Attempt to improve AES performance

This commit is contained in:
Tad 2018-01-11 14:16:13 -05:00
parent 8e8c1d5834
commit 6fb82b7907
21 changed files with 86 additions and 21 deletions

31
Misc/Strong_AES.txt Normal file
View File

@ -0,0 +1,31 @@
Biclique
128: O(91176400000000000000000000000000000000)
192: O(1274650000000000000000000000000000000000000000000000000000)
256: O(38197100000000000000000000000000000000000000000000000000000000000000000000000)
Grovers (2^(n/2))
128: O(18446744073709551616)
192: O(79228162514264337593543950336)
256: O(340282366920938463463374607431768211456)
Benchmarks (Androbench)
mako-1/2
No Encryption
Seq. Read: 77 MBps
Seq. Write: 20 MBps
Rand. Read: 11 MBps
Rand. Write: 3 MBps
AES-128/RSA-2048 Encryption
AES-192/RSA-4096 Encryption
AES-256/RSA-4096 Encryption
Seq. Read: 26 MBps
Seq. Write: 18 MBps
Rand. Read: 8 MBps
Rand. Write: 3 MBps
AES-256/RSA-4096 Encryption + Overclock
clark-1
AES-128/RSA-2048 Encryption
Seq. Read: 50 MBps
Seq. Write: 39 MBps
Rand. Read: 10 MBps
Rand. Write: 10 MBps

@ -1 +1 @@
Subproject commit 8e8aa18abae1af455bd3c88effd91c8d3690f7c3
Subproject commit 08a9222af7dec29417a395f209e0f65ff106d22b

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/amazon/hdx-common"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2012-6704/^3.5/0001.patch
git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch
@ -84,5 +85,5 @@ git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
editKernelLocalversion "-dos.p84"
editKernelLocalversion "-dos.p85"
cd $base

View File

@ -16,6 +16,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
@ -57,5 +60,5 @@ git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p57"
editKernelLocalversion "-dos.p60"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/fairphone/msm8974"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch
git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch
@ -29,5 +30,5 @@ git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch
git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p29"
editKernelLocalversion "-dos.p30"
cd $base

View File

@ -29,6 +29,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0044.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
@ -188,5 +191,5 @@ git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
editKernelLocalversion "-dos.p188"
editKernelLocalversion "-dos.p191"
cd $base

View File

@ -1,5 +1,6 @@
#!/bin/bash
cd $base"kernel/google/msm"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
@ -42,5 +43,5 @@ git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch
git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p42"
editKernelLocalversion "-dos.p43"
cd $base

View File

@ -12,6 +12,8 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/CVE-2014-9892/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
@ -71,5 +73,5 @@ git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p71"
editKernelLocalversion "-dos.p73"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/htc/msm8974"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch
@ -25,5 +26,5 @@ git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p25"
editKernelLocalversion "-dos.p26"
cd $base

View File

@ -16,6 +16,8 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9903/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch
@ -50,7 +52,7 @@ git apply $cvePatchesLinux/CVE-2017-11033/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-11473/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch
git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
#git apply $cvePatchesLinux/CVE-2017-13166/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0002.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0003.patch
git apply $cvePatchesLinux/CVE-2017-13167/3.10/0005.patch
@ -102,5 +104,5 @@ git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p102"
editKernelLocalversion "-dos.p104"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/lge/g3"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
@ -27,5 +28,5 @@ git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p27"
editKernelLocalversion "-dos.p28"
cd $base

View File

@ -1,5 +1,6 @@
#!/bin/bash
cd $base"kernel/lge/hammerhead"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch
@ -40,5 +41,5 @@ git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch
git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p40"
editKernelLocalversion "-dos.p41"
cd $base

View File

@ -1,5 +1,6 @@
#!/bin/bash
cd $base"kernel/lge/mako"
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch
git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch
@ -15,5 +16,5 @@ git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch
git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
editKernelLocalversion "-dos.p15"
editKernelLocalversion "-dos.p16"
cd $base

View File

@ -16,6 +16,8 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
@ -158,5 +160,5 @@ git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
editKernelLocalversion "-dos.p158"
editKernelLocalversion "-dos.p160"
cd $base

View File

@ -27,6 +27,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch
git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch
@ -110,5 +113,5 @@ git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p110"
editKernelLocalversion "-dos.p113"
cd $base

View File

@ -15,6 +15,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch
@ -80,5 +83,5 @@ git apply $cvePatchesLinux/CVE-2016-5853/3.10/0001.patch
git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p80"
editKernelLocalversion "-dos.p83"
cd $base

View File

@ -16,6 +16,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch
@ -181,5 +184,5 @@ git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-15845/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-8281/3.10/0003.patch
editKernelLocalversion "-dos.p181"
editKernelLocalversion "-dos.p184"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/oneplus/msm8974"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
@ -45,5 +46,5 @@ git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p45"
editKernelLocalversion "-dos.p46"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/samsung/jf"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-10233/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch
@ -51,5 +52,5 @@ git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p51"
editKernelLocalversion "-dos.p52"
cd $base

View File

@ -1,6 +1,7 @@
#!/bin/bash
cd $base"kernel/samsung/msm8974"
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.4/0002.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch
@ -23,5 +24,5 @@ git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p23"
editKernelLocalversion "-dos.p24"
cd $base

View File

@ -20,6 +20,9 @@ git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0043.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0045.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0046.patch
git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0050.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0011.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0012.patch
git apply $cvePatchesLinux/0010-Accelerated_AES/3.10+/0013.patch
git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch
git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch
git apply $cvePatchesLinux/CVE-2014-9940/ANY/0001.patch
@ -133,5 +136,5 @@ git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bou
git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch
#git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0039.patch
git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch
editKernelLocalversion "-dos.p133"
editKernelLocalversion "-dos.p136"
cd $base