X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=.github%2Fworkflows%2Ffunctional_test.sh;h=106320c8447516e22c9fb5b1b551b7711ebbe4db;hb=e0b9932fb09f1396ef412d6d36ec34835c07450b;hp=50fec21fb11bbda5f25e959946dd755ba253ff25;hpb=c1fa1ee05544739d87445288f2fccec35b5e9a40;p=kconfig-hardened-check.git diff --git a/.github/workflows/functional_test.sh b/.github/workflows/functional_test.sh index 50fec21..106320c 100644 --- a/.github/workflows/functional_test.sh +++ b/.github/workflows/functional_test.sh @@ -3,41 +3,44 @@ set -x set -e +git status +git show -s + echo "Beginning of the functional tests" echo ">>>>> get help <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -coverage run -a --branch bin/kconfig-hardened-check -h +coverage run -a --branch bin/kernel-hardening-checker +coverage run -a --branch bin/kernel-hardening-checker -h echo ">>>>> get version <<<<<" -coverage run -a --branch bin/kconfig-hardened-check --version +coverage run -a --branch bin/kernel-hardening-checker --version echo ">>>>> print the security hardening recommendations <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m json +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m json -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -m json +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 -m json -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -m json +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 -m json -coverage run -a --branch bin/kconfig-hardened-check -p ARM -coverage run -a --branch bin/kconfig-hardened-check -p ARM -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p ARM -m json +coverage run -a --branch bin/kernel-hardening-checker -p ARM +coverage run -a --branch bin/kernel-hardening-checker -p ARM -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p ARM -m json echo ">>>>> generate the Kconfig fragment <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -coverage run -a --branch bin/kconfig-hardened-check -g X86_32 -coverage run -a --branch bin/kconfig-hardened-check -g ARM64 -coverage run -a --branch bin/kconfig-hardened-check -g ARM +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 +coverage run -a --branch bin/kernel-hardening-checker -g X86_32 +coverage run -a --branch bin/kernel-hardening-checker -g ARM64 +coverage run -a --branch bin/kernel-hardening-checker -g ARM echo ">>>>> check the example kconfig files, cmdline, and sysctl <<<<<" cat /proc/cmdline -echo "l1tf=off mds=full randomize_kstack_offset=on iommu.passthrough=0" > ./cmdline_example +echo "l1tf=off mds=full mitigations=off randomize_kstack_offset=on retbleed=0 iommu.passthrough=0" > ./cmdline_example cat ./cmdline_example sysctl -a > /tmp/sysctls CONFIG_DIR=`find . -name config_files` @@ -48,90 +51,103 @@ for C in $KCONFIGS do COUNT=$(expr $COUNT + 1) echo "\n>>>>> checking kconfig number $COUNT <<<<<" - coverage run -a --branch bin/kconfig-hardened-check -c $C > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -m verbose > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l /proc/cmdline > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -s /tmp/sysctls > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m verbose > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m json > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_ok > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_fail > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C + coverage run -a --branch bin/kernel-hardening-checker -c $C -m verbose > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C -l /proc/cmdline + coverage run -a --branch bin/kernel-hardening-checker -c $C -s /tmp/sysctls + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m verbose > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m json + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_ok + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_fail done echo "\n>>>>> have checked $COUNT kconfigs <<<<<" +echo ">>>>> check sysctl separately <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m verbose > /dev/null +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m json +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m show_ok +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m show_fail + echo "Collect coverage for error handling" echo ">>>>> -c and -p together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -c kernel_hardening_checker/config_files/distros/fedora_34.config && exit 1 echo ">>>>> -c and -g together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config && exit 1 - -echo ">>>>> -p and -g together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -g X86_64 && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -c kernel_hardening_checker/config_files/distros/fedora_34.config && exit 1 echo ">>>>> -l without -c <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -l /proc/cmdline && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -l /proc/cmdline && exit 1 + +echo ">>>>> -s and -p together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -s $SYSCTL_EXAMPLE && exit 1 + +echo ">>>>> -s and -g together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -s $SYSCTL_EXAMPLE && exit 1 + +echo ">>>>> -p and -g together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -g X86_64 && exit 1 echo ">>>>> wrong modes for -p <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m show_ok && exit 1 -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m show_fail && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m show_ok && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m show_fail && exit 1 echo ">>>>> wrong mode for -g <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -m show_ok && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -m show_ok && exit 1 -cp kconfig_hardened_check/config_files/distros/fedora_34.config ./test.config +cp kernel_hardening_checker/config_files/distros/fedora_34.config ./test.config echo ">>>>> no kernel version <<<<<" sed '3d' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> strange kernel version string <<<<<" sed '3 s/5./version 5./' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> no arch <<<<<" sed '305d' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> more than one arch <<<<<" cp test.config error.config echo 'CONFIG_ARM64=y' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> invalid enabled kconfig option <<<<<" cp test.config error.config echo 'CONFIG_FOO=is not set' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> one config option multiple times <<<<<" cp test.config error.config echo 'CONFIG_BUG=y' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> invalid compiler versions <<<<<" cp test.config error.config sed '8 s/CONFIG_CLANG_VERSION=0/CONFIG_CLANG_VERSION=120000/' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> unexpected line in the kconfig file <<<<<" cp test.config error.config echo 'some strange line' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> multi-line cmdline file <<<<<" echo 'hey man 1' > cmdline echo 'hey man 2' >> cmdline -coverage run -a --branch bin/kconfig-hardened-check -c test.config -l cmdline && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -l cmdline && exit 1 echo ">>>>> unexpected line in the sysctl file <<<<<" cp $SYSCTL_EXAMPLE error_sysctls echo 'some strange line' >> error_sysctls -coverage run -a --branch bin/kconfig-hardened-check -c test.config -s error_sysctls && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -s error_sysctls && exit 1 echo ">>>>> invalid sysctl file <<<<<" touch empty_file -coverage run -a --branch bin/kconfig-hardened-check -c test.config -s empty_file && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -s empty_file && exit 1 echo "The end of the functional tests"