From fbf6058e653f6a1f101fa5172eb27364e63407c5 Mon Sep 17 00:00:00 2001 From: Tad Date: Sat, 22 Jul 2023 15:03:58 -0400 Subject: [PATCH] 18.1: unofficial hammerhead bringup by @z3DD3r not broken like 16.0 and way more updated than 15.1 Signed-off-by: Tad --- Manifests/Manifest_LAOS-18.1.xml | 4 + Misc/bringup | 4 - Scripts/Common/Deblob.sh | 11 +- Scripts/LineageOS-14.1/Patch.sh | 3 + .../android_kernel_lge_hammerhead.sh | 397 ++++++++++++++++++ Scripts/LineageOS-18.1/Functions.sh | 9 +- Scripts/LineageOS-18.1/Patch.sh | 11 + 7 files changed, 430 insertions(+), 9 deletions(-) create mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index 9252ceef..a6463340 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -146,6 +146,10 @@ + + + + diff --git a/Misc/bringup b/Misc/bringup index 3a16ff86..1d7dfd36 100644 --- a/Misc/bringup +++ b/Misc/bringup @@ -8,10 +8,6 @@ m7, currently 14.1: broken - https://forum.xda-developers.com/t/rom-11-0-unofficial-m7-all-lineageos-18-1-stable.4187799/ https://forum.xda-developers.com/t/rom-10-0-unofficial-m7-all-lineageos-17-1-stable.3969563/ -hammerhead, currently 15.1/16.0 -broken - https://forum.xda-developers.com/t/rom-unofficial-lineageos-18-1-for-nexus-5-hammerhead-discontinued.4214367/ -https://forum.xda-developers.com/t/rom-unofficial-lineageos-17-1-for-nexus-5-hammerhead-discontinued.4039273/ - bullhead, currently 15.1 missing source code - https://forum.xda-developers.com/t/rom-11-unofficial-lineageos-18-1-2021-08-09-discontinued.4318251/ https://forum.xda-developers.com/t/rom-unofficial-lineageos-17-1-blod-patched-2021-08-09.4049993/ diff --git a/Scripts/Common/Deblob.sh b/Scripts/Common/Deblob.sh index 6e8c0ed8..236a7837 100644 --- a/Scripts/Common/Deblob.sh +++ b/Scripts/Common/Deblob.sh @@ -49,7 +49,7 @@ echo "Deblobbing..."; blobs=$blobs"ifaadaemon|ifaadaemonProxy"; blobs=$blobs"|IFAAService.apk"; blobs=$blobs"|vendor.oneplus.hardware.ifaa.*"; - makes=$makes"org.ifaa.android.manager"; + makes=$makes"org.ifaa.android.manager|IFAAService"; manifests=$manifests"hardware.ifaa"; #Alipay (Payment Platform) [Alibaba] @@ -75,6 +75,7 @@ echo "Deblobbing..."; if [ "$DOS_DEBLOBBER_REMOVE_APTX" = true ]; then blobs=$blobs"|.*aptX.*|libbt-aptx.*.so"; blobs=$blobs"|aptxui.apk"; + #makes=$makes"|aptxui"; fi; #AT Command Handling/Forwarding (See: https://atcommands.org) @@ -84,6 +85,7 @@ echo "Deblobbing..."; blobs=$blobs"|ATFWD-daemon|atfwd_daemon"; blobs=$blobs"|vendor.qti.atcmdfwd.*|vendor.qti.hardware.radio.atcmdfwd.*"; blobs=$blobs"|atfwd.apk"; + #makes=$makes"|atfwd"; sepolicy=$sepolicy" atfwd.te"; manifests=$manifests"|AtCmdFwd"; fi; @@ -122,7 +124,7 @@ echo "Deblobbing..."; manifests=$manifests"|com.quicinc.cne|iwlan"; blobs=$blobs"|QualifiedNetworksService.apk"; #Google blobs=$blobs"|qualifiednetworksservice.xml"; - makes=$makes"|Iwlan"; + makes=$makes"|Iwlan|CNEService|CneApp|IWlanService"; fi; #CPPF (DRM) [?] @@ -175,6 +177,7 @@ echo "Deblobbing..."; sepolicy=$sepolicy" dpmd.te"; ipcSec=$ipcSec"|47:4294967295:1001:3004|48:4294967295:1000:3004"; manifests=$manifests"|dpmQmiService"; + makes=$makes"|dpmserviceapp"; fi; #DRM @@ -206,6 +209,7 @@ echo "Deblobbing..."; blobs=$blobs"|embms.xml"; blobs=$blobs"|embmslibrary.jar"; manifests=$manifests"|embms"; + #makes=$makes"|embms"; #External Accessories if [ "$DOS_DEBLOBBER_REMOVE_ACCESSORIES" = true ]; then @@ -480,7 +484,8 @@ echo "Deblobbing..."; blobs=$blobs"|libdme_main.so|libwbxmlparser.so|libprovlib.so"; blobs=$blobs"|dm_agent|dm_agent_binder"; blobs=$blobs"|npsmobex"; #Samsung? - blobs=$blobs"|ConnMO.apk|OmaDmclient.apk|USCCDM.apk|com.android.omadm.service.xml|com.android.omadm.radioconfig.xml|DCMO.apk|DiagMon.apk|DMConfigUpdate.apk|DMConfigUpdateLight.apk|DMService.apk|libdmengine.so|libdmjavaplugin.so|SprintDM.apk|SDM.apk|whitelist_com.android.omadm.service.xml|com.android.sdm.plugins.connmo.xml|com.android.sdm.plugins.sprintdm.xml|com.google.omadm.trigger.xml|com.android.sdm.plugins.diagmon.xml|com.android.sdm.plugins.dcmo.xml|com.android.sdm.plugins.usccdm.xml"; #Sprint + blobs=$blobs"|ConnMO.apk|OmaDmclient.apk|SprintHiddenMenu.apk|UpdateSetting.apk|USCCDM.apk|com.android.omadm.service.xml|com.android.omadm.radioconfig.xml|DCMO.apk|DiagMon.apk|DMConfigUpdate.apk|DMConfigUpdateLight.apk|DMService.apk|libdmengine.so|libdmjavaplugin.so|SprintDM.apk|SDM.apk|whitelist_com.android.omadm.service.xml|com.android.sdm.plugins.connmo.xml|com.android.sdm.plugins.sprintdm.xml|com.google.omadm.trigger.xml|com.android.sdm.plugins.diagmon.xml|com.android.sdm.plugins.dcmo.xml|com.android.sdm.plugins.usccdm.xml"; #Sprint + makes=$makes"|OmaDmclient|SprintHiddenMenu|UpdateSetting|SecPhone|HiddenMenu"; #SDM #OpenMobileAPI [SIM Alliance] #https://github.com/seek-for-android/platform_packages_apps_SmartCardService diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index 4ce637f0..d02c5296 100644 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -683,6 +683,9 @@ enableLowRam "device/samsung/tuna"; awk -i inplace '!/nfc_enhanced.mk/' device/samsung/toro*/lineage.mk || true; awk -i inplace '!/TARGET_RECOVERY_UPDATER_LIBS/' device/samsung/toro*/BoardConfig.mk || true; awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' device/samsung/toro*/BoardConfig.mk || true; +awk -i inplace '!/SDM/' vendor/samsung/toroplus/toroplus-vendor.mk || true; +awk -i inplace '!/HiddenMenu/' vendor/samsung/toroplus/toroplus-vendor.mk || true; +awk -i inplace '!/SecPhone/' vendor/samsung/toroplus/toroplus-vendor.mk || true; sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10 rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true; diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh new file mode 100644 index 00000000..a7c6a274 --- /dev/null +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh @@ -0,0 +1,397 @@ +#!/bin/bash +if cd "$DOS_BUILD_BASE""kernel/lge/hammerhead"; then +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch +#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch +#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2595/ANY/kernel.msm.git-3d1d825fe450304ce150559a1c5ffba068824629.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9881/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9882/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7916/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8466/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0463/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0525/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0825/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2636/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7889/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8247/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9074/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.4/0076.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13303/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14879/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.4/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0023.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/3.4/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0063.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0070.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch +git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p391" +else echo "kernel_lge_hammerhead is unavailable, not patching."; +fi; +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index a8294472..0e9b3790 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_moto_shamu kernel_motorola_msm8974 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996"; + startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_hammerhead kernel_lge_mako kernel_lge_msm8974 kernel_moto_shamu kernel_motorola_msm8974 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996"; } export -f patchAllKernels; @@ -67,6 +67,7 @@ buildAll() { buildDevice jfltevzw; buildDevice jfvelte; #SD800 + buildDevice hammerhead; buildDevice d800; buildDevice d801; buildDevice d802; @@ -114,10 +115,14 @@ patchWorkspaceReal() { verifyAllPlatformTags; gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview"; - #source build/envsetup.sh; + source build/envsetup.sh; #repopick -it eleven-firewall; #repopick -i 314453; #TaskViewTouchController: Null check current animation on drag #repopick -i 325011; #lineage: Opt-in to shipping full recovery image by default + repopick -fit msm8974-display-r; + repopick -fit msm8974-gps-r; + repopick -fit hh-vsync; + repopick -fi 311299; sh "$DOS_SCRIPTS/Patch.sh"; sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh"; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index b8b2cd76..289d70d7 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -491,6 +491,13 @@ echo "allow hwaddrs misc_block_device:blk_file { open read };" >> sepolicy/hwadd sed -i '1itypeattribute wcnss_service misc_block_device_exception;' sepolicy/wcnss_service.te; fi; +if enterAndClear "device/lge/hammerhead"; then +awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools +awk -i inplace '!/PRODUCT_DISABLE_SCUDO/' device.mk; #don't disable scudo +rm setup-makefiles.sh; #index is broken +rm -rfv timekeep; +fi; + if enterAndClear "device/lge/mako"; then git revert --no-edit 4d779eb8e653640f192878f3f666cb54ea65bf47; applyPatch "$DOS_PATCHES/android_device_lge_mako/0001-LTE.patch"; #Enable LTE support #TODO: rebase (DivestOS) @@ -596,6 +603,7 @@ enableLowRam "device/lge/d801" "d801"; enableLowRam "device/lge/d802" "d802"; enableLowRam "device/lge/d803" "d803"; enableLowRam "device/lge/g2-common" "g2-common"; +enableLowRam "device/lge/hammerhead" "hammerhead"; enableLowRam "device/lge/mako" "mako"; enableLowRam "device/motorola/victara" "victara"; enableLowRam "device/samsung/jf-common" "jf-common"; @@ -650,6 +658,9 @@ sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-l rm -v kernel/*/*/drivers/staging/greybus/tools/Android.mk || true; awk -i inplace '!/config_wifi_batched_scan_supported/' device/*/*/overlay/frameworks/opt/net/wifi/service/res/values/config.xml &>/dev/null || true; #deprecated awk -i inplace '!/config_wifi_batched_scan_supported/' device/*/*/overlay/frameworks/base/core/res/res/values/config.xml &>/dev/null || true; #deprecated +awk -i inplace '!/UpdateSetting/' vendor/lge/hammerhead/hammerhead-vendor.mk || true; +awk -i inplace '!/SprintHiddenMenu/' vendor/lge/hammerhead/hammerhead-vendor.mk || true; +awk -i inplace '!/OmaDmclient/' vendor/lge/hammerhead/hammerhead-vendor.mk || true; # #END OF DEVICE CHANGES #