From a6ddcd45da2105b1b8b43f92756cbd07db973699 Mon Sep 17 00:00:00 2001 From: Robin Gloster Date: Wed, 24 Jul 2019 21:26:13 +0200 Subject: checksec: 1.5 -> 2.0.1 --- ...to-modprobe-config-before-checking-kernel.patch | 23 +++++----- pkgs/os-specific/linux/checksec/default.nix | 50 ++++++++++------------ 2 files changed, 35 insertions(+), 38 deletions(-) (limited to 'pkgs/os-specific/linux/checksec') diff --git a/pkgs/os-specific/linux/checksec/0001-attempt-to-modprobe-config-before-checking-kernel.patch b/pkgs/os-specific/linux/checksec/0001-attempt-to-modprobe-config-before-checking-kernel.patch index 2caf52f3c0a3..9beeab0f9543 100644 --- a/pkgs/os-specific/linux/checksec/0001-attempt-to-modprobe-config-before-checking-kernel.patch +++ b/pkgs/os-specific/linux/checksec/0001-attempt-to-modprobe-config-before-checking-kernel.patch @@ -8,20 +8,21 @@ Signed-off-by: Austin Seipp checksec.sh | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) -diff --git a/checksec.sh b/checksec.sh +diff --git a/checksec b/checksec index dd1f72e..63acc29 100644 ---- a/checksec.sh -+++ b/checksec.sh -@@ -337,7 +337,8 @@ kernelcheck() { - printf " userspace processes, this option lists the status of kernel configuration\n" - printf " options that harden the kernel itself against attack.\n\n" - printf " Kernel config: " -- +--- a/checksec ++++ b/checksec +@@ -676,7 +676,8 @@ kernelcheck() { + echo_message " userspace processes, this option lists the status of kernel configuration\n" '' '' '' + echo_message " options that harden the kernel itself against attack.\n\n" '' '' '' + echo_message " Kernel config:\n" '' '' '{ "kernel": ' +- + + modprobe configs 2> /dev/null - if [ -f /proc/config.gz ] ; then - kconfig="zcat /proc/config.gz" - printf "\033[32m/proc/config.gz\033[m\n\n" + if [[ ! "${1}" == "" ]] ; then + kconfig="cat ${1}" + echo_message " Warning: The config ${1} on disk may not represent running kernel config!\n\n" "${1}" "