From patchwork Sun Nov 6 14:52:19 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hilton Chain X-Patchwork-Id: 44352 Return-Path: X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id 132D027BBEA; Sun, 6 Nov 2022 14:53:19 +0000 (GMT) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,FROM_SUSPICIOUS_NTLD,MAILING_LIST_MULTI,PDS_OTHER_BAD_TLD, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id 4DC2527BBE9 for ; Sun, 6 Nov 2022 14:53:18 +0000 (GMT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1orh1H-0001yr-VG; Sun, 06 Nov 2022 09:53:08 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh1C-0001y5-VB for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:04 -0500 Received: from debbugs.gnu.org ([209.51.188.43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1orh1C-0003yN-NF for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1orh1C-0004RH-80 for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:02 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#59043] [PATCH v2] gnu: Add kconfig-hardened-check. Resent-From: Hilton Chain Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Sun, 06 Nov 2022 14:53:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 59043 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch moreinfo To: Christopher Baines Cc: 59043@debbugs.gnu.org X-Debbugs-Original-Cc: 59043@debbugs.gnu.org, guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.166774636917032 (code B ref -1); Sun, 06 Nov 2022 14:53:02 +0000 Received: (at submit) by debbugs.gnu.org; 6 Nov 2022 14:52:49 +0000 Received: from localhost ([127.0.0.1]:59076 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1orh0z-0004Qe-GH for submit@debbugs.gnu.org; Sun, 06 Nov 2022 09:52:49 -0500 Received: from lists.gnu.org ([209.51.188.17]:58862) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1orh0x-0004QT-0f for submit@debbugs.gnu.org; Sun, 06 Nov 2022 09:52:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh0w-0001s2-RZ for guix-patches@gnu.org; Sun, 06 Nov 2022 09:52:46 -0500 Received: from mail.boiledscript.com ([144.168.59.46]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh0v-0003uJ-6g for guix-patches@gnu.org; Sun, 06 Nov 2022 09:52:46 -0500 Date: Sun, 06 Nov 2022 22:52:19 +0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ultrarare.space; s=dkim; t=1667746362; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=syYnFVDuFzisb/YwMTBKav/1TRrdVilXGvP49vpdGh0=; b=RUoYtVEq75jgtexA926lPlkv+7SK7h0H3FE/QHAC8wTast5bDkGQMWnZs45CP7PkNDXZ6M f3heiLznF8gePQwpxm7qmy23SZzHXXzilC0Ka9hA8c/x7PeatHF78G6Yy4i8IcYMLUPGm+ t+oalqMQKZtiba+T/2jTWV1Wetf+L+Mmh7hrsyukW5iD8MIHULLwkjDUqISYIZ+cduckRN r+MgKJ2CSm4SXq5h1oYq0K1a7hFUrLvAIP00CiHSB2huxIj6mFGV6zpSccPcNkAMznndA0 Qtx+XlezjiGP55JJn2NNQJLC82Nv4Mex1hnmEv/udlPKGJWRiVnWdQFIA88vqw== Message-ID: In-Reply-To: <875yfsgocy.fsf@cbaines.net> References: <875yfsgocy.fsf@cbaines.net> MIME-Version: 1.0 X-Spamd-Bar: / Authentication-Results: mail.boiledscript.com; auth=pass smtp.mailfrom=hako@ultrarare.space Received-SPF: pass client-ip=144.168.59.46; envelope-from=hako@ultrarare.space; helo=mail.boiledscript.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Guix-patches" Reply-to: Hilton Chain X-ACL-Warn: , Hilton Chain via Guix-patches X-Patchwork-Original-From: Hilton Chain via Guix-patches via From: Hilton Chain Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org X-getmail-retrieved-from-mailbox: Patches * gnu/packages/linux.scm (kconfig-hardened-check): New variable. --- v1 -> v2: Add more description. gnu/packages/linux.scm | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) base-commit: 97d565c786ee1a1eb920ed66384f60aad20e5cc2 -- 2.38.0 diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm index cf11a7fc1b..8eadf8354c 100644 --- a/gnu/packages/linux.scm +++ b/gnu/packages/linux.scm @@ -9512,3 +9512,35 @@ (define-public tp-smapi-module @acronym{SMAPI, System Management Application Program Interface} and direct access to the embedded controller.") (license license:gpl2+))) + +(define-public kconfig-hardened-check + (package + (name "kconfig-hardened-check") + (version "0.5.17") + (source (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/a13xp0p0v/kconfig-hardened-check") + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 + "0p9pywfxwyk4yfgaf7bhqrf72ywc6w6k77dbi7lldynha886ih4a")))) + (build-system python-build-system) + (home-page "https://github.com/a13xp0p0v/kconfig-hardened-check") + (synopsis + "Tool for checking the security hardening options of the Linux kernel") + (description + "@code{kconfig-hardened-check} is a tool for checking the security +hardening options of the Linux kernel. Provided preferences are based on +suggestions from various sources, including: + +@itemize +@item KSPP recommended settings +@item CLIP OS kernel configuration +@item Last public grsecurity patch (options which they disable) +@item SECURITY_LOCKDOWN_LSM patchset +@item Direct feedback from the Linux kernel maintainers +@end itemize\n +This tool supports checking Kconfig options and kernel cmdline parameters.") + (license license:gpl3)))