diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml
index ccfd6cef..09253932 100644
--- a/Manifests/Manifest_LAOS-18.1.xml
+++ b/Manifests/Manifest_LAOS-18.1.xml
@@ -76,6 +76,9 @@
+
+
+
@@ -153,10 +156,11 @@
-
+
+
@@ -248,6 +252,28 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -272,6 +298,11 @@
+
+
+
+
+
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
index 0d905c7e..6e2048ce 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
@@ -6,11 +6,11 @@ Subject: [PATCH] Disable/reduce functionality of various ad/analytics
Change-Id: I84303ee26d0232e471f44ae6eff6e41a2210e42e
---
- core/java/android/content/pm/PackageParser.java | 14 ++++++++++++++
- 1 file changed, 14 insertions(+)
+ .../android/content/pm/PackageParser.java | 56 +++++++++++++++++++
+ 1 file changed, 56 insertions(+)
diff --git a/core/java/android/content/pm/PackageParser.java b/core/java/android/content/pm/PackageParser.java
-index 861b0d922d32..a9ad5aac0f0d 100644
+index 861b0d922d32..1a93325f24ff 100644
--- a/core/java/android/content/pm/PackageParser.java
+++ b/core/java/android/content/pm/PackageParser.java
@@ -5598,6 +5598,62 @@ public class PackageParser {
diff --git a/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch b/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch
index eb9b0a74..82a5e9c7 100644
--- a/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch
+++ b/Patches/LineageOS-18.1/android_device_lge_mako/0001-LTE.patch
@@ -12,7 +12,7 @@ Change-Id: I36cbd7ce1a070201da24dc237154355e780d01b4
create mode 100644 overlay/packages/services/Telephony/res/values/config.xml
diff --git a/overlay/frameworks/base/core/res/res/values/config.xml b/overlay/frameworks/base/core/res/res/values/config.xml
-index 9f37d0a..2220fca 100644
+index 8924e2a..2e7ba44 100644
--- a/overlay/frameworks/base/core/res/res/values/config.xml
+++ b/overlay/frameworks/base/core/res/res/values/config.xml
@@ -178,7 +178,7 @@
diff --git a/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch b/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
index 3b35883b..a35ef178 100644
--- a/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
+++ b/Patches/LineageOS-18.1/android_packages_apps_Settings/0001-Captive_Portal_Toggle.patch
@@ -40,10 +40,10 @@ index ce8ba8c6eb..96223a68ce 100644
+ Nach dem Ausschalten der Captive-Portal-Erkennung empfangen Sie keine Verbindungs-Rückmeldung mehr. Wirklich fortfahren?
diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml
-index 1c78816577..c35c696b16 100644
+index ab38dec706..6c81254ce2 100644
--- a/res/values/cm_strings.xml
+++ b/res/values/cm_strings.xml
-@@ -172,4 +172,9 @@
+@@ -175,4 +175,9 @@
Automatically raises the refresh rate from 60 to %1$d Hz for some content. Increases battery usage.
diff --git a/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch b/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch
index e314e5f3..4b89f958 100644
--- a/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch
+++ b/Patches/LineageOS-18.1/android_packages_apps_Settings/0004-Private_DNS.patch
@@ -84,10 +84,10 @@ index 0b4f4db6c4..ca6a2cf62d 100644
android:id="@+id/private_dns_mode_opportunistic"
layout="@layout/preference_widget_dialog_radiobutton"/>
diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml
-index c35c696b16..0523c1a276 100644
+index 6c81254ce2..86fd2bd6c6 100644
--- a/res/values/cm_strings.xml
+++ b/res/values/cm_strings.xml
-@@ -134,6 +134,21 @@
+@@ -137,6 +137,21 @@
Scramble layout
Scramble PIN layout when unlocking device
diff --git a/Scripts/Common/Copy_Keys.sh b/Scripts/Common/Copy_Keys.sh
index f3e45cdd..3c626ee5 100644
--- a/Scripts/Common/Copy_Keys.sh
+++ b/Scripts/Common/Copy_Keys.sh
@@ -20,10 +20,12 @@ source "$DOS_SCRIPTS_COMMON/Shell.sh";
if [ -d "$DOS_SIGNING_KEYS" ]; then
echo "Copying verity/avb public keys to kernels...";
+cat "$DOS_SIGNING_KEYS/akari/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/alioth/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/Amber/verity.x509.pem" >> "kernel/yandex/sdm660/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/angler/verity.x509.pem" >> "kernel/huawei/angler/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/aura/verity.x509.pem" >> "kernel/razer/sdm845/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/aurora/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/avicii/verity.x509.pem" >> "kernel/oneplus/sm7250/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/beryllium/verity.x509.pem" >> "kernel/xiaomi/sdm845/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/blueline/verity.x509.pem" >> "kernel/google/crosshatch/certs/verity.x509.pem";
@@ -38,6 +40,7 @@ cat "$DOS_SIGNING_KEYS/coral/verity.x509.pem" >> "kernel/google/coral/certs/veri
cat "$DOS_SIGNING_KEYS/crosshatch/verity.x509.pem" >> "kernel/google/crosshatch/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/crosshatch/verity.x509.pem" >> "kernel/google/msm-4.9/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/davinci/verity.x509.pem" >> "kernel/xiaomi/sm6150/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/discovery/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/dragon/verity.x509.pem" >> "kernel/google/dragon/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/dumpling/verity.x509.pem" >> "kernel/oneplus/msm8998/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/enchilada/verity.x509.pem" >> "kernel/oneplus/sdm845/certs/verity.x509.pem";
@@ -50,10 +53,12 @@ cat "$DOS_SIGNING_KEYS/guacamoleb/verity.x509.pem" >> "kernel/oneplus/sm8150/cer
cat "$DOS_SIGNING_KEYS/guacamole/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/hotdogb/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/hotdog/verity.x509.pem" >> "kernel/oneplus/sm8150/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/lavender/verity.x509.pem" >> "kernel/xiaomi/sdm660/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/lmi/verity.x509.pem" >> "kernel/xiaomi/sm8250/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/marlin/verity.x509.pem" >> "kernel/google/marlin/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/mata/verity.x509.pem" >> "kernel/essential/msm8998/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/oneplus3/verity.x509.pem" >> "kernel/oneplus3/msm8996/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/pioneer/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/pro1/verity.x509.pem" >> "kernel/fxtec/msm8998/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/raphael/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/redfin/verity.x509.pem" >> "kernel/google/redbull/certs/verity.x509.pem";
@@ -66,14 +71,18 @@ cat "$DOS_SIGNING_KEYS/shamu/verity.x509.pem" >> "kernel/moto/shamu/certs/verity
cat "$DOS_SIGNING_KEYS/sunfish/verity.x509.pem" >> "kernel/google/sunfish/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/taimen/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/vayu/verity.x509.pem" >> "kernel/xiaomi/sm8150/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/voyager/verity.x509.pem" >> "kernel/sony/sdm660/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/walleye/verity.x509.pem" >> "kernel/google/wahoo/certs/verity.x509.pem";
+cat "$DOS_SIGNING_KEYS/xz2c/verity.x509.pem" >> "kernel/sony/sdm845/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/z2_plus/verity.x509.pem" >> "kernel/zuk/msm8996/certs/verity.x509.pem";
cat "$DOS_SIGNING_KEYS/zenfone3/verity.x509.pem" >> "kernel/asus/msm8953/certs/verity.x509.pem";
+cp -v "$DOS_SIGNING_KEYS/akari/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_akari_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/alioth/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_alioth_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/Amber/verifiedboot_relkeys.der.x509" "kernel/yandex/sdm660/verifiedboot_Amber_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/angler/verifiedboot_relkeys.der.x509" "kernel/huawei/angler/verifiedboot_angler_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/aura/verifiedboot_relkeys.der.x509" "kernel/razer/sdm845/verifiedboot_aura_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/aurora/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_aurora_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/avicii/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm7250/verifiedboot_avicii_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/beryllium/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sdm845/verifiedboot_beryllium_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/blueline/verifiedboot_relkeys.der.x509" "kernel/google/crosshatch/verifiedboot_blueline_dos_relkeys.der.x509";
@@ -88,6 +97,7 @@ cp -v "$DOS_SIGNING_KEYS/coral/verifiedboot_relkeys.der.x509" "kernel/google/cor
cp -v "$DOS_SIGNING_KEYS/crosshatch/verifiedboot_relkeys.der.x509" "kernel/google/crosshatch/verifiedboot_crosshatch_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/crosshatch/verifiedboot_relkeys.der.x509" "kernel/google/msm-4.9/verifiedboot_crosshatch_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/davinci/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm6150/verifiedboot_davinci_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/discovery/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_discovery_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/dragon/verifiedboot_relkeys.der.x509" "kernel/google/dragon/verifiedboot_dragon_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/dumpling/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8998/verifiedboot_dumpling_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/enchilada/verifiedboot_relkeys.der.x509" "kernel/oneplus/sdm845/verifiedboot_enchilada_dos_relkeys.der.x509";
@@ -100,10 +110,12 @@ cp -v "$DOS_SIGNING_KEYS/guacamoleb/verifiedboot_relkeys.der.x509" "kernel/onepl
cp -v "$DOS_SIGNING_KEYS/guacamole/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_guacamole_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/hotdogb/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdogb_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/hotdog/verifiedboot_relkeys.der.x509" "kernel/oneplus/sm8150/verifiedboot_hotdog_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/lavender/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sdm660/verifiedboot_lavender_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/lmi/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8250/verifiedboot_lmi_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/marlin/verifiedboot_relkeys.der.x509" "kernel/google/marlin/verifiedboot_marlin_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/mata/verifiedboot_relkeys.der.x509" "kernel/essential/msm8998/verifiedboot_mata_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/oneplus3/verifiedboot_relkeys.der.x509" "kernel/oneplus/msm8996/verifiedboot_oneplus3_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/pioneer/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_pioneer_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/pro1/verifiedboot_relkeys.der.x509" "kernel/fxtec/msm8998/verifiedboot_pro1_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/raphael/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_raphael_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/redfin/verifiedboot_relkeys.der.x509" "kernel/google/redbull/verifiedboot_redfin_dos_relkeys.der.x509";
@@ -116,7 +128,9 @@ cp -v "$DOS_SIGNING_KEYS/shamu/verifiedboot_relkeys.der.x509" "kernel/moto/shamu
cp -v "$DOS_SIGNING_KEYS/sunfish/verifiedboot_relkeys.der.x509" "kernel/google/sunfish/verifiedboot_sunfish_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/taimen/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_taimen_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/vayu/verifiedboot_relkeys.der.x509" "kernel/xiaomi/sm8150/verifiedboot_vayu_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/voyager/verifiedboot_relkeys.der.x509" "kernel/sony/sdm660/verifiedboot_voyager_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/walleye/verifiedboot_relkeys.der.x509" "kernel/google/wahoo/verifiedboot_walleye_dos_relkeys.der.x509";
+cp -v "$DOS_SIGNING_KEYS/xz2c/verifiedboot_relkeys.der.x509" "kernel/sony/sdm845/verifiedboot_xz2c_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/z2_plus/verifiedboot_relkeys.der.x509" "kernel/zuk/msm8996/verifiedboot_z2_plus_dos_relkeys.der.x509";
cp -v "$DOS_SIGNING_KEYS/zenfone3/verifiedboot_relkeys.der.x509" "kernel/asus/msm8953/verifiedboot_zenfone3_dos_relkeys.der.x509";
echo -e "\e[0;32m[SCRIPT COMPLETE] Copied keys to kernels\e[0m";
diff --git a/Scripts/Common/Enable_Verity.sh b/Scripts/Common/Enable_Verity.sh
index b6c7d3df..31d6b010 100644
--- a/Scripts/Common/Enable_Verity.sh
+++ b/Scripts/Common/Enable_Verity.sh
@@ -57,9 +57,14 @@ enableVerity "device/oneplus/dumpling";
enableVerity "device/oneplus/msm8998-common";
enableVerity "device/oneplus/oneplus3";
enableVerity "device/razer/cheryl";
+#enableVerity "device/sony/discovery";
+#enableVerity "device/sony/nile-common";
+#enableVerity "device/sony/pioneer";
+#enableVerity "device/sony/voyager";
enableVerity "device/yandex/Amber";
enableVerity "device/zuk/msm8996-common";
enableVerity "device/zuk/z2_plus";
+
enableAVB "device/fairphone/FP3";
enableAVB "device/fxtec/pro1";
enableAVB "device/google/blueline";
@@ -86,11 +91,17 @@ enableAVB "device/oneplus/hotdogb";
enableAVB "device/oneplus/sdm845-common";
enableAVB "device/oneplus/sm8150-common";
enableAVB "device/razer/aura";
+enableAVB "device/sony/akari";
+enableAVB "device/sony/aurora";
+enableAVB "device/sony/tama-common";
+enableAVB "device/sony/xz2c";
enableAVB "device/xiaomi/alioth";
enableAVB "device/xiaomi/beryllium";
enableAVB "device/xiaomi/davinci";
+enableAVB "device/xiaomi/lavender";
enableAVB "device/xiaomi/lmi";
enableAVB "device/xiaomi/raphael";
+enableAVB "device/xiaomi/sdm660-common";
enableAVB "device/xiaomi/sdm845-common";
enableAVB "device/xiaomi/sm6150-common";
enableAVB "device/xiaomi/sm8150-common";
diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh
index 51b110c6..f54cb0fa 100644
--- a/Scripts/Common/Fix_CVE_Patchers.sh
+++ b/Scripts/Common/Fix_CVE_Patchers.sh
@@ -85,7 +85,10 @@ commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463
commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
commentPatches android_kernel_samsung_universal8890.sh "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166";
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
+commentPatches android_kernel_sony_sdm660.sh "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
+commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166";
+commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening/4.4/0019.patch";
commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch";
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600";
commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166";
diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh
index 2a4003f6..31e54436 100644
--- a/Scripts/Common/Functions.sh
+++ b/Scripts/Common/Functions.sh
@@ -689,7 +689,7 @@ getDefconfig() {
else
#grep TARGET_KERNEL_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u
#grep TARGET_KERNEL_VARIANT_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_VARIANT_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u
- local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig";
+ local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig";
fi;
echo $defconfigPath;
}
diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh
new file mode 100644
index 00000000..09da306f
--- /dev/null
+++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh
@@ -0,0 +1,294 @@
+#!/bin/bash
+cd "$DOS_BUILD_BASE""kernel/sony/sdm660"
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0233-0234.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0288-0289.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0022.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0023.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0024.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0025.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0026.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0027.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0028.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0029.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0030.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.4/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
+editKernelLocalversion "-dos.p290"
+cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh
new file mode 100644
index 00000000..14b2c649
--- /dev/null
+++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh
@@ -0,0 +1,368 @@
+#!/bin/bash
+cd "$DOS_BUILD_BASE""kernel/sony/sdm845"
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0286-0287.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0052.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18.7/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10565/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14104/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.17/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18809/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19037/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0026.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0027.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0028.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0029.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0030.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0031.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0032.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0033.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0034.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0035.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
+#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11125/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11125/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11146/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11162/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11174/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11225/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11240/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12464/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1939/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1941/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1945/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1962/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0016.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.9/0008.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/^5.14/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
+editKernelLocalversion "-dos.p364"
+cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh
new file mode 100644
index 00000000..bbcdc923
--- /dev/null
+++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh
@@ -0,0 +1,51 @@
+#!/bin/bash
+cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm660"
+git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0296-0297.patch --exclude=Makefile
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch
+#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/^4.11.1/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/^4.11.2/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
+git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
+editKernelLocalversion "-dos.p47"
+cd "$DOS_BUILD_BASE"
diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh
index 061dd2df..13fca97b 100644
--- a/Scripts/LineageOS-18.1/Functions.sh
+++ b/Scripts/LineageOS-18.1/Functions.sh
@@ -19,7 +19,7 @@ umask 0022;
#Last verified: 2021-10-16
patchAllKernels() {
- startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996";
+ startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_sony_sdm660 kernel_sony_sdm845 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996";
}
export -f patchAllKernels;
@@ -80,10 +80,16 @@ buildAll() {
#SD820
buildDevice h850;
buildDevice rs988;
+ buildDevice h910;
buildDevice h990;
buildDevice us996;
buildDevice oneplus3 verity; #needs manual patching - broken yyloc
buildDevice z2_plus verity;
+ #SD630
+ buildDevice pioneer;
+ buildDevice voyager;
+ buildDevice discovery;
+ buildDevice lavender avb;
#SD835
buildDevice cheryl verity;
buildDevice cheeseburger verity;
@@ -99,6 +105,9 @@ buildAll() {
buildDevice blueline avb;
buildDevice enchilada avb; #XXX: uses stock /vendor
buildDevice fajita avb; #XXX: uses stock /vendor
+ buildDevice akari avb;
+ buildDevice aurora avb;
+ buildDeivce xz2c avb;
#SD632
buildDevice FP3 avb;
#SD730
@@ -139,6 +148,8 @@ patchWorkspace() {
#repopick -i 320663; #Trebuchet: Don't hide home screen rotation setting
#repopick -i 320914 320917; #Settings: Make PIN scramble user specific
#repopick -i 320921; #Revert "Remove dependency on IME subtype from TSMS"
+ #repopick -i 321297; #fs_mgr: Don't enable clean_scratch_files on non-dynamic devices
+ #repopick -it R_asb_2022-01;
sh "$DOS_SCRIPTS/Patch.sh";
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh
index d009170f..da54b535 100644
--- a/Scripts/LineageOS-18.1/Patch.sh
+++ b/Scripts/LineageOS-18.1/Patch.sh
@@ -332,14 +332,14 @@ echo "allow hwaddrs self:capability { fowner };" >> sepolicy/hwaddrs.te;
echo "allow hwaddrs block_device:lnk_file { open };" >> sepolicy/hwaddrs.te;
echo "allow hwaddrs misc_block_device:blk_file { open read };" >> sepolicy/hwaddrs.te;
sed -i '1itypeattribute wcnss_service misc_block_device_exception;' sepolicy/wcnss_service.te;
-echo "/sys/devices/qpnp-rtc-[a-f0-9]+/rtc/rtc0(/.*)? u:object_r:sysfs_rtc:s0" >> sepolicy/file_contexts; #https://gitlab.com/LineageOS/issues/android/-/issues/3889
fi;
if enterAndClear "device/lge/mako"; then
applyPatch "$DOS_PATCHES/android_device_lge_mako/0001-LTE.patch"; #Enable LTE support
+rm overlay/packages/apps/CarrierConfig/res/xml/vendor.xml;
echo "pmf=0" >> wifi/wpa_supplicant_overlay.conf; #Wi-Fi chipset doesn't support PMF
awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfig.mk; #broken releasetools
-sed -i 's/bdAddrLoader/bdAddrLoader-mako/' device.mk bdAddrLoader/Android.bp bdAddrLoader/addrloader.c rootdir/etc/init.mako.bt.sh sepolicy/file_contexts; #Fix conflicts
+sed -i 's/bdAddrLoader/bdAddrLoader-mako/' device.mk bdAddrLoader/Android.bp bdAddrLoader/addrloader.c rootdir/etc/init.mako.bt.sh sepolicy/vendor/file_contexts; #Fix conflicts
sed -i 's|/bdAddrLoader|/bdAddrLoader-mako|' rootdir/etc/init.mako.rc;
sed -i '16iifeq ($(TARGET_DEVICE),mako)' sensors/Android.mk;
echo "endif" >> sensors/Android.mk;
diff --git a/Scripts/init.sh b/Scripts/init.sh
index 184f4060..c955d03e 100644
--- a/Scripts/init.sh
+++ b/Scripts/init.sh
@@ -79,7 +79,7 @@ export DOS_GPS_SUPL_HOST="supl.google.com"; #Options: supl.{google,vodafone,sony
#Release Processing
export DOS_MALWARE_SCAN_BEFORE_SIGN=false; #Scan device files for malware before signing
export DOS_GENERATE_DELTAS=true; #Creates deltas from existing target_files in $DOS_BUILDS
-export DOS_GENERATE_DELTAS_DEVICES=('Amber' 'alioth' 'aura' 'avicii' 'blueline' 'bonito' 'bramble' 'cheryl' 'coral' 'crosshatch' 'davinci' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pro1' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'walleye'); #List of devices deltas will be generated for
+export DOS_GENERATE_DELTAS_DEVICES=('akari' 'alioth' 'Amber' 'aura' 'aurora' 'avicii' 'blueline' 'bonito' 'bramble' 'cheryl' 'coral' 'crosshatch' 'davinci' 'discovery' 'enchilada' 'fajita' 'flame' 'FP3' 'guacamole' 'guacamoleb' 'marlin' 'mata' 'pioneer' 'pro1' 'redfin' 'sailfish' 'sargo' 'sunfish' 'taimen' 'vayu' 'voyager' 'walleye' 'xz2c'); #List of devices deltas will be generated for
export DOS_AUTO_ARCHIVE_BUILDS=true; #Copies files to $DOS_BUILDS after signing
export DOS_REMOVE_AFTER=true; #Removes device OUT directory after complete to reclaim space. Requires AUTO_ARCHIVE_BUILDS=true
export DOS_GPG_SIGNING=true;