Linux Integrity Measurement development
 help / color / mirror / Atom feed
* [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
@ 2025-02-03 21:02 Petr Vorel
  2025-02-03 23:48 ` Mimi Zohar
  0 siblings, 1 reply; 3+ messages in thread
From: Petr Vorel @ 2025-02-03 21:02 UTC (permalink / raw)
  To: ltp; +Cc: Petr Vorel, Mimi Zohar, linux-integrity

add func=FILE_CHECK to dont_measure tmpfs

Similarly to tcb.policy limit dont_measure tmpfs policy to func=FILE_CHECK.
This allows to do extra measurements, e.g. kexec boot command line, see
kernel commit

7eef7c8bac9a ("ima: limit the builtin 'tcb' dont_measure tmpfs policy rule")

Also remove leading 0 from tmpfs magic (to match IMA docs and tcb.policy).

Suggested-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
 .../security/integrity/ima/datafiles/ima_policy/measure.policy  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
index 9976ddf2de..8abd05fb1a 100644
--- a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
+++ b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
@@ -8,7 +8,7 @@ dont_measure fsmagic=0x62656572
 # DEBUGFS_MAGIC
 dont_measure fsmagic=0x64626720
 # TMPFS_MAGIC
-dont_measure fsmagic=0x01021994
+dont_measure fsmagic=0x1021994 func=FILE_CHECK
 # SECURITYFS_MAGIC
 dont_measure fsmagic=0x73636673
 measure func=FILE_MMAP mask=MAY_EXEC
-- 
2.47.2


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
  2025-02-03 21:02 [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK Petr Vorel
@ 2025-02-03 23:48 ` Mimi Zohar
  2025-02-04 11:25   ` Petr Vorel
  0 siblings, 1 reply; 3+ messages in thread
From: Mimi Zohar @ 2025-02-03 23:48 UTC (permalink / raw)
  To: Petr Vorel, ltp; +Cc: linux-integrity

On Mon, 2025-02-03 at 22:02 +0100, Petr Vorel wrote:
> add func=FILE_CHECK to dont_measure tmpfs
> 
> Similarly to tcb.policy limit dont_measure tmpfs policy to func=FILE_CHECK.
> This allows to do extra measurements, e.g. kexec boot command line, see
> kernel commit
> 
> 7eef7c8bac9a ("ima: limit the builtin 'tcb' dont_measure tmpfs policy rule")
> 
> Also remove leading 0 from tmpfs magic (to match IMA docs and tcb.policy).
> 
> Suggested-by: Mimi Zohar <zohar@linux.ibm.com>
> Signed-off-by: Petr Vorel <pvorel@suse.cz>

Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>

> ---
>  .../security/integrity/ima/datafiles/ima_policy/measure.policy  | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git
> a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> index 9976ddf2de..8abd05fb1a 100644
> --- a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> +++ b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> @@ -8,7 +8,7 @@ dont_measure fsmagic=0x62656572
>  # DEBUGFS_MAGIC
>  dont_measure fsmagic=0x64626720
>  # TMPFS_MAGIC
> -dont_measure fsmagic=0x01021994
> +dont_measure fsmagic=0x1021994 func=FILE_CHECK
>  # SECURITYFS_MAGIC
>  dont_measure fsmagic=0x73636673
>  measure func=FILE_MMAP mask=MAY_EXEC


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
  2025-02-03 23:48 ` Mimi Zohar
@ 2025-02-04 11:25   ` Petr Vorel
  0 siblings, 0 replies; 3+ messages in thread
From: Petr Vorel @ 2025-02-04 11:25 UTC (permalink / raw)
  To: Mimi Zohar; +Cc: ltp, linux-integrity

Hi Mimi,

> On Mon, 2025-02-03 at 22:02 +0100, Petr Vorel wrote:
> > add func=FILE_CHECK to dont_measure tmpfs

> > Similarly to tcb.policy limit dont_measure tmpfs policy to func=FILE_CHECK.
> > This allows to do extra measurements, e.g. kexec boot command line, see
> > kernel commit

> > 7eef7c8bac9a ("ima: limit the builtin 'tcb' dont_measure tmpfs policy rule")

> > Also remove leading 0 from tmpfs magic (to match IMA docs and tcb.policy).

> > Suggested-by: Mimi Zohar <zohar@linux.ibm.com>
> > Signed-off-by: Petr Vorel <pvorel@suse.cz>

> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>

Thanks, also this one merged.

Kind regards,
Petr

> > ---
> >  .../security/integrity/ima/datafiles/ima_policy/measure.policy  | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)

> > diff --git
> > a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> > b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> > index 9976ddf2de..8abd05fb1a 100644
> > --- a/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> > +++ b/testcases/kernel/security/integrity/ima/datafiles/ima_policy/measure.policy
> > @@ -8,7 +8,7 @@ dont_measure fsmagic=0x62656572
> >  # DEBUGFS_MAGIC
> >  dont_measure fsmagic=0x64626720
> >  # TMPFS_MAGIC
> > -dont_measure fsmagic=0x01021994
> > +dont_measure fsmagic=0x1021994 func=FILE_CHECK
> >  # SECURITYFS_MAGIC
> >  dont_measure fsmagic=0x73636673
> >  measure func=FILE_MMAP mask=MAY_EXEC


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2025-02-04 11:25 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-03 21:02 [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK Petr Vorel
2025-02-03 23:48 ` Mimi Zohar
2025-02-04 11:25   ` Petr Vorel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox