Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp4987679ybc; Tue, 26 Nov 2019 18:54:41 -0800 (PST) X-Google-Smtp-Source: APXvYqzk1DJkpPuRJ4hatcJy/KI/3KMZ0B0elkSF2NUSp+UOIOxDO1SrV0zLjnW37APbODQYoJHF X-Received: by 2002:a17:906:eda9:: with SMTP id sa9mr3445989ejb.297.1574823281762; Tue, 26 Nov 2019 18:54:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574823281; cv=none; d=google.com; s=arc-20160816; b=nN7gjzhlXgRsxeSMWIocx5C65RFLzub8SKYHkMKKw7WP+rDGELdEegSx6vxkvh5+0u 43vuwlbGvtbymhJpwuCNNRNal2YE/5XOO46KN/EJLF+34gIvIm0Jbs7WZpO3ygAaDmmS D2rQdHjrxE0aJIfJGLM9esln+yaTiGUx2dBYoDrC0iwbBEjck6ttsu2XkcqjYa3zKNgh Sd1bksUo9se4R1LxPRaJxQkwqO470APk5tmqHDtoWNBPwYbOL60em6QQ7JurNO40UIC7 L022U0gS1xTCQLx1FdAM9F+AE1NjsteuI0WyIEXNpj1uantEzn6z9VuW9q34t6/m956s XMFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:dkim-filter; bh=NY73Sctw/JXdsrtDWDQpiJ3oE1L+m9cg6g8/RdNnFLI=; b=aFfq+zjvQroSh9koPt+KdAuzCqyqV4Rt/p1bxyHeZxhX+UNSQV4x2spO+WruOFSNp4 60ofLTYqaQfE6RxEEGNkc64faFe/tHJfuZ6fzrphZDQr3+kqcjt5p9/8X8HDvukP7wNj nwX3N/5WRLFGrG/vhxJKz2jscNNHbmTEJegnVeVzqhBm9BJV4FUj7HAfA7/veu7VkZG7 5k674vP5ABx5v4LHmA39Ug5dhbGuEcHo730U59VBDkk0lx3bGNpDgt1LLKUqUUMPvZ+2 C4fpe+oHVPfYqWeFRWWo7YTy64fWyplD/tSJEYGbd6WuODXzD0UZJaQbnGZT7qD1KoEW VEow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Z62o4O2b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r18si8849621edw.65.2019.11.26.18.54.17; Tue, 26 Nov 2019 18:54:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Z62o4O2b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726947AbfK0CwT (ORCPT + 99 others); Tue, 26 Nov 2019 21:52:19 -0500 Received: from linux.microsoft.com ([13.77.154.182]:46244 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726539AbfK0CwT (ORCPT ); Tue, 26 Nov 2019 21:52:19 -0500 Received: from nramas-ThinkStation-P520.corp.microsoft.com (unknown [131.107.174.108]) by linux.microsoft.com (Postfix) with ESMTPSA id 68EE420B4900; Tue, 26 Nov 2019 18:52:18 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 68EE420B4900 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1574823138; bh=NY73Sctw/JXdsrtDWDQpiJ3oE1L+m9cg6g8/RdNnFLI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z62o4O2bb1Xid4vMBSOhc4wZmH6iMsOJWLXjWNW+hjgkazS8wOPG5oEzH0/hAVQCb 06w1HzoD8BDDjWuV89/ChVOqsPmCg5J6J7Ri3MNEThErpwDVjV8+7LyLfUkBN9SxH2 +Zzg3/bOkxbvcm+N+7SWkI4RSc9D6A4BKWZqU/lY= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, linux-integrity@vger.kernel.org Cc: eric.snowberg@oracle.com, dhowells@redhat.com, matthewgarrett@google.com, sashal@kernel.org, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org Subject: [PATCH v0 2/2] IMA: Call queue functions to measure keys Date: Tue, 26 Nov 2019 18:52:12 -0800 Message-Id: <20191127025212.3077-3-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20191127025212.3077-1-nramas@linux.microsoft.com> References: <20191127025212.3077-1-nramas@linux.microsoft.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Keys should be queued for measurement if custom IMA policies have not yet been applied. Keys queued for measurement, if any, need to be processed when custom IMA policies have been applied. This patch adds the call to ima_queue_key_for_measurement() in the IMA hook function if ima_process_keys_for_measurement flag is set to false. And, the call to ima_process_queued_keys_for_measurement() when custom IMA policies have been applied in ima_update_policy(). NOTE: If the kernel is built with CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled then the IMA policy should be applied as custom IMA policies. Keys will be queued up until custom policies are applied and processed when custom policies have been applied. Signed-off-by: Lakshmi Ramasubramanian --- security/integrity/ima/ima_asymmetric_keys.c | 16 ++++++++++++++++ security/integrity/ima/ima_policy.c | 12 ++++++++++++ 2 files changed, 28 insertions(+) diff --git a/security/integrity/ima/ima_asymmetric_keys.c b/security/integrity/ima/ima_asymmetric_keys.c index 10deb77b22a0..adb7a307190f 100644 --- a/security/integrity/ima/ima_asymmetric_keys.c +++ b/security/integrity/ima/ima_asymmetric_keys.c @@ -157,6 +157,8 @@ void ima_post_key_create_or_update(struct key *keyring, struct key *key, const void *payload, size_t payload_len, unsigned long flags, bool create) { + bool key_queued = false; + /* Only asymmetric keys are handled by this hook. */ if (key->type != &key_type_asymmetric) return; @@ -164,6 +166,20 @@ void ima_post_key_create_or_update(struct key *keyring, struct key *key, if (!payload || (payload_len == 0)) return; + if (!ima_process_keys_for_measurement) + key_queued = ima_queue_key_for_measurement(keyring, + payload, + payload_len); + + /* + * Need to check again if the key was queued or not because + * ima_process_keys_for_measurement could have flipped from + * false to true after it was checked above, but before the key + * could be queued by ima_queue_key_for_measurement(). + */ + if (key_queued) + return; + /* * keyring->description points to the name of the keyring * (such as ".builtin_trusted_keys", ".ima", etc.) to diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c index 78b25f083fe1..a2e30a90f97d 100644 --- a/security/integrity/ima/ima_policy.c +++ b/security/integrity/ima/ima_policy.c @@ -812,6 +812,18 @@ void ima_update_policy(void) kfree(arch_policy_entry); } ima_update_policy_flag(); + + /* + * Custom IMA policies have been setup. + * Process key(s) queued up for measurement now. + * + * NOTE: + * Custom IMA policies always overwrite builtin policies + * (policies compiled in code). If one wants measurement + * of asymmetric keys then it has to be configured in + * custom policies and updated here. + */ + ima_process_queued_keys_for_measurement(); } /* Keep the enumeration in sync with the policy_tokens! */ -- 2.17.1