mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Attempt to fix nile
Something changed between August 10th and September 6th update which broke boot These are all the functional changes made to the kernel. Rest were Xen or vmxnet related. Other 4.9 to 4.4 replacements were double checked and ruled out. Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
24420a7150
commit
5250942b4b
@ -98,7 +98,7 @@ commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
|
|||||||
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
|
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
|
||||||
commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305";
|
commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305";
|
||||||
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
|
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
|
||||||
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
|
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166" "CVE-2022-45887" "CVE-2022-45919" "CVE-2023-1989" "CVE-2023-4385";
|
||||||
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
|
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
|
||||||
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-25715";
|
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-25715";
|
||||||
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";
|
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";
|
||||||
|
@ -153,8 +153,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45887/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||||
@ -173,8 +173,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/4.4/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0010.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0010.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch
|
||||||
@ -190,7 +190,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/4.4/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4206/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4206/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4208/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4208/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/^6.5/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/^6.5/0001.patch
|
||||||
|
Loading…
Reference in New Issue
Block a user