Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp6561241pxu; Thu, 24 Dec 2020 05:52:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJzHv2qELa+IuhTS0LYxEBaa9jW8fFnzAgmSBCbtviqNVaBlpSy+9BnGJuDBLaaoYVb3Xfmv X-Received: by 2002:a05:6402:1caa:: with SMTP id cz10mr28906510edb.345.1608817924421; Thu, 24 Dec 2020 05:52:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608817924; cv=none; d=google.com; s=arc-20160816; b=xGyyk3P/V+yDWhVbGCndS0jVh/BBS1QScdMcjcesRQ/TaQ+1BtdLApz5adOczhOHLE DYJ7C8gBs9ahUa3b0Kui65OKTrKSwBCPe2rjFPHqieFVJOYQtk0aYMW/ynntkSw8xvve knnOlOQcVBNG4LeEKmuPAoP8sfDbv4vMDNdmeY7A+IxM7MgDeO2sKT+0AL15/MM+e+qL Ff45lAafiWRSjfS7vWsNPMnALo+2rsgAmeMohrS8RGT3Gn/09jVbqyd7T1yLng0fUebn xH+LcQPmkAd3PciAjnRsBA33pgXGQKXRiQmKFweJXiuRYgof0lgPrHjU6fLa6wSplIUl +bbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=4dZpESW1yo/bxUZ9LBeac2NDPktcY5K2DHtnA19QmM8=; b=VPcnkKrHd9Zr7jtOhbtY9FEbZ30evDlanPnT2L3JPr5fi8gD3Hgwo7E6p21GmTxfiD Sdo6q5PdIsQ3iN9Pwdto61R3OZ3Vvm6KSC3Q54Bj6qfBSRrpdgNhpPi4s21VdY0iBEY7 Un+8uRXuf1x82fpOH3I6jI5BCiWyJ8KcDNL4AXHyN7YPB3Tl77Tzy+yLyAS/IgAbr7dp R7oaKa27t5UBGIVHopaCyxEKccfLdD2x0WMEdmXqCdu6E/4LpGXvQCp9gLNLoIPIewdU no+gAuhqp9fcAv+ZpzxR0AbA7CDpLUmnUxGvqKmSdxQYFkq6SNRiC28h6Hu7fBgJT6x5 8LmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=s6Ou5sAh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rh14si9544017ejb.210.2020.12.24.05.51.41; Thu, 24 Dec 2020 05:52:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=s6Ou5sAh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728355AbgLXNtb (ORCPT + 99 others); Thu, 24 Dec 2020 08:49:31 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:14350 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726839AbgLXNtb (ORCPT ); Thu, 24 Dec 2020 08:49:31 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0BODX4n1145025; Thu, 24 Dec 2020 08:48:46 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : subject : from : to : cc : date : in-reply-to : references : content-type : mime-version : content-transfer-encoding; s=pp1; bh=4dZpESW1yo/bxUZ9LBeac2NDPktcY5K2DHtnA19QmM8=; b=s6Ou5sAhRyTMC1h2M9Dhu5NnXKVrCAQm0sXW7duUXTOkPeov5C1XcZlyi70hrubuyeq5 EAh8VeVusAAGYnBJfP4Tyj0Yb+lowjeAzC4EIH53Aa4CCLdq5j01ofS/pXby4kOp9evG /D55/qxVprAdrmowcMm/bU6ffwiZVj/sliZGDstkdyVEpqvigD7qovbrtcBu5yQdWwU/ Sr6Ptb4YuUVeXkmZNINMWGuX4AJlmsT3Zt9dGKdWmV99ic4/dVRq/upsGuwBwMjpfJhC IExb1+aaYaqu1fefIbyhKj2LYyDXToeCfl2VLK/Z7vnoBJVAfTuAfpAGkUfEwIID5g+e BQ== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 35mu1a9gr1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 24 Dec 2020 08:48:45 -0500 Received: from m0098394.ppops.net (m0098394.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 0BODkAUt010614; Thu, 24 Dec 2020 08:48:45 -0500 Received: from ppma03ams.nl.ibm.com (62.31.33a9.ip4.static.sl-reverse.com [169.51.49.98]) by mx0a-001b2d01.pphosted.com with ESMTP id 35mu1a9gq0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 24 Dec 2020 08:48:44 -0500 Received: from pps.filterd (ppma03ams.nl.ibm.com [127.0.0.1]) by ppma03ams.nl.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 0BODhWx3003445; Thu, 24 Dec 2020 13:48:42 GMT Received: from b06avi18626390.portsmouth.uk.ibm.com (b06avi18626390.portsmouth.uk.ibm.com [9.149.26.192]) by ppma03ams.nl.ibm.com with ESMTP id 35k906tajv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 24 Dec 2020 13:48:42 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06avi18626390.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 0BODmdWf12583212 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 24 Dec 2020 13:48:39 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 45332A4065; Thu, 24 Dec 2020 13:48:40 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A7BD6A4066; Thu, 24 Dec 2020 13:48:36 +0000 (GMT) Received: from li-f45666cc-3089-11b2-a85c-c57d1a57929f.ibm.com (unknown [9.160.1.132]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 24 Dec 2020 13:48:36 +0000 (GMT) Message-ID: <2e0baa1902b6f360e542f92906d077d44e53e59e.camel@linux.ibm.com> Subject: Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data From: Mimi Zohar To: Tushar Sugandhi , stephen.smalley.work@gmail.com, casey@schaufler-ca.com, agk@redhat.com, snitzer@redhat.com, gmazyland@gmail.com, paul@paul-moore.com Cc: tyhicks@linux.microsoft.com, sashal@kernel.org, jmorris@namei.org, nramas@linux.microsoft.com, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, dm-devel@redhat.com Date: Thu, 24 Dec 2020 08:48:35 -0500 In-Reply-To: <20201212180251.9943-5-tusharsu@linux.microsoft.com> References: <20201212180251.9943-1-tusharsu@linux.microsoft.com> <20201212180251.9943-5-tusharsu@linux.microsoft.com> Content-Type: text/plain; charset="ISO-8859-15" X-Mailer: Evolution 3.28.5 (3.28.5-12.el8) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.343,18.0.737 definitions=2020-12-24_08:2020-12-24,2020-12-24 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 mlxlogscore=999 malwarescore=0 spamscore=0 phishscore=0 clxscore=1015 suspectscore=0 adultscore=0 impostorscore=0 lowpriorityscore=0 mlxscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2012240085 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Tushar, Please update the Subject line as, "Add policy rule support for measuring critical data". On Sat, 2020-12-12 at 10:02 -0800, Tushar Sugandhi wrote: > A new IMA policy rule is needed for the IMA hook > ima_measure_critical_data() and the corresponding func CRITICAL_DATA for > measuring the input buffer. The policy rule should ensure the buffer > would get measured only when the policy rule allows the action. The > policy rule should also support the necessary constraints (flags etc.) > for integrity critical buffer data measurements. > > Add a policy rule to define the constraints for restricting integrity > critical data measurements. > > Signed-off-by: Tushar Sugandhi This patch does not restrict measuring critical data, but adds policy rule support for measuring critical data. please update the patch description accordingly. Other than that, Reviewed-by: Mimi Zohar