From patchwork Tue Sep 14 16:15:02 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alex Henrie X-Patchwork-Id: 1528071 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=vpitech.onmicrosoft.com header.i=@vpitech.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-vpitech-onmicrosoft-com header.b=c4m+6jui; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it (client-ip=213.254.12.146; helo=picard.linux.it; envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it; receiver=) Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4H87kY5GTxz9sQt for ; Wed, 15 Sep 2021 02:16:05 +1000 (AEST) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 4AE473C9264 for ; Tue, 14 Sep 2021 18:16:03 +0200 (CEST) X-Original-To: ltp@lists.linux.it Delivered-To: ltp@picard.linux.it Received: from in-3.smtp.seeweb.it (in-3.smtp.seeweb.it [IPv6:2001:4b78:1:20::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 8E4ED3C2308 for ; Tue, 14 Sep 2021 18:16:00 +0200 (CEST) Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam08on2062.outbound.protection.outlook.com [40.107.100.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by in-3.smtp.seeweb.it (Postfix) with ESMTPS id 6519E1A0123D for ; Tue, 14 Sep 2021 18:15:59 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dTfmtyna3kqPHUNg8TVt7llUYPNXtZtKquQRugRfAVNn2kSqHIxGOSSk5T9D1JTU5GqvovT/fwec5RVqsmUHOBDwfyC2+Y+F8P47aDiOpXw7ZyhZ1ONcR5Xt2g3IiiZF+xVwl5JNZ9lei5A6KdIt+nCkkb3hADXuLhv6xlZRQnYKb8yA6NhAsEx5VtYER/Ut5f0s+8vBF9ANJ2ALnrkiAnwCp/jS7vYFfrZnC2dR8if5uFkwUGDyOOB2RDJyTgj4K3OQbmEffSywwW1PTHqSwnBhkXzFlT92PKeDHtmgHAGS5K/9k0AkXO3W4ENJX8Mmw0lrRZM00P/psAzlonwHqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=zMxu75s0OhBb/Yj7WUME2AQQ2gmO12Nyk27SSpLlHuk=; b=Vrj3fxgOsebhItGPgQho5ZN/J9spqrNa3TR3RFF2rSa7kclpHTCjy/QJo9uZEiZYzjRXsvEd14JizW25muDjNMAoYymvLtKcG9kyC7yXriljW7mc2hTkpbbq5GPRwlePTxG12Dh8jyVtzumEWMcKQn+vyUnFiheoLX6KE0dEOi9d85khOOeaLjCjq/ekUnUAofHsLM0fsxdA2Qs+xvgg8pakOdAbH+u5ApEg4S9kT36Hryn18Ff2c6GTFbMrnwfiXGKHJSje54ddtvsiExJOu9a6nzj8gFqLs6mRvMSfLcQZRkzWYKoci4fS30hiq2Q+UHE8/Om8IX+SnqV/LgEuhw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vpitech.com; dmarc=pass action=none header.from=vpitech.com; dkim=pass header.d=vpitech.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vpitech.onmicrosoft.com; s=selector2-vpitech-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zMxu75s0OhBb/Yj7WUME2AQQ2gmO12Nyk27SSpLlHuk=; b=c4m+6juiVrsoK/1Bd8kIwsJVqt8uWX/cOKgTxqF7Y7rkQNi4qwB25m1zd2Kc/4FJ3eBSctpwDsPoH+QYv0nJRMlhz5+2zOqrb/3lOSjKPCiFNQ0JTsykTL/Jlav9Ev56MssI+e3kh68tulRdNuAAOryxdKaIoRkSWMiAYWO6bt0= Authentication-Results: vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=none action=none header.from=vpitech.com; Received: from MW2PR07MB3980.namprd07.prod.outlook.com (2603:10b6:907:a::32) by MW2PR07MB4009.namprd07.prod.outlook.com (2603:10b6:907:c::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.18; Tue, 14 Sep 2021 16:15:55 +0000 Received: from MW2PR07MB3980.namprd07.prod.outlook.com ([fe80::cc48:9777:4f07:6014]) by MW2PR07MB3980.namprd07.prod.outlook.com ([fe80::cc48:9777:4f07:6014%4]) with mapi id 15.20.4500.018; Tue, 14 Sep 2021 16:15:54 +0000 From: Alex Henrie To: linux-integrity@vger.kernel.org, ltp@lists.linux.it, zohar@linux.ibm.com, pvorel@suse.cz, alexhenrie24@gmail.com Date: Tue, 14 Sep 2021 10:15:02 -0600 Message-Id: <20210914161503.97495-1-alexh@vpitech.com> X-Mailer: git-send-email 2.33.0 X-ClientProxiedBy: MWHPR11CA0037.namprd11.prod.outlook.com (2603:10b6:300:115::23) To MW2PR07MB3980.namprd07.prod.outlook.com (2603:10b6:907:a::32) MIME-Version: 1.0 Received: from demeter.ad.vpitech.com (66.60.105.30) by MWHPR11CA0037.namprd11.prod.outlook.com (2603:10b6:300:115::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14 via Frontend Transport; Tue, 14 Sep 2021 16:15:54 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 340b01a4-f32c-4223-019a-08d9779aed91 X-MS-TrafficTypeDiagnostic: MW2PR07MB4009: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:962; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW2PR07MB3980.namprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(39830400003)(396003)(376002)(366004)(136003)(66946007)(66556008)(66476007)(186003)(6486002)(1076003)(36756003)(316002)(7696005)(107886003)(83380400001)(26005)(52116002)(478600001)(8676002)(6666004)(8936002)(4326008)(38100700002)(38350700002)(956004)(2616005)(2906002)(5660300002)(86362001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: vpitech.com X-MS-Exchange-CrossTenant-Network-Message-Id: 340b01a4-f32c-4223-019a-08d9779aed91 X-MS-Exchange-CrossTenant-AuthSource: MW2PR07MB3980.namprd07.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Sep 2021 16:15:54.5737 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 130d6264-38b7-4474-a9bf-511ff1224fac X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: IK7Wloix5PtXgTnS5BwFDZHCfLTCvAgxor7uzzQyb7LBYtsOFFMF2Kk++L923TspBf3OmnFGmWV1QQw+Cu/PRg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR07MB4009 X-Virus-Scanned: clamav-milter 0.102.4 at in-3.smtp.seeweb.it X-Virus-Status: Clean X-Spam-Status: No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID, MSGID_FROM_MTA_HEADER,SPF_HELO_PASS,SPF_PASS autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on in-3.smtp.seeweb.it Subject: [LTP] [PATCH ltp v3 1/2] IMA: Move check_policy_writable to ima_setup.sh and rename it X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it Sender: "ltp" Signed-off-by: Alex Henrie --- .../security/integrity/ima/tests/ima_policy.sh | 16 +++------------- .../security/integrity/ima/tests/ima_setup.sh | 10 ++++++++++ 2 files changed, 13 insertions(+), 13 deletions(-) diff --git a/testcases/kernel/security/integrity/ima/tests/ima_policy.sh b/testcases/kernel/security/integrity/ima/tests/ima_policy.sh index 244cf081d..8924549df 100755 --- a/testcases/kernel/security/integrity/ima/tests/ima_policy.sh +++ b/testcases/kernel/security/integrity/ima/tests/ima_policy.sh @@ -11,19 +11,9 @@ TST_CNT=2 . ima_setup.sh -check_policy_writable() -{ - local err="IMA policy already loaded and kernel not configured to enable multiple writes to it (need CONFIG_IMA_WRITE_POLICY=y)" - - [ -f $IMA_POLICY ] || tst_brk TCONF "$err" - # CONFIG_IMA_READ_POLICY - echo "" 2> log > $IMA_POLICY - grep -q "Device or resource busy" log && tst_brk TCONF "$err" -} - setup() { - check_policy_writable + require_policy_writable VALID_POLICY="$TST_DATAROOT/measure.policy" [ -f $VALID_POLICY ] || tst_brk TCONF "missing $VALID_POLICY" @@ -55,7 +45,7 @@ test1() local p1 - check_policy_writable + require_policy_writable load_policy $INVALID_POLICY & p1=$! wait "$p1" if [ $? -ne 0 ]; then @@ -71,7 +61,7 @@ test2() local p1 p2 rc1 rc2 - check_policy_writable + require_policy_writable load_policy $VALID_POLICY & p1=$! load_policy $VALID_POLICY & p2=$! wait "$p1"; rc1=$? diff --git a/testcases/kernel/security/integrity/ima/tests/ima_setup.sh b/testcases/kernel/security/integrity/ima/tests/ima_setup.sh index 565f0bc3e..9c25d634d 100644 --- a/testcases/kernel/security/integrity/ima/tests/ima_setup.sh +++ b/testcases/kernel/security/integrity/ima/tests/ima_setup.sh @@ -73,6 +73,16 @@ require_policy_readable() fi } +require_policy_writable() +{ + local err="IMA policy already loaded and kernel not configured to enable multiple writes to it (need CONFIG_IMA_WRITE_POLICY=y)" + + [ -f $IMA_POLICY ] || tst_brk TCONF "$err" + # CONFIG_IMA_READ_POLICY + echo "" 2> log > $IMA_POLICY + grep -q "Device or resource busy" log && tst_brk TCONF "$err" +} + check_ima_policy_content() { local pattern="$1"