summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorRemi Gacogne2020-07-08 18:16:28 +0200
committerRemi Gacogne2020-07-08 18:16:28 +0200
commit5c66533ac7d9e6655d7c61c8fa1f49c949802723 (patch)
tree7ab1a75a1f9a4922485edde70006c187c1a8c2ec
parented1a96143c9569af6e54d20c14007916fcbd31ad (diff)
downloadaur-5c66533ac7d9e6655d7c61c8fa1f49c949802723.tar.gz
lkrg-dkms: Update to 0.8.1
-rw-r--r--.SRCINFO8
-rw-r--r--PKGBUILD4
-rw-r--r--kernel-5.6.patch81
3 files changed, 6 insertions, 87 deletions
diff --git a/.SRCINFO b/.SRCINFO
index 2543666060b8..9564428c29d1 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,16 +1,16 @@
pkgbase = lkrg-dkms
pkgdesc = Linux Kernel Runtime Guard (DKMS)
- pkgver = 0.8
+ pkgver = 0.8.1
pkgrel = 1
url = https://www.openwall.com/lkrg/
arch = x86_64
license = GPL2
depends = dkms
- source = https://www.openwall.com/lkrg//lkrg-0.8.tar.gz
- source = https://www.openwall.com/lkrg//lkrg-0.8.tar.gz.sign
+ source = https://www.openwall.com/lkrg//lkrg-0.8.1.tar.gz
+ source = https://www.openwall.com/lkrg//lkrg-0.8.1.tar.gz.sign
source = dkms.conf
validpgpkeys = 297AD21CF86C948081520C1805C027FD4BDC136E
- sha512sums = 2ff5666e3bd6c0d232524bb378185ff95a5251c24619e976fe2bab77b632471abc1ead8c6e9eabb6cfb224fa0f5a4aadf25c67f5ff2c025ce632c82b7aaabcf6
+ sha512sums = 38dd9e4d3b5a3011a23b94ca6e63ce61816a98e329eb8e5f127928d42e7ba3fa0acf2679d00327c77a1bc1e351200916a22a54a1a6b17297d0affc466a1e5e74
sha512sums = SKIP
sha512sums = ee259ac7e15fb6f6947ce6e64be808d6a1107d481ec0a7b4a35266bd720b639909c92e580fae2cecefe5318ce081a4d7431b5f941d1827f7783bee0a3206c5e8
diff --git a/PKGBUILD b/PKGBUILD
index d927ff06c9ce..3aa2afc4ef29 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -1,7 +1,7 @@
# Maintainer: Remi Gacogne <rgacogne(at)archlinux(dot)org>
_pkgbase=lkrg
pkgname=lkrg-dkms
-pkgver=0.8
+pkgver=0.8.1
pkgrel=1
pkgdesc='Linux Kernel Runtime Guard (DKMS)'
arch=('x86_64')
@@ -10,7 +10,7 @@ license=('GPL2')
source=("${url}/${_pkgbase}-${pkgver}.tar.gz"
"${url}/${_pkgbase}-${pkgver}.tar.gz.sign"
'dkms.conf')
-sha512sums=('2ff5666e3bd6c0d232524bb378185ff95a5251c24619e976fe2bab77b632471abc1ead8c6e9eabb6cfb224fa0f5a4aadf25c67f5ff2c025ce632c82b7aaabcf6'
+sha512sums=('38dd9e4d3b5a3011a23b94ca6e63ce61816a98e329eb8e5f127928d42e7ba3fa0acf2679d00327c77a1bc1e351200916a22a54a1a6b17297d0affc466a1e5e74'
'SKIP'
'ee259ac7e15fb6f6947ce6e64be808d6a1107d481ec0a7b4a35266bd720b639909c92e580fae2cecefe5318ce081a4d7431b5f941d1827f7783bee0a3206c5e8')
validpgpkeys=('297AD21CF86C948081520C1805C027FD4BDC136E')
diff --git a/kernel-5.6.patch b/kernel-5.6.patch
deleted file mode 100644
index 8e5ece93c098..000000000000
--- a/kernel-5.6.patch
+++ /dev/null
@@ -1,81 +0,0 @@
-diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.c lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.c
---- lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.c 2019-07-19 13:51:17.000000000 +0200
-+++ lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.c 2020-04-21 19:04:29.138591608 +0200
-@@ -772,6 +772,7 @@
- "Entering function <p_validate_selinux>\n");
-
- mutex_lock(&p_ed_guard_globals.p_selinux_lock);
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- if (p_ed_guard_globals.p_selinux.p_selinux_enabled != *p_selinux_enabled) {
- p_print_log(P_LKRG_CRIT,
- "<Exploit Detection> Detected data corruption against SELINUX! 'selinux_enabled' has "
-@@ -779,6 +780,7 @@
- *p_selinux_enabled,p_ed_guard_globals.p_selinux.p_selinux_enabled);
- *p_selinux_enabled = p_ed_guard_globals.p_selinux.p_selinux_enabled;
- }
-+#endif
-
- #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(4,17,0)
-@@ -1264,7 +1266,9 @@
- }
-
- #ifdef CONFIG_SECURITY_SELINUX
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- p_selinux_enabled = (int *)p_kallsyms_lookup_name("selinux_enabled");
-+#endif
- #ifdef CONFIG_SECURITY_SELINUX_DEVELOP
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(4,17,0)
- p_selinux_state = (struct p_selinux_state *)p_kallsyms_lookup_name("selinux_state");
-@@ -1287,6 +1291,7 @@
- #endif
- #endif
-
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- if (!p_selinux_enabled) {
- p_print_log(P_LKRG_ERR,
- "[ED] ERROR: Can't find 'selinux_enabled' variable :( Exiting...\n");
-@@ -1294,6 +1299,7 @@
- goto p_exploit_detection_init_out;
- }
- #endif
-+#endif
-
- if (p_init_rb_ed_pids()) {
- p_print_log(P_LKRG_ERR,
-@@ -1314,7 +1320,9 @@
- p_ed_guard_globals.p_selinux.p_selinux_enforcing = *p_selinux_enforcing;
- #endif
- #endif
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- p_ed_guard_globals.p_selinux.p_selinux_enabled = *p_selinux_enabled;
-+#endif
- mutex_init(&p_ed_guard_globals.p_selinux_lock);
- #endif
-
-diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.h lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.h
---- lkrg-0.7.orig/src/modules/exploit_detection/p_exploit_detection.h 2019-07-19 13:51:17.000000000 +0200
-+++ lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.h 2020-04-21 19:04:59.588485501 +0200
-@@ -222,7 +222,9 @@
- int p_selinux_enforcing;
- #endif
- #endif
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- int p_selinux_enabled;
-+#endif
-
- };
- #endif
-diff -ruw lkrg-0.7.orig/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c lkrg-0.7/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c
---- lkrg-0.7.orig/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c 2019-05-09 17:08:25.000000000 +0200
-+++ lkrg-0.7/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.c 2020-04-21 19:05:39.418333669 +0200
-@@ -91,7 +91,9 @@
- p_ed_guard_globals.p_selinux.p_selinux_enforcing = *p_selinux_enforcing;
- #endif
- #endif
-+#if LINUX_VERSION_CODE < KERNEL_VERSION(5, 6, 0)
- p_ed_guard_globals.p_selinux.p_selinux_enabled = *p_selinux_enabled;
-+#endif
- }
-
- // unlock shadow SELinux updates