generated from archlinux/template
4.14.11-1
This commit is contained in:
43
PKGBUILD
43
PKGBUILD
@@ -4,7 +4,7 @@
|
||||
pkgbase=linux # Build stock -ARCH kernel
|
||||
#pkgbase=linux-custom # Build kernel with a different name
|
||||
_srcname=linux-4.14
|
||||
pkgver=4.14.10
|
||||
pkgver=4.14.11
|
||||
pkgrel=1
|
||||
arch=('x86_64')
|
||||
url="https://www.kernel.org/"
|
||||
@@ -21,11 +21,12 @@ source=(
|
||||
'90-linux.hook' # pacman hook for initramfs regeneration
|
||||
'linux.preset' # standard config files for mkinitcpio ramdisk
|
||||
0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch
|
||||
0001-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch
|
||||
0002-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch
|
||||
0001-Revert-xfrm-Fix-stack-out-of-bounds-read-in-xfrm_sta.patch
|
||||
0002-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch
|
||||
0003-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch
|
||||
0002-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch
|
||||
0003-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch
|
||||
0004-Revert-xfrm-Fix-stack-out-of-bounds-read-in-xfrm_sta.patch
|
||||
0005-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch
|
||||
0006-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch
|
||||
0007-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch
|
||||
)
|
||||
validpgpkeys=(
|
||||
'ABAF11C65A2970B130ABE3C479BE3E4300411886' # Linus Torvalds
|
||||
@@ -33,18 +34,19 @@ validpgpkeys=(
|
||||
)
|
||||
sha256sums=('f81d59477e90a130857ce18dc02f4fbe5725854911db1e7ba770c7cd350f96a7'
|
||||
'SKIP'
|
||||
'16f560aa713b46c707f04a226f67dc31fdd280aae57dd19e0413d61df5336c74'
|
||||
'f588b62d7ee1d2ebdc24afa0e256ff2f8812d5cab3bf572bf02e7c4525922bf9'
|
||||
'SKIP'
|
||||
'4d12ed868b05720c3d263c8454622c67bdee6969400049d7adac7b00907ad195'
|
||||
'24b8cf6829dafcb2b5c76cffaae6438ad2d432f13d6551fa1c8f25e66b751ed4'
|
||||
'ae2e95db94ef7176207c690224169594d49445e04249d2499e9d2fbc117a0b21'
|
||||
'75f99f5239e03238f88d1a834c50043ec32b1dc568f2cc291b07d04718483919'
|
||||
'ad6344badc91ad0630caacde83f7f9b97276f80d26a20619a87952be65492c65'
|
||||
'37b86ca3de148a34258e3176dbf41488d9dbd19e93adbd22a062b3c41332ce85'
|
||||
'c6e7db7dfd6a07e1fd0e20c3a5f0f315f9c2a366fe42214918b756f9a1c9bfa3'
|
||||
'1d69940c6bf1731fa1d1da29b32ec4f594fa360118fe7b128c9810285ebf13e2'
|
||||
'ed3266ab03f836f57de0faf8a10ffd7566c909515c2649de99adaab2fac4aa32'
|
||||
'64a014f7e1b4588728b3ea9538beee67ec63fb792d890c7be9cc13ddc2121b00'
|
||||
'3d4c41086c077fbd515d04f5e59c0c258f700433c5da3365d960b696c2e56efb')
|
||||
'06bc1d8b1cd153c3146a4376d833f5769b980e5ef5eae99ddaaeb48bf514dae2'
|
||||
'b90bef87574f30ec66c0f10d089bea56a9e974b6d052fee3071b1ff21360724b'
|
||||
'f38531dee9fd8a59202ce96ac5b40446f1f035b89788ea9ecb2fb3909f703a25'
|
||||
'705d5fbfce00ccc20490bdfb5853d67d86ac00c845de6ecb13e414214b48daeb'
|
||||
'0a249248534a17f14fab7e14994811ae81fe324668a82ff41f3bcabeeae1460f'
|
||||
'8e1b303957ddd829c0c9ad7c012cd32f2354ff3c8c1b85da3d7f8a54524f3711'
|
||||
'914a0a019545ad7d14ed8d5c58d417eb0a8ec12a756beec79a545aabda343b31')
|
||||
|
||||
_kernelname=${pkgbase#linux}
|
||||
|
||||
@@ -64,17 +66,20 @@ prepare() {
|
||||
patch -Np1 -i ../0001-add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by.patch
|
||||
|
||||
# https://bugs.archlinux.org/task/56575
|
||||
patch -Np1 -i ../0001-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch
|
||||
patch -Np1 -i ../0002-e1000e-Fix-e1000_check_for_copper_link_ich8lan-retur.patch
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2017-8824
|
||||
patch -Np1 -i ../0002-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch
|
||||
patch -Np1 -i ../0003-dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch
|
||||
|
||||
# https://bugs.archlinux.org/task/56605
|
||||
patch -Np1 -i ../0001-Revert-xfrm-Fix-stack-out-of-bounds-read-in-xfrm_sta.patch
|
||||
patch -Np1 -i ../0002-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch
|
||||
patch -Np1 -i ../0004-Revert-xfrm-Fix-stack-out-of-bounds-read-in-xfrm_sta.patch
|
||||
patch -Np1 -i ../0005-xfrm-Fix-stack-out-of-bounds-read-on-socket-policy-l.patch
|
||||
|
||||
# https://bugs.archlinux.org/task/56846
|
||||
patch -Np1 -i ../0003-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch
|
||||
patch -Np1 -i ../0006-cgroup-fix-css_task_iter-crash-on-CSS_TASK_ITER_PROC.patch
|
||||
|
||||
# For AMD processors, keep PTI off by default
|
||||
patch -Np1 -i ../0007-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch
|
||||
|
||||
cp -Tf ../config .config
|
||||
|
||||
|
||||
Reference in New Issue
Block a user