i 's|LineageOS|'"$DOS_BRANDING_NAME"'|' ui.cpp;
enter "build/make"; enter "build/make";
sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user sed -i 's|echo "ro.build.user=$USER"|echo "ro.build.user=emy"|' tools/buildinfo.sh; #Override build user
sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host sed -i 's|echo "ro.build.host=`hostname`"|echo "ro.build.host=dosbm"|' tools/buildinfo.sh; #Override build host
enter "frameworks/base"; enter "frameworks/base";
generateBootAnimationMask "$REBRAND_NAME" "$REBRAND_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png; generateBootAnimationMask "$DOS_BRANDING_NAME" "$DOS_BRANDING_BOOTANIMATION_FONT" core/res/assets/images/android-logo-mask.png;
generateBootAnimationShine "$REBRAND_BOOTANIMATION_COLOR" "$REBRAND_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png; generateBootAnimationShine "$DOS_BRANDING_BOOTANIMATION_COLOR" "$DOS_BRANDING_BOOTANIMATION_STYLE" core/res/assets/images/android-logo-shine.png;
enter "lineage-sdk"; enter "lineage-sdk";
sed -i '/.*lineage_version/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml; sed -i '/.*lineage_version/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
sed -i '/.*lineage_updates/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml; sed -i '/.*lineage_updates/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
sed -i '/.*lineageos_system_label/s/LineageOS/'"$REBRAND_NAME"'/' lineage/res/res/values*/strings.xml; sed -i '/.*lineageos_system_label/s/LineageOS/'"$DOS_BRANDING_NAME"'/' lineage/res/res/values*/strings.xml;
enter "packages/apps/LineageParts"; enter "packages/apps/LineageParts";
sed -i '/.*trust_feature_security_patches_explain/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml; sed -i '/.*trust_feature_security_patches_explain/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
enter "packages/apps/Settings"; enter "packages/apps/Settings";
sed -i '/.*lineagelicense_title/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/cm_strings.xml; sed -i '/.*lineagelicense_title/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/cm_strings.xml;
enter "packages/apps/SetupWizard"; enter "packages/apps/SetupWizard";
sed -i 's|http://lineageos.org/legal|'"$REBRAND_LINK_PRIVACY"'|' src/org/lineageos/setupwizard/LineageSettingsActivity.java; sed -i 's|http://lineageos.org/legal|'"$DOS_BRANDING_LINK_PRIVACY"'|' src/org/lineageos/setupwizard/LineageSettingsActivity.java;
sed -i '/.*setup_services/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml; sed -i '/.*setup_services/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
sed -i '/.*services_explanation/s/LineageOS/'"$REBRAND_NAME"'/' res/values*/strings.xml; sed -i '/.*services_explanation/s/LineageOS/'"$DOS_BRANDING_NAME"'/' res/values*/strings.xml;
cp "$patchesCommon/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours cp "$DOS_PATCHES_COMMON/android_packages_apps_SetupWizard/logo.xml" "res/drawable/logo.xml"; #Replace Lineage logo with ours
enter "packages/apps/Updater"; enter "packages/apps/Updater";
sed -i 's|0OTASERVER0|'"$REBRAND_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java; sed -i 's|0OTASERVER0|'"$DOS_BRANDING_SERVER_OTA"'|' src/org/lineageos/updater/misc/Utils.java;
sed -i 's|>LineageOS|>'"$REBRAND_NAME"'|' res/values*/strings.xml; sed -i 's|>LineageOS|>'"$DOS_BRANDING_NAME"'|' res/values*/strings.xml;
enter "vendor/lineage"; enter "vendor/lineage";
sed -i 's|https://lineageos.org/legal|'"$REBRAND_LINK_ABOUT"'|' build/core/main_version.mk sed -i 's|https://lineageos.org/legal|'"$DOS_BRANDING_LINK_ABOUT"'|' build/core/main_version.mk
sed -i '/.*ZIPPATH=/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/envsetup.sh; sed -i '/.*ZIPPATH=/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/envsetup.sh;
sed -i '/LINEAGE_TARGET_PACKAGE/s/lineage/'"$REBRAND_ZIP_PREFIX"'/' build/tasks/bacon.mk; sed -i '/LINEAGE_TARGET_PACKAGE/s/lineage/'"$DOS_BRANDING_ZIP_PREFIX"'/' build/tasks/bacon.mk;
rm -rf bootanimation; rm -rf bootanimation;
cd "$base"; cd "$DOS_BUILD_BASE";
echo "Rebranding complete!"; echo "Rebranding complete!";

View File

@ -18,31 +18,41 @@
#Sets settings used by all other scripts #Sets settings used by all other scripts
#START OF USER CONFIGURABLE OPTIONS #START OF USER CONFIGURABLE OPTIONS
export androidWorkspace="/mnt/Drive-3/"; #XXX: THIS MUST BE CORRECT TO BUILD! export DOS_WORKSPACE_ROOT="/mnt/Drive-3/"; #XXX: THIS MUST BE CORRECT TO BUILD!
export DOS_SIGNING_KEYS=$DOS_WORKSPACE_ROOT"Signing_Keys";
#export DOS_PATCHER_BINARY="";
export ANDROID_HOME="/home/$USER/Android/Sdk";
export DEBLOBBER_REMOVE_AUDIOFX=true; #Set true to remove AudioFX export DOS_DEBLOBBER_REMOVE_AUDIOFX=true; #Set true to remove AudioFX
export DEBLOBBER_REMOVE_IMS=false; #Set true to remove all IMS blobs export DOS_DEBLOBBER_REMOVE_IMS=false; #Set true to remove all IMS blobs
export DEBLOBBER_REPLACE_TIME=false; #Set true to replace Qualcomm Time Services with the open source Sony TimeKeep reimplementation export DOS_DEBLOBBER_REPLACE_TIME=false; #Set true to replace Qualcomm Time Services with the open source Sony TimeKeep reimplementation
export DEFAULT_DNS_PRESET="OpenNIC"; #Sets default DNS. Options: Cloudflare, OpenNIC, DNSWATCH, Google, OpenDNS, Quad9, Quad9U, Verisign export DOS_DEFAULT_DNS_PRESET="OpenNIC"; #Sets default DNS. Options: Cloudflare, OpenNIC, DNSWATCH, Google, OpenDNS, Quad9, Quad9U, Verisign
export GLONASS_FORCED_ENABLE=true; #Enables GLONASS on all devices export DOS_GLONASS_FORCED_ENABLE=true; #Enables GLONASS on all devices
export MALWARE_SCAN_ENABLED=true; #Set true to perform a fast scan on patchWorkspace() and a through scan on buildAll() export DOS_MALWARE_SCAN_ENABLED=true; #Set true to perform a fast scan on patchWorkspace() and a through scan on buildAll()
export MALWARE_SCAN_SETTING="quick"; #buildAll() scan speed. Options: quick, extra, slow, full export DOS_MALWARE_SCAN_SETTING="quick"; #buildAll() scan speed. Options: quick, extra, slow, full
export MICROG_INCLUDED="NLP"; #Determines inclusion of microG. Options: NONE, NLP, FULL export DOS_MICROG_INCLUDED="NLP"; #Determines inclusion of microG. Options: NONE, NLP, FULL
export HOSTS_BLOCKING=true; #Switch to false to prevent inclusion of our HOSTS file export DOS_HOSTS_BLOCKING=true; #Switch to false to prevent inclusion of our HOSTS file
export HOSTS_BLOCKING_LIST="https://spotco.us/hosts"; #Must be in the format "127.0.0.0 bad.domain.tld". XXX: /hosts is built from non-commercial use files, switch to /hsc for release export DOS_HOSTS_BLOCKING_LIST="https://spotco.us/hosts"; #Must be in the format "127.0.0.0 bad.domain.tld". XXX: /hosts is built from non-commercial use files, switch to /hsc for release
export OVERCLOCKS_ENABLED=true; #Switch to false to disable overclocks export DOS_OVERCLOCKS_ENABLED=true; #Switch to false to disable overclocks
export STRONG_ENCRYPTION_ENABLED=false; #Switch to true to enable AES-256bit encryption XXX: THIS WILL **DESTROY** EXISTING INSTALLS! export DOS_STRONG_ENCRYPTION_ENABLED=false; #Switch to true to enable AES-256bit encryption XXX: THIS WILL **DESTROY** EXISTING INSTALLS!
export NON_COMMERCIAL_USE_PATCHES=false; #Switch to false to prevent inclusion of non-commercial use patches export DOS_NON_COMMERCIAL_USE_PATCHES=false; #Switch to false to prevent inclusion of non-commercial use patches
export REBRAND_NAME="DivestOS"; export DOS_BRANDING_NAME="DivestOS";
export REBRAND_ZIP_PREFIX="divested"; export DOS_BRANDING_ZIP_PREFIX="divested";
export REBRAND_BOOTANIMATION_FONT="Fira-Sans-Bold"; #Options: $ convert -list font export DOS_BRANDING_BOOTANIMATION_FONT="Fira-Sans-Bold"; #Options: $ convert -list font
export REBRAND_BOOTANIMATION_STYLE="plasma"; #Options: gradient, plasma export DOS_BRANDING_BOOTANIMATION_STYLE="plasma"; #Options: gradient, plasma
#export REBRAND_BOOTANIMATION_COLOR="#FF5722-#FF8A65"; #gradient #export DOS_BRANDING_BOOTANIMATION_COLOR="#FF5722-#FF8A65"; #gradient
export REBRAND_BOOTANIMATION_COLOR="#FF5722-#03A9F4"; #plasma export DOS_BRANDING_BOOTANIMATION_COLOR="#FF5722-#03A9F4"; #plasma
export REBRAND_LINK_ABOUT="https://divestos.xyz/index.php?page=about"; export DOS_BRANDING_LINK_ABOUT="https://divestos.xyz/index.php?page=about";
export REBRAND_LINK_PRIVACY="https://divestos.xyz/index.php?page=privacy_policy"; export DOS_BRANDING_LINK_PRIVACY="https://divestos.xyz/index.php?page=privacy_policy";
export REBRAND_SERVER_OTA="https://divestos.xyz/updater.php"; export DOS_BRANDING_SERVER_OTA="https://divestos.xyz/updater.php";
export DOS_THEME_50="FFCA28"; #Amber 400
export DOS_THEME_100="FFC107"; #Amber 500
export DOS_THEME_200="FFA726"; #Orange 400
export DOS_THEME_300="FF9800"; #Orange 500
export DOS_THEME_500="FF5722"; #Deep Orange 500
export DOS_THEME_700="E64A19"; #Deep Orange 700
#END OF USER CONFIGURABLE OPTIONS #END OF USER CONFIGURABLE OPTIONS
BUILD_WORKING_DIR=${PWD##*/}; BUILD_WORKING_DIR=${PWD##*/};
@ -53,45 +63,42 @@ else
return 1; return 1;
fi; fi;
export base=$androidWorkspace"Build/$BUILD_WORKING_DIR/"; export DOS_BUILD_BASE=$DOS_WORKSPACE_ROOT"Build/$BUILD_WORKING_DIR/";
if [ ! -d "$base" ]; then if [ ! -d "$DOS_BUILD_BASE" ]; then
echo "Path mismatch! Please update init.sh!"; echo "Path mismatch! Please update init.sh!";
return 1; return 1;
fi; fi;
export prebuiltApps=$androidWorkspace"PrebuiltApps/"; export DOS_PREBUILT_APPS=$DOS_WORKSPACE_ROOT"PrebuiltApps/";
export patchesCommon=$androidWorkspace"Patches/Common/"; export DOS_PATCHES_COMMON=$DOS_WORKSPACE_ROOT"Patches/Common/";
export patches=$androidWorkspace"Patches/$BUILD_WORKING_DIR/"; export DOS_PATCHES=$DOS_WORKSPACE_ROOT"Patches/$BUILD_WORKING_DIR/";
export overclocks=$androidWorkspace"Patches/Overclocks/"; export DOS_PATCHES_OVERCLOCKS=$DOS_WORKSPACE_ROOT"Patches/Overclocks/";
export cvePatchesLinux=$androidWorkspace"Patches/Linux/"; export DOS_PATCHES_LINUX_CVES=$DOS_WORKSPACE_ROOT"Patches/Linux/";
export cvePatchesAndroid=$androidWorkspace"Patches/Android/"; export DOS_PATCHES_ANDROID_CVES=$DOS_WORKSPACE_ROOT"Patches/Android/";
export dosWallpapers=$androidWorkspace"Patches/Wallpapers/"; export DOS_WALLPAPERS=$DOS_WORKSPACE_ROOT"Patches/Wallpapers/";
export scriptsCommon=$androidWorkspace"Scripts/Common/"; export DOS_SCRIPTS_COMMON=$DOS_WORKSPACE_ROOT"Scripts/Common/";
export scripts=$androidWorkspace"Scripts/$BUILD_WORKING_DIR/"; export DOS_SCRIPTS=$DOS_WORKSPACE_ROOT"Scripts/$BUILD_WORKING_DIR/";
if [ ! -d "$scripts" ]; then if [ ! -d "$DOS_SCRIPTS" ]; then
echo "$BUILD_WORKING_DIR is not supported!"; echo "$BUILD_WORKING_DIR is not supported!";
return 1; return 1;
fi; fi;
export cveScripts=$scripts"CVE_Patchers/"; export DOS_SCRIPTS_CVES=$DOS_SCRIPTS"CVE_Patchers/";
export SIGNING_KEY_DIR=$androidWorkspace"Signing_Keys"; export SIGNING_KEY_DIR=$DOS_SIGNING_KEYS;
export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey"; export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey";
export ANDROID_HOME="/home/$USER/Android/Sdk";
export KBUILD_BUILD_USER="emy"; export KBUILD_BUILD_USER="emy";
export KBUILD_BUILD_HOST="dosbm"; export KBUILD_BUILD_HOST="dosbm";
export ANDROID_JACK_VM_ARGS="-Xmx6144m -Xms512m -Dfile.encoding=UTF-8 -XX:+TieredCompilation"; export ANDROID_JACK_VM_ARGS="-Xmx6144m -Xms512m -Dfile.encoding=UTF-8 -XX:+TieredCompilation";
export JACK_SERVER_VM_ARGUMENTS="${ANDROID_JACK_VM_ARGS}"; export JACK_SERVER_VM_ARGUMENTS="${ANDROID_JACK_VM_ARGS}";
export GRADLE_OPTS="-Xmx2048m"; export GRADLE_OPTS="-Xmx2048m";
source "$scriptsCommon/Functions.sh";
source "$scripts/Functions.sh";
export LC_ALL=C; export LC_ALL=C;
source "$DOS_SCRIPTS_COMMON/Functions.sh";
source "$DOS_SCRIPTS/Functions.sh";
unalias cp &>/dev/null || true; unalias cp &>/dev/null || true;
unalias mv &>/dev/null || true; unalias mv &>/dev/null || true;
unalias rm &>/dev/null || true; unalias rm &>/dev/null || true;