intel / ccc-linux-guest-hardening

Linux Security Hardening for Confidential Compute
https://intel.github.io/ccc-linux-guest-hardening-docs
MIT License
65 stars 13 forks source link

campaign automation #29

Closed il-steffen closed 1 year ago

il-steffen commented 1 year ago

Draft PR for comments...let me know what you think :-)

Idea/purpose: More modular campaign running + debug approach. Instead of a single big runner, the new init_harness.py creates a campaign folder of kernel/fuzzer configs. We can run fuzz.sh there to do everything manual: build, fuzz, trace, smatch. The new campaign runner only has to chain all the steps together based on number of CPUs. But knowledge/config is encoded in low-level scripts, for example fuzz.sh build applies correct KCFLAGS to kernel build and prep_harness.py should be your basis for testing or improving a particular harness configuration.

Summary of changes

Misc Issues

Blocking Issues