Skip to content

Commit 7bae42b

Browse files
robertosassuAlexei Starovoitov
authored andcommitted
selftests/bpf: Check that bpf_kernel_read_file() denies reading IMA policy
Check that bpf_kernel_read_file() denies the reading of an IMA policy, by ensuring that ima_setup.sh exits with an error. Signed-off-by: Roberto Sassu <[email protected]> Signed-off-by: Alexei Starovoitov <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
1 parent e6dcf7b commit 7bae42b

File tree

2 files changed

+35
-0
lines changed

2 files changed

+35
-0
lines changed

tools/testing/selftests/bpf/prog_tests/test_ima.c

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ static void test_init(struct ima__bss *bss)
5959
bss->use_ima_file_hash = false;
6060
bss->enable_bprm_creds_for_exec = false;
6161
bss->enable_kernel_read_file = false;
62+
bss->test_deny = false;
6263
}
6364

6465
void test_test_ima(void)
@@ -200,6 +201,22 @@ void test_test_ima(void)
200201
ASSERT_NEQ(ima_hash_from_bpf[0], 0, "ima_hash");
201202
ASSERT_NEQ(ima_hash_from_bpf[1], 0, "ima_hash");
202203

204+
/*
205+
* Test #6
206+
* - Goal: ensure that the kernel_read_file hook denies an operation
207+
* - Expected result: 0 samples
208+
*/
209+
test_init(skel->bss);
210+
skel->bss->enable_kernel_read_file = true;
211+
skel->bss->test_deny = true;
212+
err = _run_measured_process(measured_dir, &skel->bss->monitored_pid,
213+
"load-policy");
214+
if (CHECK(!err, "run_measured_process #6", "err = %d\n", err))
215+
goto close_clean;
216+
217+
err = ring_buffer__consume(ringbuf);
218+
ASSERT_EQ(err, 0, "num_samples_or_err");
219+
203220
close_clean:
204221
snprintf(cmd, sizeof(cmd), "./ima_setup.sh cleanup %s", measured_dir);
205222
err = system(cmd);

tools/testing/selftests/bpf/progs/ima.c

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ char _license[] SEC("license") = "GPL";
2121
bool use_ima_file_hash;
2222
bool enable_bprm_creds_for_exec;
2323
bool enable_kernel_read_file;
24+
bool test_deny;
2425

2526
static void ima_test_common(struct file *file)
2627
{
@@ -51,6 +52,17 @@ static void ima_test_common(struct file *file)
5152
return;
5253
}
5354

55+
static int ima_test_deny(void)
56+
{
57+
u32 pid;
58+
59+
pid = bpf_get_current_pid_tgid() >> 32;
60+
if (pid == monitored_pid && test_deny)
61+
return -EPERM;
62+
63+
return 0;
64+
}
65+
5466
SEC("lsm.s/bprm_committed_creds")
5567
void BPF_PROG(bprm_committed_creds, struct linux_binprm *bprm)
5668
{
@@ -71,6 +83,8 @@ SEC("lsm.s/kernel_read_file")
7183
int BPF_PROG(kernel_read_file, struct file *file, enum kernel_read_file_id id,
7284
bool contents)
7385
{
86+
int ret;
87+
7488
if (!enable_kernel_read_file)
7589
return 0;
7690

@@ -80,6 +94,10 @@ int BPF_PROG(kernel_read_file, struct file *file, enum kernel_read_file_id id,
8094
if (id != READING_POLICY)
8195
return 0;
8296

97+
ret = ima_test_deny();
98+
if (ret < 0)
99+
return ret;
100+
83101
ima_test_common(file);
84102
return 0;
85103
}

0 commit comments

Comments
 (0)