|
Message-ID: <82f2146f-5f41-0bc2-74ce-a35e66f1062d@riseup.net> Date: Sun, 10 Nov 2019 16:43:00 +0000 From: Patrick Schleizer <adrelanos@...eup.net> To: lkrg-users@...ts.openwall.com Subject: LKRG Debian 10 buster / Debian packaging Hello! Thank you for maintaining LKRG! I have an issue similar to this, I guess. https://www.openwall.com/lists/lkrg-users/2018/02/05/2 Using LKRG stable branch, I think. Used these files: https://www.openwall.com/lkrg/lkrg-0.7.tar.gz https://www.openwall.com/lkrg/lkrg-0.7.tar.gz.sign Debian 10, buster Inside Qubes OS. Using Qubes VM kernel, i.e. kernel by Debian. uname -a Linux host 4.19.0-6-amd64 #1 SMP Debian 4.19.67-2+deb10u1 (2019-09-20) x86_64 GNU/Linux cat /proc/version Linux version 4.19.0-6-amd64 (debian-kernel@...ts.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.67-2+deb10u1 (2019-09-20) cat /etc/os-release PRETTY_NAME="Debian GNU/Linux 10 (buster)" NAME="Debian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=debian HOME_URL="https://www.debian.org/" SUPPORT_URL="https://www.debian.org/support" BUG_REPORT_URL="https://bugs.debian.org/" gcc --version gcc (Debian 8.3.0-6) 8.3.0 sudo insmod output/p_lkrg.ko p_init_log_level=3 insmod: ERROR: could not insert module output/p_lkrg.ko: Unknown symbol in module sudo dmesg: [ 1279.380872] p_lkrg: Unknown symbol usb_unregister_notify (err -2) [ 1279.380943] p_lkrg: Unknown symbol usb_register_notify (err -2) "make" log pasted below, which however looks fine. [1] "make install" log pasted below too. It contains one line which might be interesting [2] > Warning: modules_install: missing 'System.map' file. Skipping depmod. I however was able to start lkrg using systemd, which was surprising. sudo systemctl start lkrg.service sudo systemctl status lkrg.service which shows success. sudo dmesg: [ 2919.927190] ACPI: bus type USB registered [ 2919.927253] usbcore: registered new interface driver usbfs [ 2919.927281] usbcore: registered new interface driver hub [ 2919.927356] usbcore: registered new device driver usb [ 2919.936781] [p_lkrg] Loading LKRG... [ 2919.938713] Freezing user space processes ... (elapsed 0.032 seconds) done. [ 2919.970821] OOM killer disabled. [ 2919.970836] [p_lkrg] Verifying 20 potential UMH paths for whitelisting... [ 2919.976046] [p_lkrg] 3 UMH paths were whitelisted... [ 2920.508282] [p_lkrg] [kretprobe] register_kretprobe() for <ovl_create_or_link> failed! [err=-22] [ 2920.508315] [p_lkrg] ERROR: Can't hook ovl_create_or_link function :( [ 2920.658858] [p_lkrg] LKRG initialized successfully! [ 2920.658885] OOM killer enabled. [ 2920.658894] Restarting tasks ... done. [ 2920.678539] [p_lkrg] Disabling "clean" message. Does that look good? Should be OK as per https://www.openwall.com/lists/lkrg-users/2019/04/09/1 right? Also posting systemd log after reboot. [3] (That is after some systemd unit file changes which I will discuss in separate e-mail.) I am also asking since I am considering to package LKRG for Debian buster / Whonix / Kicksecure / Qubes (Debian template). However, I am not a Debian Developer (DD). The package would be available from a third party repository deb.whonix.org but any DD would be welcome to help and upload to packages.debian.org. Can't promise anything at this point, except that I am looking into it and see how far I get. Kind regards, Patrick [1] lkrg-0.7 $ make make -C /lib/modules/4.19.0-6-amd64/build M=/home/user/sourcesother/lkrg-0.7 modules make[1]: Entering directory '/usr/src/linux-headers-4.19.0-6-amd64' CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/ksyms/p_resolve_ksym.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/hashing/p_lkrg_fast_hash.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/comm_channel/p_comm_channel.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/integrity_timer/p_integrity_timer.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/kmod/p_kmod.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/CPU.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/arch/x86/p_x86_metadata.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/arch/x86/p_switch_idt/p_switch_idt.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/arch/arm64/p_arm64_metadata.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/arch/p_arch_metadata.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/JUMP_LABEL/p_arch_jump_label_transform/p_arch_jump_label_transform.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/database/p_database.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/notifiers/p_notifiers.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/self-defense/hiding/p_hiding.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/p_rb_ed_trees/p_rb_ed_pids/p_rb_ed_pids_tree.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_execve/p_sys_execve.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_execveat/p_sys_execveat.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_call_usermodehelper/p_call_usermodehelper.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_call_usermodehelper_exec/p_call_usermodehelper_exec.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_do_exit/p_do_exit.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_wake_up_new_task/p_wake_up_new_task.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setuid/p_sys_setuid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setreuid/p_sys_setreuid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setresuid/p_sys_setresuid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setfsuid/p_sys_setfsuid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setgid/p_sys_setgid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setregid/p_sys_setregid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setresgid/p_sys_setresgid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_setfsgid/p_sys_setfsgid.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_set_current_groups/p_set_current_groups.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_do_init_module/p_do_init_module.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_finit_module/p_sys_finit_module.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_delete_module/p_sys_delete_module.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_generic_permission/p_generic_permission.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sel_write_enforce/p_sel_write_enforce.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_seccomp/p_seccomp.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_unshare/p_sys_unshare.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_userns_install/p_userns_install.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/caps/p_sys_capset/p_sys_capset.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/caps/p_cap_task_prctl/p_cap_task_prctl.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/keyring/p_key_change_session_keyring/p_key_change_session_keyring.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/keyring/p_sys_add_key/p_sys_add_key.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/keyring/p_sys_request_key/p_sys_request_key.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/keyring/p_sys_keyctl/p_sys_keyctl.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/p_sys_ptrace/p_sys_ptrace.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_execve/p_compat_sys_execve.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_execveat/p_compat_sys_execveat.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_keyctl/p_compat_sys_keyctl.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_ptrace/p_compat_sys_ptrace.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_delete_module/p_compat_sys_delete_module.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_capset/p_compat_sys_capset.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_add_key/p_compat_sys_add_key.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/compat/p_compat_sys_request_key/p_compat_sys_request_key.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/__x32/p_x32_sys_execve/p_x32_sys_execve.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/__x32/p_x32_sys_execveat/p_x32_sys_execveat.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/__x32/p_x32_sys_keyctl/p_x32_sys_keyctl.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/__x32/p_x32_sys_ptrace/p_x32_sys_ptrace.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/override/p_override_creds/p_override_creds.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/override/p_revert_creds/p_revert_creds.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/override/overlayfs/p_ovl_create_or_link/p_ovl_create_or_link.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/pCFI/p_mark_inode_dirty/p_mark_inode_dirty.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/pCFI/p_schedule/p_schedule.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/pCFI/p___queue_work/p___queue_work.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/syscalls/pCFI/p_lookup_fast/p_lookup_fast.o CC [M] /home/user/sourcesother/lkrg-0.7/src/modules/exploit_detection/p_exploit_detection.o CC [M] /home/user/sourcesother/lkrg-0.7/src/p_lkrg_main.o LD [M] /home/user/sourcesother/lkrg-0.7/p_lkrg.o Building modules, stage 2. MODPOST 1 modules CC /home/user/sourcesother/lkrg-0.7/p_lkrg.mod.o LD [M] /home/user/sourcesother/lkrg-0.7/p_lkrg.ko make[1]: Leaving directory '/usr/src/linux-headers-4.19.0-6-amd64' mkdir -p output cp /home/user/sourcesother/lkrg-0.7/p_lkrg.ko output [2] lkrg-0.7 $ sudo make install make -C /lib/modules/4.19.0-6-amd64/build M=/home/user/sourcesother/lkrg-0.7 modules_install make[1]: Entering directory '/usr/src/linux-headers-4.19.0-6-amd64' INSTALL /home/user/sourcesother/lkrg-0.7/p_lkrg.ko DEPMOD 4.19.0-6-amd64 Warning: modules_install: missing 'System.map' file. Skipping depmod. make[1]: Leaving directory '/usr/src/linux-headers-4.19.0-6-amd64' depmod -a /home/user/sourcesother/lkrg-0.7/scripts/bootup/lkrg-bootup.sh install [*] Executing LKRG's bootup installation script [+] Systemd detected Installing lkrg.service file under /run/systemd/system folder Enabling lkrg.service on bootup Created symlink /etc/systemd/system/multi-user.target.wants/lkrg.service → /run/systemd/system/lkrg.service. To start lkrg.service please use: systemctl start lkrg [+] [3] Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] Loading LKRG... Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] Verifying 20 potential UMH paths for whitelisting... Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] 3 UMH paths were whitelisted... Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] [kretprobe] register_kretprobe() for <ovl_create_or_link> failed! [err=-22] Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] ERROR: Can't hook ovl_create_or_link function :( Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] LKRG initialized successfully! Nov 10 10:06:26 debian-buster-standalone kernel: [p_lkrg] Disabling "clean" message. Nov 10 10:06:26 debian-buster-standalone sysctl[706]: lkrg.clean_message = 0 Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae28f74c] target[0xffffffffae28f753] key[0xffffffffaf266000]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae239ece] target[0xffffffffae239f29] key[0xffffffffaf266000]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae2b3349] target[0xffffffffae2b3350] key[0xffffffffaf266370]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae2b0cbf] target[0xffffffffae2b0d64] key[0xffffffffaf266380]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae2f82c6] target[0xffffffffae2f82d2] key[0xffffffffaf266390]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae2d7326] target[0xffffffffae2d75d3] key[0xffffffffaf266390]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_JMP] code[0xffffffffae2af64f] target[0xffffffffae2af75c] key[0xffffffffaf266390]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating kernel core .text section hash! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_NOP] code[0xffffffffc080e6a1] target[0xffffffffc080e78f] key[0xffffffffc08297c0]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating module's core .text section hash - module[nf_conntrack : 0x0000000048dfb46d]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] New modification: type[JUMP_LABEL_NOP] code[0xffffffffc0847a51] target[0xffffffffc0847b26] key[0xffffffffc084c080]! Nov 10 10:06:27 debian-buster-standalone kernel: [p_lkrg] [JUMP_LABEL] Updating module's core .text section hash - module[nf_nat : 0x00000000449d9079]!
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.