From patchwork Thu Aug 5 17:00:59 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: phodina X-Patchwork-Id: 31851 Return-Path: X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id C6DCA27BC6B; Thu, 5 Aug 2021 18:02:10 +0100 (BST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, FREEMAIL_FROM,MAILING_LIST_MULTI,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS, T_DKIM_INVALID,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.2 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id 3FDB727BC78 for ; Thu, 5 Aug 2021 18:02:10 +0100 (BST) Received: from localhost ([::1]:54360 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1mBgkz-00056I-6q for patchwork@mira.cbaines.net; Thu, 05 Aug 2021 13:02:09 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:46662) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1mBgks-00053t-9J for guix-patches@gnu.org; Thu, 05 Aug 2021 13:02:02 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:36742) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1mBgks-0002ym-17 for guix-patches@gnu.org; Thu, 05 Aug 2021 13:02:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1mBgkr-0004sa-Qi for guix-patches@gnu.org; Thu, 05 Aug 2021 13:02:01 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#49898] [PATCH] gnu: Add spectre-meltdown-checker. Resent-From: phodina Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Thu, 05 Aug 2021 17:02:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 49898 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 49898@debbugs.gnu.org X-Debbugs-Original-To: "guix-patches@gnu.org" Received: via spool by submit@debbugs.gnu.org id=B.162818288116815 (code B ref -1); Thu, 05 Aug 2021 17:02:01 +0000 Received: (at submit) by debbugs.gnu.org; 5 Aug 2021 17:01:21 +0000 Received: from localhost ([127.0.0.1]:48288 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1mBgkC-0004Mh-Pt for submit@debbugs.gnu.org; Thu, 05 Aug 2021 13:01:21 -0400 Received: from lists.gnu.org ([209.51.188.17]:41456) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1mBgkA-0004Kp-Up for submit@debbugs.gnu.org; Thu, 05 Aug 2021 13:01:19 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:46344) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1mBgkA-0004l5-AJ for guix-patches@gnu.org; Thu, 05 Aug 2021 13:01:18 -0400 Received: from mail-4322.protonmail.ch ([185.70.43.22]:50499) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1mBgk7-0002I6-Hj for guix-patches@gnu.org; Thu, 05 Aug 2021 13:01:17 -0400 Date: Thu, 05 Aug 2021 17:00:59 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail; t=1628182863; bh=I/RZixkG47FDCqEzkt5y9+KIpbOoz3dBnxBZ07rWls0=; h=Date:To:From:Reply-To:Subject:From; b=xeL/+K1raZ4gb0AyslFHI8tczteWyXJCZIROtR7jjNUmJR3phYI7qi8SvcBP5AazJ ffjWs9WCDGgZwWmG9AJxkQhNlePbSesQqtfE+yKUH5esmuZUvwpu6ckPPkDHNj40Xq oD1J4SV0ybNb9ad4t15GCoG+9zgFCMl1DpKV9krg= Message-ID: MIME-Version: 1.0 Received-SPF: pass client-ip=185.70.43.22; envelope-from=phodina@protonmail.com; helo=mail-4322.protonmail.ch X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org Sender: "Guix-patches" Reply-to: phodina X-ACL-Warn: , phodina via Guix-patches X-Patchwork-Original-From: phodina via Guix-patches via From: phodina X-getmail-retrieved-from-mailbox: Patches * gnu/packages/linux.scm (spectre-meltdown-checker): New variable. --- 2.32.0 diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm index 4ca2a386e1..f89f6f259e 100644 --- a/gnu/packages/linux.scm +++ b/gnu/packages/linux.scm @@ -53,6 +53,7 @@ ;;; Copyright © 2020 pukkamustard ;;; Copyright © 2021 B. Wilson ;;; Copyright © 2021 Ivan Gankevich +;;; Copyright © 2021 Petr Hodina ;;; ;;; This file is part of GNU Guix. ;;; @@ -148,6 +149,7 @@ #:use-module (guix build-system cmake) #:use-module (guix build-system gnu) #:use-module (guix build-system go) + #:use-module (guix build-system copy) #:use-module (guix build-system meson) #:use-module (guix build-system python) #:use-module (guix build-system trivial) @@ -7191,6 +7193,44 @@ interfaces in parallel environments.") (supported-systems '("i686-linux" "x86_64-linux")) (license (list license:bsd-2 license:gpl2)))) ;dual +(define-public spectre-meltdown-checker +(package + (name "spectre-meltdown-checker") + (version "v0.44") + (source (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/speed47/spectre-meltdown-checker") + (commit version))) + (file-name (git-file-name name version)) + (sha256 + (base32 + "1b47wlc52jnp2d5c7kbqnxmlm4g3cfbv25q30llv5mlmzs6d7bam")))) + (build-system copy-build-system) + (inputs `(("util-linux" ,util-linux) + ("binutils" ,binutils))) + (synopsis "Spectre, Meltdown ... vulnerability/mitigation checker") + (description "A shell script to assess your system's resilience against +the several transient execution CVEs that were published since early 2018, +and give you guidance as to how to mitigate them. +@enumerate +@item Bounds Check Bypass +@item Branch Target Injection +@item Rogue Data Cache Load +@item Rogue System Register Read +@item Speculative Store Bypass +@item L1 Terminal Fault (SGX, OS, VMM) +@item Microarchitectural Store Buffer Data Sampling +@item Microarchitectural Fill Buffer Data Sampling +@item Microarchitectural Load Port Data Sampling +@item Microarchitectural Data Sampling Uncacheable Memory +@item TSX asynchronous abort +@item Machine Mheck Exception on Page Size Changes +@item Special Register Buffer Data Sampling +@end enumerate") + (home-page "https://github.com/speed47/spectre-meltdown-checker") + (license license:gpl3))) + (define-public snapscreenshot (package (name "snapscreenshot")