From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp12.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms5.migadu.com with LMTPS id WOKeMF7KZ2MQPgAAbAwnHQ (envelope-from ) for ; Sun, 06 Nov 2022 15:53:18 +0100 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp12.migadu.com with LMTPS id eJ14MF7KZ2NqYwAAauVa8A (envelope-from ) for ; Sun, 06 Nov 2022 15:53:18 +0100 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 75692B02A for ; Sun, 6 Nov 2022 15:53:18 +0100 (CET) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1orh1H-0001yr-VG; Sun, 06 Nov 2022 09:53:08 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh1C-0001y5-VB for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:04 -0500 Received: from debbugs.gnu.org ([209.51.188.43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1orh1C-0003yN-NF for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1orh1C-0004RH-80 for guix-patches@gnu.org; Sun, 06 Nov 2022 09:53:02 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#59043] [PATCH v2] gnu: Add kconfig-hardened-check. Resent-From: Hilton Chain Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Sun, 06 Nov 2022 14:53:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 59043 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch moreinfo To: Christopher Baines Cc: 59043@debbugs.gnu.org X-Debbugs-Original-Cc: 59043@debbugs.gnu.org, guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.166774636917032 (code B ref -1); Sun, 06 Nov 2022 14:53:02 +0000 Received: (at submit) by debbugs.gnu.org; 6 Nov 2022 14:52:49 +0000 Received: from localhost ([127.0.0.1]:59076 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1orh0z-0004Qe-GH for submit@debbugs.gnu.org; Sun, 06 Nov 2022 09:52:49 -0500 Received: from lists.gnu.org ([209.51.188.17]:58862) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1orh0x-0004QT-0f for submit@debbugs.gnu.org; Sun, 06 Nov 2022 09:52:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh0w-0001s2-RZ for guix-patches@gnu.org; Sun, 06 Nov 2022 09:52:46 -0500 Received: from mail.boiledscript.com ([144.168.59.46]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1orh0v-0003uJ-6g for guix-patches@gnu.org; Sun, 06 Nov 2022 09:52:46 -0500 Date: Sun, 06 Nov 2022 22:52:19 +0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ultrarare.space; s=dkim; t=1667746362; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=syYnFVDuFzisb/YwMTBKav/1TRrdVilXGvP49vpdGh0=; b=RUoYtVEq75jgtexA926lPlkv+7SK7h0H3FE/QHAC8wTast5bDkGQMWnZs45CP7PkNDXZ6M f3heiLznF8gePQwpxm7qmy23SZzHXXzilC0Ka9hA8c/x7PeatHF78G6Yy4i8IcYMLUPGm+ t+oalqMQKZtiba+T/2jTWV1Wetf+L+Mmh7hrsyukW5iD8MIHULLwkjDUqISYIZ+cduckRN r+MgKJ2CSm4SXq5h1oYq0K1a7hFUrLvAIP00CiHSB2huxIj6mFGV6zpSccPcNkAMznndA0 Qtx+XlezjiGP55JJn2NNQJLC82Nv4Mex1hnmEv/udlPKGJWRiVnWdQFIA88vqw== Message-ID: In-Reply-To: <875yfsgocy.fsf@cbaines.net> References: <875yfsgocy.fsf@cbaines.net> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit X-Spamd-Bar: / Received-SPF: pass client-ip=144.168.59.46; envelope-from=hako@ultrarare.space; helo=mail.boiledscript.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Guix-patches" Reply-to: Hilton Chain X-ACL-Warn: , Hilton Chain via Guix-patches From: Hilton Chain via Guix-patches via Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Flow: FLOW_IN X-Migadu-Country: US ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1667746398; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=syYnFVDuFzisb/YwMTBKav/1TRrdVilXGvP49vpdGh0=; b=dGWb+YoTtSSt3XyrOtgZT3ke7fBnURdwB4S2sLzhES7NsaqqjpjottuD279BoOsUNmsEfJ /i+pTNCT69G1I4qlVtUp6aUmb6vA6wylBiB12SNfW5SyIpWlFgE99qUrR3drxKp1fW45nq ED7FmrkCrO2yP7pDXmDM3p19QKloyGK4dG1D7NE6fTOf9gZGQFAzcq+LvxUz5LF8J+zuV8 rua60ltDpO8i8AAG10AGpl4nMJGBRoqUye+T41aGQMPW0Gookvwm4/Fg6AJK05FtKWFvnX htllDQF7u36fv2nghSLsY8FhJWnpiSep6fSJFZ5haEj7pSsua5C3nFwCO97N1Q== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1667746398; a=rsa-sha256; cv=none; b=Cv3VNlI3zWY29Roz1OrgucVSssdQnyHERK4uLtIDB7ha90x26JH/e7J0tFDJQ4/VmJvZ4+ qSQJhl9b9iCh1YAoKJDIMIvAjEq36MHNI/VgPO6L/wDcQxctHAXYrD6xnEa/nCH9eBBaxz rSUUAE2b50Hdx9JVHsTv06Yd0qnyIexc+Fz3Pp3hBO6pQMVNl2lpar7olqhKd0lXhr/psZ r6Jw2bQE3BSqwwsics1BQwX8sJFaciFkKo9FWHPTsM3lkAYXrvAosUNkxguvBie0vMRkmi 5miGP39QWDtq3h9vVRCQTYlQWxsVIySbU13CMJ3M5yVTC3GabUGdw8MX8vHvOg== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=ultrarare.space header.s=dkim header.b=RUoYtVEq; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: -3.60 Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=ultrarare.space header.s=dkim header.b=RUoYtVEq; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: 75692B02A X-Spam-Score: -3.60 X-Migadu-Scanner: scn0.migadu.com X-TUID: FGCAygIZ96BL * gnu/packages/linux.scm (kconfig-hardened-check): New variable. --- v1 -> v2: Add more description. gnu/packages/linux.scm | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm index cf11a7fc1b..8eadf8354c 100644 --- a/gnu/packages/linux.scm +++ b/gnu/packages/linux.scm @@ -9512,3 +9512,35 @@ (define-public tp-smapi-module @acronym{SMAPI, System Management Application Program Interface} and direct access to the embedded controller.") (license license:gpl2+))) + +(define-public kconfig-hardened-check + (package + (name "kconfig-hardened-check") + (version "0.5.17") + (source (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/a13xp0p0v/kconfig-hardened-check") + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 + "0p9pywfxwyk4yfgaf7bhqrf72ywc6w6k77dbi7lldynha886ih4a")))) + (build-system python-build-system) + (home-page "https://github.com/a13xp0p0v/kconfig-hardened-check") + (synopsis + "Tool for checking the security hardening options of the Linux kernel") + (description + "@code{kconfig-hardened-check} is a tool for checking the security +hardening options of the Linux kernel. Provided preferences are based on +suggestions from various sources, including: + +@itemize +@item KSPP recommended settings +@item CLIP OS kernel configuration +@item Last public grsecurity patch (options which they disable) +@item SECURITY_LOCKDOWN_LSM patchset +@item Direct feedback from the Linux kernel maintainers +@end itemize\n +This tool supports checking Kconfig options and kernel cmdline parameters.") + (license license:gpl3))) base-commit: 97d565c786ee1a1eb920ed66384f60aad20e5cc2 -- 2.38.0