@@ -19,9 +19,7 @@ test1()
tst_res TINFO "verifying key measurement for keyrings and templates specified in IMA policy file"
- [ -f $IMA_POLICY ] || tst_brk TCONF "missing $IMA_POLICY"
-
- [ -r $IMA_POLICY ] || tst_brk TCONF "cannot read IMA policy (CONFIG_IMA_READ_POLICY=y required)"
+ check_policy_readable
keycheck_lines=$(grep "func=KEY_CHECK" $IMA_POLICY)
if [ -z "$keycheck_lines" ]; then
@@ -111,6 +111,14 @@ print_ima_config()
tst_res TINFO "/proc/cmdline: $(cat /proc/cmdline)"
}
+check_policy_readable()
+{
+ [ -f $IMA_POLICY ] || tst_brk TCONF "missing $IMA_POLICY"
+
+ cat $IMA_POLICY > /dev/null 2>/dev/null || \
+ tst_brk TCONF "cannot read IMA policy (CONFIG_IMA_READ_POLICY=y required)"
+}
+
ima_setup()
{
SECURITYFS="$(mount_helper securityfs $SYSFS/kernel/security)"
Check with cat, because file attributes were fixed in ffb122de9a60 ("ima: Reflect correct permissions for policy") in v4.18. Added into ima_setup.sh as it'll be used next commit in another test. Fixes: d2768c84e ("IMA: Add a test to verify measurement of keys") Signed-off-by: Petr Vorel <pvorel@suse.cz> --- testcases/kernel/security/integrity/ima/tests/ima_keys.sh | 4 +--- .../kernel/security/integrity/ima/tests/ima_setup.sh | 8 ++++++++ 2 files changed, 9 insertions(+), 3 deletions(-)