Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1132497imu; Wed, 9 Jan 2019 12:13:48 -0800 (PST) X-Google-Smtp-Source: ALg8bN6xVhDcJ2vu3MMwM+7mBx8rAP/CxKPlzbhQK3RkfU+tbIl8sRSelFVTwz1HBNF7vCyqv6HU X-Received: by 2002:a62:9719:: with SMTP id n25mr7617422pfe.240.1547064828668; Wed, 09 Jan 2019 12:13:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547064828; cv=none; d=google.com; s=arc-20160816; b=RFZXPp+huqtnxiGx0hmX4TTcKx1DYo+k91Fr3LE2AL4Ob/yHAkBrWMOi89ESgRBlHd /gUgS/wfUi48yg5LJXbdopuWH+luRYVyZ3tWao56N9xrkwgYI0p9StVHvfTqnqUQv9Iu dDDOlB4yZvltmdRuvDAL1AHGV25SYZGGQHjgFIQvie5cmeJoeXdEAdhERkUhXhxc7DbA lm6uFWOz48u0Mc0i0Vzn0gPljyTIgyHkp9cNgERdmFBV3Ew4ARbVNdYuS3AUlyvhFAN9 QL27kL6coWs6acMQZhfKnzrQq6SVpV4Gn9edOxMuK3bCMjY6Q+4MSSrm6pLijb9D6ruK 2jGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=NgsrpMq1iDeI3hJ7TEt/FJwt1lwZSo+H4//x+919tx8=; b=hujdIKcIcKvg1xjzqUkvZO0KeSrPu2VQgRStpCEzS6rQwK2T241INiGXzSBKZOHyFI U4KMVBhQ3i76FuGUmZqnIk2TLjyBBGsy0OIyldph22Y4JqeuEu3wTgAwvXbTewCBl/S5 AwyJyx4nxjtaT6gbNMlWzwMfXgO/s3VYtE+dEvvdhHkCXJ+ko6PTaNn6i5+XqLdJJcls ZGbF/FKwsdyn9Ds2hF8XBrLANWAgQJfMOKwt9FRKvUbD7jgi4ezs2qonmFKKiR0ewNUY +zrBEg+nYdjrL0v7R7c58EPkF9fdmrcTxb2tckfil3GqHHAhpKigFDVIoGJt/5FzLWt5 sX9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si9313206plx.159.2019.01.09.12.13.33; Wed, 09 Jan 2019 12:13:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726528AbfAIQtK (ORCPT + 99 others); Wed, 9 Jan 2019 11:49:10 -0500 Received: from mx1.redhat.com ([209.132.183.28]:25685 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725785AbfAIQtK (ORCPT ); Wed, 9 Jan 2019 11:49:10 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A47C59D518; Wed, 9 Jan 2019 16:49:09 +0000 (UTC) Received: from kasong-desktop-nay-redhat-com.nay.redhat.com (unknown [10.66.128.41]) by smtp.corp.redhat.com (Postfix) with ESMTP id 75F3819940; Wed, 9 Jan 2019 16:49:01 +0000 (UTC) From: Kairui Song To: linux-kernel@vger.kernel.org Cc: dhowells@redhat.com, dwmw2@infradead.org, jwboyer@fedoraproject.org, keyrings@vger.kernel.org, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, bauerman@linux.ibm.com, ebiggers@google.com, nayna@linux.ibm.com, dyoung@redhat.com, linux-integrity@vger.kernel.org, kexec@lists.infradead.org, Kairui Song Subject: [RFC PATCH 1/2] integrity, KEYS: add a reference to platform keyring Date: Thu, 10 Jan 2019 00:48:23 +0800 Message-Id: <20190109164824.19708-2-kasong@redhat.com> In-Reply-To: <20190109164824.19708-1-kasong@redhat.com> References: <20190109164824.19708-1-kasong@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Wed, 09 Jan 2019 16:49:10 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently kexec_file_load will verify the kernel image being loaded against .builtin_trusted_keys or .secondary_trusted_keys, but the image could be signed with third part keys which will be provided by platform or firmware and the keys won't be available in keyrings mentioned above. After commit ea93102f3224 ('integrity: Define a trusted platform keyring') a .platform keyring is introduced to store the keys provided by platform or firmware. And with a few following commits, now keys required to verify the image is being imported to .platform keyring, but currently, only IMA-appraisal could use the keyring and verify the image. This patch exposes the .platform and makes other components, like kexec_file_load, could use this .platform keyring to verify the kernel image. Suggested-by: Mimi Zohar Signed-off-by: Kairui Song --- certs/system_keyring.c | 3 +++ include/keys/system_keyring.h | 5 +++++ security/integrity/digsig.c | 4 ++++ 3 files changed, 12 insertions(+) diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 81728717523d..a61b95390b80 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -24,6 +24,9 @@ static struct key *builtin_trusted_keys; #ifdef CONFIG_SECONDARY_TRUSTED_KEYRING static struct key *secondary_trusted_keys; #endif +#ifdef CONFIG_INTEGRITY_PLATFORM_KEYRING +struct key *platform_trusted_keys; +#endif extern __initconst const u8 system_certificate_list[]; extern __initconst const unsigned long system_certificate_list_size; diff --git a/include/keys/system_keyring.h b/include/keys/system_keyring.h index 359c2f936004..9eaf01d01036 100644 --- a/include/keys/system_keyring.h +++ b/include/keys/system_keyring.h @@ -61,5 +61,10 @@ static inline struct key *get_ima_blacklist_keyring(void) } #endif /* CONFIG_IMA_BLACKLIST_KEYRING */ +#ifdef CONFIG_INTEGRITY_PLATFORM_KEYRING + +extern struct key *platform_trusted_keys; + +#endif /* CONFIG_INTEGRITY_PLATFORM_KEYRING */ #endif /* _KEYS_SYSTEM_KEYRING_H */ diff --git a/security/integrity/digsig.c b/security/integrity/digsig.c index f45d6edecf99..26206240388d 100644 --- a/security/integrity/digsig.c +++ b/security/integrity/digsig.c @@ -89,6 +89,10 @@ static int __integrity_init_keyring(const unsigned int id, key_perm_t perm, keyring[id] = NULL; } + if (id == INTEGRITY_KEYRING_PLATFORM) { + platform_trusted_keys = keyring[id]; + } + return err; } -- 2.20.1