diff --git a/Manifests/Manifest_LAOS-14.1.xml b/Manifests/Manifest_LAOS-14.1.xml
index be6a9a3b..9fee8e8c 100644
--- a/Manifests/Manifest_LAOS-14.1.xml
+++ b/Manifests/Manifest_LAOS-14.1.xml
@@ -101,6 +101,7 @@
+
@@ -203,8 +204,7 @@
-
-
+
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh
new file mode 100644
index 00000000..f4b67934
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh
@@ -0,0 +1,235 @@
+#!/bin/bash
+cd $base"kernel/google/marlin"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0044.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
+git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
+git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
+git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch
+git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2847/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
+git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch
+git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch
+git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11013/qcacld-2.0/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch
+git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch
+git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11028/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-11034/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11067/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch
+git apply $cvePatchesLinux/CVE-2017-13219/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch
+git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch
+git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9690/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
+git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
+git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
+git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
+git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2016-5853/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
+editKernelLocalversion "-dos.p231"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh
new file mode 100644
index 00000000..ed5f45ae
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh
@@ -0,0 +1,51 @@
+#!/bin/bash
+cd $base"kernel/google/msm"
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
+git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
+git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch
+#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p47"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh
new file mode 100644
index 00000000..75bbb59e
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh
@@ -0,0 +1,38 @@
+#!/bin/bash
+cd $base"kernel/htc/msm8974"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
+git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p34"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh
new file mode 100644
index 00000000..72afcb71
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh
@@ -0,0 +1,169 @@
+#!/bin/bash
+cd $base"kernel/huawei/angler"
+git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0003.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
+git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
+git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
+git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
+git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13174/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13292/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch
+git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
+git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
+editKernelLocalversion "-dos.p165"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh
new file mode 100644
index 00000000..b57fd3f1
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh
@@ -0,0 +1,161 @@
+#!/bin/bash
+cd $base"kernel/lge/bullhead"
+git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
+git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
+git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch
+git apply $cvePatchesLinux/CVE-2015-8215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0564/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11030/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11037/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0006.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0007.patch
+git apply $cvePatchesLinux/CVE-2017-13167/3.10/0008.patch
+git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14877/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14897/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14903/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15833/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8269/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0004.patch
+git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9703/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9708/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9710/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
+git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+editKernelLocalversion "-dos.p157"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh
new file mode 100644
index 00000000..f94d3cf5
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_g3.sh
@@ -0,0 +1,40 @@
+#!/bin/bash
+cd $base"kernel/lge/g3"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
+git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-8406/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p36"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh
new file mode 100644
index 00000000..f143e6f3
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8974.sh
@@ -0,0 +1,31 @@
+#!/bin/bash
+cd $base"kernel/lge/msm8974"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2015-8939/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0806/prima/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0806/prima/0006.patch
+git apply $cvePatchesLinux/CVE-2016-0806/prima/0007.patch
+git apply $cvePatchesLinux/CVE-2016-0806/prima/0010.patch
+git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p27"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
new file mode 100644
index 00000000..0f57a9df
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8996.sh
@@ -0,0 +1,225 @@
+#!/bin/bash
+cd $base"kernel/motorola/msm8996"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0019.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0020.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0021.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0022.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0023.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0024.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0025.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0026.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0027.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0028.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0031.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0032.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0033.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0034.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0035.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0036.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0037.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0040.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0041.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0042.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0043.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0045.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0046.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.18/0050.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0002.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0008.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0010.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0011.patch
+git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2015-9016/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10284/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10287/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10294/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-10295/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch
+git apply $cvePatchesLinux/CVE-2017-0457/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-0460/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0462/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0564/3.18/0004.patch
+git apply $cvePatchesLinux/CVE-2017-0576/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0579/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0607/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0794/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch
+git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch
+git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch
+git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch
+git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11030/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11031/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11033/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-11036/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11044/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11047/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11048/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11059/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0005.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0006.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0011.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.18/0022.patch
+git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14873/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14877/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-14884/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14891/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14892/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-14897/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-15115/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15649/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-15826/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15827/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15834/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15842/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15843/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15847/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15850/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15857/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15858/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15868/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17769/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18150/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18165/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6423/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6425/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6426/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7369/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-7370/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.18/0004.patch
+git apply $cvePatchesLinux/CVE-2017-8233/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8236/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8242/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8243/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8244/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8251/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8261/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8262/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8264/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8266/3.18/0003.patch
+git apply $cvePatchesLinux/CVE-2017-8271/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8272/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9677/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9678/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9680/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9682/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9691/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9692/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9696/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9698/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9699/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9700/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9707/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9716/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch
+git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3563/3.18/0002.patch
+git apply $cvePatchesLinux/CVE-2018-3598/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3599/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5831/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5848/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5849/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5857/ANY/0001.patch
+git apply $cvePatchesLinux/LVT-2017-0004/3.18/0003.patch
+git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
+git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
+git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch
+git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
+git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2016-10288/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p221"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh
new file mode 100644
index 00000000..19663f0b
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh
@@ -0,0 +1,76 @@
+#!/bin/bash
+cd $base"kernel/nextbit/msm8992"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0005.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0006.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0007.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0008.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0009.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0010.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0011.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0012.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0013.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0014.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0015.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0016.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0017.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/3.10/0018.patch
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000410/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13163/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13168/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13216/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-13218/3.10/0004.patch
+git apply $cvePatchesLinux/CVE-2017-13245/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16534/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16939/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17762/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.10/0002.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-8243/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
+git apply $cvePatchesLinux/CVE-2017-9723/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-1092/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3563/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-3584/ANY/0001.patch
+#git apply $cvePatchesLinux/CVE-2018-3585/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2018-5825/3.10/0001.patch
+git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p72"
+cd $base
diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh
new file mode 100644
index 00000000..0695e7d9
--- /dev/null
+++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh
@@ -0,0 +1,58 @@
+#!/bin/bash
+cd $base"kernel/oneplus/msm8974"
+git apply $cvePatchesLinux/0007-Copperhead-Kernel_Hardening/ANY/0001.patch
+git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
+git apply $cvePatchesLinux/0012-Copperhead-Deny_USB/3.4/3.4-Backport.patch
+git apply $cvePatchesLinux/0013-syskaller-Misc/ANY/0009.patch
+git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
+git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000111/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11039/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13080/ANY/0002.patch
+git apply $cvePatchesLinux/CVE-2017-13215/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-13246/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch
+git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
+git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
+git apply $cvePatchesLinux/CVE-2017-17558/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-17806/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-18161/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
+git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-8266/3.4/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
+git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
+git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
+git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
+editKernelLocalversion "-dos.p54"
+cd $base
diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh
index 3bc67446..718204fd 100644
--- a/Scripts/LineageOS-14.1/Functions.sh
+++ b/Scripts/LineageOS-14.1/Functions.sh
@@ -51,37 +51,39 @@ buildAll() {
#Select devices are userdebug due to SELinux policy issues
#TODO: Add victara, athene, us997, us996, pme, t0lte, hlte
+ brunch lineage_mako-user; #superseded, but used for testing
brunch lineage_thor-userdebug; #deprecated
brunch lineage_clark-user;
-
- #brunch lineage_angler-user; #superseded
- #brunch lineage_bullhead-user; #superseded
- #brunch lineage_bacon-user; #superseded
- brunch lineage_d802-user; #superseded, but broken
- #brunch lineage_d852-user; #superseded
- brunch lineage_d855-user; #superseded, but broken
- #brunch lineage_ether-user; #superseded
- #brunch lineage_flo-user; #superseded
- #brunch lineage_flounder-user; #superseded
brunch lineage_FP2-user;
- #brunch lineage_griffin-user; #superseded
#brunch lineage_grouper-user; #builds, but requires out-of-tree blobs
brunch lineage_h815-user; #deprecated (UPSTREAM) drivers/input/touchscreen/DS5/RefCode_CustomerImplementation.c:147:1: warning: the frame size of 2064 bytes is larger than 2048 bytes
- #brunch lineage_h850-userdebug; #superseded
- #brunch lineage_hammerhead-user; #superseded
brunch lineage_herolte-user;
brunch lineage_himaul-user; #deprecated
brunch lineage_i9100-userdebug;
brunch lineage_i9305-user; #deprecated?
brunch lineage_jfltexx-user;
- #brunch lineage_klte-user; #superseded
- #brunch lineage_m8-user; #superseded
- #brunch lineage_marlin-user; #superseded
- #brunch lineage_sailfish-user; #superseded
- #brunch lineage_shamu-user; #superseded
brunch lineage_n5110-user;
brunch lineage_osprey-user;
brunch lineage_Z00T-user;
+
+ #The following are all superseded, and should only be enabled if the newer version is broken (not building/booting/etc.)
+ #brunch lineage_angler-user;
+ #brunch lineage_bullhead-user;
+ #brunch lineage_bacon-user;
+ brunch lineage_d802-user;
+ #brunch lineage_d852-user;
+ brunch lineage_d855-user;
+ #brunch lineage_ether-user;
+ #brunch lineage_flo-user;
+ #brunch lineage_flounder-user;
+ #brunch lineage_griffin-user;
+ #brunch lineage_h850-userdebug;
+ #brunch lineage_hammerhead-user;
+ #brunch lineage_klte-user;
+ #brunch lineage_m8-user;
+ #brunch lineage_marlin-user;
+ #brunch lineage_sailfish-user;
+ #brunch lineage_shamu-user;
}
export -f buildAll;
diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh
index 0773f19b..27d41b80 100644
--- a/Scripts/LineageOS-15.1/Functions.sh
+++ b/Scripts/LineageOS-15.1/Functions.sh
@@ -50,9 +50,9 @@ buildAll() {
if [ "$MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
#Select devices are userdebug due to SELinux policy issues
#TODO: hiae star2lte starlte
+ brunch lineage_mako-user;
brunch lineage_d852-user;
brunch lineage_bacon-user;
- brunch lineage_mako-user;
brunch lineage_angler-user;
brunch lineage_bullhead-user;
brunch lineage_d802-user; #broken upstream - error: 'vendor/lge/g2-common/proprietary/vendor/etc/acdbdata/Bluetooth_cal.acdb'
@@ -77,7 +77,6 @@ patchWorkspace() {
source build/envsetup.sh;
repopick -f 214824 209584 209585 215010 214300; #g3-common
repopick -f 211404 211405 211406 211407 211408 211409; #d852
- repopick -f 211396 214817; #d855
source "$scripts/Patch.sh";
source "$scripts/Defaults.sh";