mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Churn
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
03293f6b52
commit
7277291dd7
@ -84,7 +84,6 @@ patchWorkspace() {
|
|||||||
source build/envsetup.sh;
|
source build/envsetup.sh;
|
||||||
#repopick -it ten-firewall;
|
#repopick -it ten-firewall;
|
||||||
repopick -it Q_tzdb2022f;
|
repopick -it Q_tzdb2022f;
|
||||||
repopick -it Q_asb_2022-12;
|
|
||||||
|
|
||||||
sh "$DOS_SCRIPTS/Patch.sh";
|
sh "$DOS_SCRIPTS/Patch.sh";
|
||||||
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
||||||
|
@ -68,9 +68,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.9/0006.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
|
||||||
@ -113,23 +111,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20399/4.4/0002.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.4/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25654/ANY/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25743/ANY/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||||
@ -153,7 +140,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
editKernelLocalversion "-dos.p140"
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch
|
|
||||||
editKernelLocalversion "-dos.p155"
|
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
Loading…
Reference in New Issue
Block a user