@@ -12,7 +12,7 @@ coverage run -a --branch bin/kconfig-hardened-check -h
12
12
echo " >>>>> get version <<<<<"
13
13
coverage run -a --branch bin/kconfig-hardened-check --version
14
14
15
- echo " >>>>> print the security hardening preferences <<<<<"
15
+ echo " >>>>> print the security hardening recommendations <<<<<"
16
16
coverage run -a --branch bin/kconfig-hardened-check -p X86_64
17
17
coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m verbose
18
18
coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m json
@@ -29,6 +29,12 @@ coverage run -a --branch bin/kconfig-hardened-check -p ARM
29
29
coverage run -a --branch bin/kconfig-hardened-check -p ARM -m verbose
30
30
coverage run -a --branch bin/kconfig-hardened-check -p ARM -m json
31
31
32
+ echo " >>>>> generate the Kconfig fragment <<<<<"
33
+ coverage run -a --branch bin/kconfig-hardened-check -g X86_64
34
+ coverage run -a --branch bin/kconfig-hardened-check -g X86_32
35
+ coverage run -a --branch bin/kconfig-hardened-check -g ARM64
36
+ coverage run -a --branch bin/kconfig-hardened-check -g ARM
37
+
32
38
echo " >>>>> check the example kconfig files and cmdline <<<<<"
33
39
cat /proc/cmdline
34
40
echo " l1tf=off mds=full randomize_kstack_offset=on iommu.passthrough=0" > ./cmdline_example
@@ -62,6 +68,12 @@ echo ">>>>> wrong modes for -p <<<<<"
62
68
echo " >>>>> -p and -c together <<<<<"
63
69
! coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config
64
70
71
+ echo " >>>>> wrong mode for -g <<<<<"
72
+ ! coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -m show_ok
73
+
74
+ echo " >>>>> -g and -c together <<<<<"
75
+ ! coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config
76
+
65
77
cp kconfig_hardened_check/config_files/distros/fedora_34.config ./test.config
66
78
67
79
echo " >>>>> no kernel version <<<<<"
0 commit comments