From de226057859363336da642fa07e201f7845860aa Mon Sep 17 00:00:00 2001 From: Tad Date: Sat, 14 Aug 2021 02:19:58 -0400 Subject: [PATCH] 18.1: add sunfish, bramble, and redfin Signed-off-by: Tad --- Manifests/Manifest_LAOS-18.1.xml | 13 ++ Scripts/Common/Copy_Keys.sh | 6 + Scripts/Common/Fix_CVE_Patchers.sh | 1 + .../android_kernel_google_redbull.sh | 162 ++++++++++++++++++ .../android_kernel_google_sunfish.sh | 149 ++++++++++++++++ Scripts/LineageOS-18.1/Functions.sh | 7 +- Scripts/LineageOS-18.1/Patch.sh | 20 +++ Scripts/init.sh | 2 +- 8 files changed, 358 insertions(+), 2 deletions(-) create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index 748c6179..e3dc7165 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -110,6 +110,19 @@ + + + + + + + + + + + + + diff --git a/Scripts/Common/Copy_Keys.sh b/Scripts/Common/Copy_Keys.sh index 97c6c6e3..958d732a 100644 --- a/Scripts/Common/Copy_Keys.sh +++ b/Scripts/Common/Copy_Keys.sh @@ -25,6 +25,7 @@ cat "$DOS_SIGNING_KEYS/blueline/verity.x509.pem" >> "kernel/google/crosshatch/ce cat "$DOS_SIGNING_KEYS/blueline/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/bonito/verity.x509.pem" >> "kernel/google/bonito/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/bonito/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/bramble/verity.x509.pem" >> "kernel/google/redbull/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/cheeseburger/verity.x509.pem" >> "kernel/oneplus/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/cheryl/verity.x509.pem" >> "kernel/razer/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/coral/verity.x509.pem" >> "kernel/google/coral/certs/verity.x509.pem"; @@ -46,11 +47,13 @@ cat "$DOS_SIGNING_KEYS/mata/verity.x509.pem" >> "kernel/essential/msm8998/certs/ cat "$DOS_SIGNING_KEYS/oneplus3/verity.x509.pem" >> "kernel/oneplus3/msm8996/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/pro1/verity.x509.pem" >> "kernel/fxtec/msm8998/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/raphael/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/redfin/verity.x509.pem" >> "kernel/google/redbull/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/sailfish/verity.x509.pem" >> "kernel/google/marlin/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/sargo/verity.x509.pem" >> "kernel/google/bonito/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/sargo/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem"; #cat "$DOS_SIGNING_KEYS/starlte/verity.x509.pem" >> "kernel/samsung/universal9810/certs/verity.x509.pem"; #cat "$DOS_SIGNING_KEYS/star2lte/verity.x509.pem" >> "kernel/samsung/universal9810/certs/verity.x509.pem"; +cat "$DOS_SIGNING_KEYS/sunfish/verity.x509.pem" >> "kernel/google/sunfish/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/taimen/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/walleye/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem"; cat "$DOS_SIGNING_KEYS/z2_plus/verity.x509.pem" >> "kernel/zuk/msm8996/certs/verity.x509.pem"; @@ -65,6 +68,7 @@ cp -v "$DOS_SIGNING_KEYS/blueline/verifiedboot_relkeys.der.x509" "kernel/google/ cp -v "$DOS_SIGNING_KEYS/blueline/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_blueline_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/bonito/verifiedboot_relkeys.der.x509" "kernel/google/bonito/verifiedboot_bonito_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/bonito/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_bonito_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/bramble/verifiedboot_relkeys.der.x509" "kernel/google/redbull/verifiedboot_bramble_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/cheeseburger/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8998/verifiedboot_cheeseburger_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/cheryl/verifiedboot_relkeys.der.x509" "kernel/razer/msm8998/verifiedboot_cheryl_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/coral/verifiedboot_relkeys.der.x509" "kernel/google/coral/verifiedboot_coral_dos_relkeys.der.x509"; @@ -86,11 +90,13 @@ cp -v "$DOS_SIGNING_KEYS/mata/verifiedboot_relkeys.der.x509" "kernel/essential/m cp -v "$DOS_SIGNING_KEYS/oneplus3/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8996/verifiedboot_oneplus3_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/pro1/verifiedboot_relkeys.der.x509" "kernel/fxtec/msm8998/verifiedboot_pro1_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/raphael/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_raphael_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/redfin/verifiedboot_relkeys.der.x509" "kernel/google/redbull/verifiedboot_redfin_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sailfish/verifiedboot_relkeys.der.x509" "kernel/google/marlin/verifiedboot_sailfish_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sargo/verifiedboot_relkeys.der.x509" "kernel/google/bonito/verifiedboot_sargo_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/sargo/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_sargo_dos_relkeys.der.x509"; #cp -v "$DOS_SIGNING_KEYS/starlte/verifiedboot_relkeys.der.x509" "kernel/samsung/universal9810/verifiedboot_starlte_dos_relkeys.der.x509"; #cp -v "$DOS_SIGNING_KEYS/star2lte/verifiedboot_relkeys.der.x509" "kernel/samsung/universal9810/verifiedboot_star2lte_dos_relkeys.der.x509"; +cp -v "$DOS_SIGNING_KEYS/sunfish/verifiedboot_relkeys.der.x509" "kernel/google/sunfish/verifiedboot_sunfish_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/taimen/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_taimen_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/walleye/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_walleye_dos_relkeys.der.x509"; cp -v "$DOS_SIGNING_KEYS/z2_plus/verifiedboot_relkeys.der.x509" "kernel/zuk/msm8996/verifiedboot_z2_plus_dos_relkeys.der.x509"; diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index 8b43a358..1e8deee4 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -45,6 +45,7 @@ commentPatches android_kernel_google_crosshatch.sh "CVE-2020-0067"; commentPatches android_kernel_google_marlin.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch" "CVE-2017-13162/3.18/0001.patch" "CVE-2017-14883" "CVE-2017-15951" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166"; commentPatches android_kernel_google_msm.sh "CVE-2017-11015/prima"; commentPatches android_kernel_google_msm-4.9.sh "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-1749" "CVE-2020-8992"; +commentPatches android_kernel_google_redbull.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2021-3600"; commentPatches android_kernel_google_wahoo.sh "CVE-2019-14047/ANY/0002.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166"; commentPatches android_kernel_google_yellowstone.sh "0001-LinuxIncrementals/3.10/3.10.0098-0099.patch" "CVE-2018-9514"; commentPatches android_kernel_huawei_angler.sh "CVE-2014-8559"; diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh new file mode 100644 index 00000000..3599dc8f --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh @@ -0,0 +1,162 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/google/redbull" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0181-0182.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0185-0186.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0087.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0088.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0089.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0090.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0091.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0092.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0094.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0097.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0098.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0099.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0100.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0101.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0102.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0103.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0104.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0105.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0106.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0107.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0108.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0109.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0110.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0111.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0112.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0113.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0114.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36311/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.18-^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.19/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3600/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14-^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29264/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.19/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch +editKernelLocalversion "-dos.p158" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh new file mode 100644 index 00000000..feeaebf4 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh @@ -0,0 +1,149 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/google/sunfish" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0216-0217.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0057.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0058.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0061.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0074.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0076.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0082.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0083.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0084.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0085.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0086.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4.2/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.7.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.14/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch +editKernelLocalversion "-dos.p145" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index a7ae3573..ebe72d0b 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -18,7 +18,7 @@ #Last verified: 2021-03-22 patchAllKernels() { - startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250"; + startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250"; } export -f patchAllKernels; @@ -99,6 +99,8 @@ buildAll() { buildDevice fajita avb; #SD632 buildDevice FP3 avb; + #SD730 + buildDevice sunfish avb; #SD855 buildDevice guacamole avb; buildDevice hotdog avb; @@ -106,6 +108,9 @@ buildAll() { buildDevice coral avb; buildDevice flame avb; #buildDevice raphael avb; #unb + missing vendor + #SD765 + buildDevice bramble avb; + buildDevice redfin avb; #SD865 buildDevice lmi avb; #SD870 diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index cd088863..f15e0666 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -297,6 +297,10 @@ enableVerity; #Resurrect dm-verity awk -i inplace '!/INODE_COUNT/' BoardConfigLineage.mk; #mke2fs -1 incompatibility (?) fi; +if enterAndClear "device/google/bramble"; then +enableVerity; #Resurrect dm-verity +fi; + if enterAndClear "device/google/coral"; then enableVerity; #Resurrect dm-verity fi; @@ -305,6 +309,22 @@ if enterAndClear "device/google/crosshatch"; then enableVerity; #Resurrect dm-verity fi; +if enterAndClear "device/google/muskie"; then +enableVerity; #Resurrect dm-verity +fi; + +if enterAndClear "device/google/redbull"; then +enableVerity; #Resurrect dm-verity +fi; + +if enterAndClear "device/google/redfin"; then +enableVerity; #Resurrect dm-verity +fi; + +if enterAndClear "device/google/sunfish"; then +enableVerity; #Resurrect dm-verity +fi; + if enterAndClear "device/google/taimen"; then enableVerity; #Resurrect dm-verity fi; diff --git a/Scripts/init.sh b/Scripts/init.sh index aa61b901..2b1f3796 100644 --- a/Scripts/init.sh +++ b/Scripts/init.sh @@ -71,7 +71,7 @@ export DOS_GPS_SUPL_HOST="supl.google.com"; #Options: supl.{google,vodafone,sony #Release Processing export DOS_MALWARE_SCAN_BEFORE_SIGN=false; #Scan device files for malware before signing export DOS_GENERATE_DELTAS=true; #Creates deltas from existing target_files in $DOS_BUILDS -export DOS_GENERATE_DELTAS_DEVICES=('Amber' 'alioth' 'avicii' 'blueline' 'bonito' 'cheryl' 'coral' 'crosshatch' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pro1' 'sailfish' 'sargo' 'taimen' 'walleye'); #List of devices deltas will be generated for +export DOS_GENERATE_DELTAS_DEVICES=('Amber' 'alioth' 'avicii' 'blueline' 'bonito' 'bramble' 'cheryl' 'coral' 'crosshatch' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pro1' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'walleye'); #List of devices deltas will be generated for export DOS_AUTO_ARCHIVE_BUILDS=true; #Copies files to $DOS_BUILDS after signing export DOS_REMOVE_AFTER=true; #Removes device OUT directory after complete to reclaim space. Requires AUTO_ARCHIVE_BUILDS=true export DOS_GPG_SIGNING=true;