diff options
author | Remi Gacogne | 2020-07-08 18:16:28 +0200 |
---|---|---|
committer | Remi Gacogne | 2020-07-08 18:16:28 +0200 |
commit | 5c66533ac7d9e6655d7c61c8fa1f49c949802723 (patch) | |
tree | 7ab1a75a1f9a4922485edde70006c187c1a8c2ec | |
parent | ed1a96143c9569af6e54d20c14007916fcbd31ad (diff) | |
download | aur-5c66533ac7d9e6655d7c61c8fa1f49c949802723.tar.gz |
lkrg-dkms: Update to 0.8.1
-rw-r--r-- | .SRCINFO | 8 | ||||
-rw-r--r-- | PKGBUILD | 4 | ||||
-rw-r--r-- | kernel-5.6.patch | 81 |
3 files changed, 6 insertions, 87 deletions
@@ -1,16 +1,16 @@ pkgbase = lkrg-dkms pkgdesc = Linux Kernel Runtime Guard (DKMS) - pkgver = 0.8 + pkgver = 0.8.1 pkgrel = 1 url = https://www.openwall.com/lkrg/ arch = x86_64 license = GPL2 depends = dkms - source = https://www.openwall.com/lkrg//lkrg-0.8.tar.gz - source = https://www.openwall.com/lkrg//lkrg-0.8.tar.gz.sign + source = https://www.openwall.com/lkrg//lkrg-0.8.1.tar.gz + source = https://www.openwall.com/lkrg//lkrg-0.8.1.tar.gz.sign source = dkms.conf validpgpkeys = 297AD21CF86C948081520C1805C027FD4BDC136E - sha512sums = 2ff5666e3bd6c0d232524bb378185ff95a5251c24619e976fe2bab77b632471abc1ead8c6e9eabb6cfb224fa0f5a4aadf25c67f5ff2c025ce632c82b7aaabcf6 + sha512sums = 38dd9e4d3b5a3011a23b94ca6e63ce61816a98e329eb8e5f127928d42e7ba3fa0acf2679d00327c77a1bc1e351200916a22a54a1a6b17297d0affc466a1e5e74 sha512sums = SKIP sha512sums = ee259ac7e15fb6f6947ce6e64be808d6a1107d481ec0a7b4a35266bd720b639909c92e580fae2cecefe5318ce081a4d7431b5f941d1827f7783bee0a3206c5e8 @@ -1,7 +1,7 @@ # Maintainer: Remi Gacogne <rgacogne(at)archlinux(dot)org> _pkgbase=lkrg pkgname=lkrg-dkms -pkgver=0.8 +pkgver=0.8.1 pkgrel=1 pkgdesc='Linux Kernel Runtime Guard (DKMS)' arch=('x86_64') @@ -10,7 +10,7 @@ license=('GPL2') source=("${url}/${_pkgbase}-${pkgver}.tar.gz" "${url}/${_pkgbase}-${pkgver}.tar.gz.sign" 'dkms.conf') -sha512sums=('2ff5666e3bd6c0d232524bb378185ff95a5251c24619e976fe2bab77b632471abc1ead8c6e9eabb6cfb224fa0f5a4aadf25c67f5ff2c025ce632c82b7aaabcf6' +sha512sums=('38dd9e4d3b5a3011a23b94ca6e63ce61816a98e329eb8e5f127928d42e7ba3fa0acf2679d00327c77a1bc1e351200916a22a54a1a6b17297d0affc466a1e5e74' 'SKIP' 'ee259ac7e15fb6f6947ce6e64be808d6a1107d481ec0a7b4a35266bd720b639909c92e580fae2cecefe5318ce081a4d7431b5f941d1827f7783bee0a3206c5e8') validpgpkeys=('297AD21CF86C948081520C1805C027FD4BDC136E') diff --git a/kernel-5.6.patch b/kernel-5.6.patch deleted file mode 100644 index 8e5ece93c098..000000000000 --- a/kernel-5.6.patch +++ /dev/null @@ -1,81 +0,0 @@ -diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.c lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.c ---- lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.c 2019-07-19 13:51:17.000000000 +0200 -+++ lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.c 2020-04-21 19:04:29.138591608 +0200 -@@ -772,6 +772,7 @@ - "Entering function <p_validate_selinux>\n"); - - mutex_lock(&p_ed_guard_globals.p_selinux_lock); -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - if (p_ed_guard_globals.p_selinux.p_selinux_enabled != *p_selinux_enabled) { - p_print_log(P_LKRG_CRIT, - "<Exploit Detection> Detected data corruption against SELINUX! 'selinux_enabled' has " -@@ -779,6 +780,7 @@ - *p_selinux_enabled,p_ed_guard_globals.p_selinux.p_selinux_enabled); - *p_selinux_enabled = p_ed_guard_globals.p_selinux.p_selinux_enabled; - } -+#endif - - #ifdef CONFIG_SECURITY_SELINUX_DEVELOP - #if LINUX_VERSION_CODE >= KERNEL_VERSION(4,17,0) -@@ -1264,7 +1266,9 @@ - } - - #ifdef CONFIG_SECURITY_SELINUX -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - p_selinux_enabled = (int *)p_kallsyms_lookup_name("selinux_enabled"); -+#endif - #ifdef CONFIG_SECURITY_SELINUX_DEVELOP - #if LINUX_VERSION_CODE >= KERNEL_VERSION(4,17,0) - p_selinux_state = (struct p_selinux_state *)p_kallsyms_lookup_name("selinux_state"); -@@ -1287,6 +1291,7 @@ - #endif - #endif - -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - if (!p_selinux_enabled) { - p_print_log(P_LKRG_ERR, - "[ED] ERROR: Can't find 'selinux_enabled' variable :( Exiting...\n"); -@@ -1294,6 +1299,7 @@ - goto p_exploit_detection_init_out; - } - #endif -+#endif - - if (p_init_rb_ed_pids()) { - p_print_log(P_LKRG_ERR, -@@ -1314,7 +1320,9 @@ - p_ed_guard_globals.p_selinux.p_selinux_enforcing = *p_selinux_enforcing; - #endif - #endif -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - p_ed_guard_globals.p_selinux.p_selinux_enabled = *p_selinux_enabled; -+#endif - mutex_init(&p_ed_guard_globals.p_selinux_lock); - #endif - -diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.h lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.h ---- lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.h 2019-07-19 13:51:17.000000000 +0200 -+++ lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.h 2020-04-21 19:04:59.588485501 +0200 -@@ -222,7 +222,9 @@ - int p_selinux_enforcing; - #endif - #endif -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - int p_selinux_enabled; -+#endif - - }; - #endif -diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c lkrg-0.7/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c ---- lkrg-0.7.orig/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c 2019-05-09 17:08:25.000000000 +0200 -+++ lkrg-0.7/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c 2020-04-21 19:05:39.418333669 +0200 -@@ -91,7 +91,9 @@ - p_ed_guard_globals.p_selinux.p_selinux_enforcing = *p_selinux_enforcing; - #endif - #endif -+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0) - p_ed_guard_globals.p_selinux.p_selinux_enabled = *p_selinux_enabled; -+#endif - } - - // unlock shadow SELinux updates |