echo ">>>>> get version <<<<<"
coverage run -a --branch bin/kconfig-hardened-check --version
-echo ">>>>> print the security hardening preferences <<<<<"
+echo ">>>>> print the security hardening recommendations <<<<<"
coverage run -a --branch bin/kconfig-hardened-check -p X86_64
coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m verbose
coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m json
coverage run -a --branch bin/kconfig-hardened-check -p ARM -m verbose
coverage run -a --branch bin/kconfig-hardened-check -p ARM -m json
+echo ">>>>> generate the Kconfig fragment <<<<<"
+coverage run -a --branch bin/kconfig-hardened-check -g X86_64
+coverage run -a --branch bin/kconfig-hardened-check -g X86_32
+coverage run -a --branch bin/kconfig-hardened-check -g ARM64
+coverage run -a --branch bin/kconfig-hardened-check -g ARM
+
echo ">>>>> check the example kconfig files and cmdline <<<<<"
cat /proc/cmdline
echo "l1tf=off mds=full randomize_kstack_offset=on iommu.passthrough=0" > ./cmdline_example
echo ">>>>> -p and -c together <<<<<"
! coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config
+echo ">>>>> wrong mode for -g <<<<<"
+! coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -m show_ok
+
+echo ">>>>> -g and -c together <<<<<"
+! coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config
+
cp kconfig_hardened_check/config_files/distros/fedora_34.config ./test.config
echo ">>>>> no kernel version <<<<<"