Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp178488ybl; Thu, 5 Dec 2019 17:30:35 -0800 (PST) X-Google-Smtp-Source: APXvYqxY2G0qoBr4vYnAVSp043wvPq3sEvY1DL2Tqve4tYTyHlFVOU2Ss3iqBEx22ewga92uOsl+ X-Received: by 2002:aca:fdc2:: with SMTP id b185mr9247540oii.74.1575595835756; Thu, 05 Dec 2019 17:30:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575595835; cv=none; d=google.com; s=arc-20160816; b=bKQyty11IFnIJ09qkr7THmqacvQBWQ4IlYVE1GBe4zx/4o0PQrX8KnqII4oPoi25fe ygUw982ocmmMlfi5Bm11qF89NI8BAgQ1ai8YE73b0YRzdabK49ohk8XYtTQXkcUhBimV QukYiJtjTATzMaK46eohdGn2Mzdr7BgSXxvV5KjkiT11/P7r/DgiAlA4XKU3vBPPf7k9 ISwHJyFgm4hotSs1PZS3r/rrFK2LnEky1d4prgRgG5YZyD+hR+C+PdwdaKWf0Rg7IR93 v7lHAOqlym0JzkcjGW/WzTIr5mhRHkULHwjXP+vORZsZvTesA1AWuX2VFUq6SDuVMcI/ Xt4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=KYKqmpyu2/KqQw/Kgh5Hw9D6cv4w2gT1WEMOUZ51dOU=; b=aoEWJNLo25Xe7hb10gCnwFwR1UFmgY7+FVksQ6Nl/ex+9eT2UxOST+Xlh0y6fflMCN Z+jxutdwuhrAGYavP99SXgDSio689sWmjkey3VeHycWUOoysk2nmcv/yrnSV682rdBGf 4wqfeXJl8G3YNRMF9S9QgopZIElWVtxZWTTR/828h5ZlLc5GZLd2FyeWWjqPHwfTcdcY JEt4lXJq00Su1SZR5/EYkAarqA8pyU8Dy/uwX/5yQtQItfITtkdp1U5HIGs8IpswxP00 Kt3FA8/SWcNwYH1PP6vunuqMI9ca6H+xTYbc4RVIglsQxrZOa+6UGk6bSP116GqJ4hOt 3sag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Fc8OwaK3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w24si6102795oic.260.2019.12.05.17.30.09; Thu, 05 Dec 2019 17:30:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Fc8OwaK3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726171AbfLFB3n (ORCPT + 99 others); Thu, 5 Dec 2019 20:29:43 -0500 Received: from linux.microsoft.com ([13.77.154.182]:47348 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725959AbfLFB3m (ORCPT ); Thu, 5 Dec 2019 20:29:42 -0500 Received: from nramas-ThinkStation-P520.corp.microsoft.com (unknown [131.107.174.108]) by linux.microsoft.com (Postfix) with ESMTPSA id EE1F82010BBB; Thu, 5 Dec 2019 17:29:41 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com EE1F82010BBB DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1575595782; bh=KYKqmpyu2/KqQw/Kgh5Hw9D6cv4w2gT1WEMOUZ51dOU=; h=From:To:Cc:Subject:Date:From; b=Fc8OwaK3Uno1CtieRVB5j2+9/MR0KfBD4iqD6bdydfWV/06dTYbAc326ZmZNyCZ+P HcjAxnPxr5RQNMuaI4YZxAttMv+WHChxbziMLS4o6DCd1lWdAPCPIVmIZE2vvMv51m J1LE/HZBwRrty/aOxKrOlHHfaoALuSF+cPzqE+LM= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, linux-integrity@vger.kernel.org Cc: eric.snowberg@oracle.com, dhowells@redhat.com, mathew.j.martineau@linux.intel.com, matthewgarrett@google.com, sashal@kernel.org, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org Subject: [PATCH v1 0/2] IMA: Deferred measurement of keys Date: Thu, 5 Dec 2019 17:29:34 -0800 Message-Id: <20191206012936.2814-1-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset extends the previous version[1] by adding support for deferred processing of keys. With the patchset referenced above, the IMA subsystem supports measuring asymmetric keys when the key is created or updated. But keys created or updated before a custom IMA policy is loaded are currently not measured. This includes keys added to, for instance, .builtin_trusted_keys which happens early in the boot process. This change adds support for queuing keys created or updated before a custom IMA policy is loaded. The queued keys are processed when a custom policy is loaded. Keys created or updated after a custom policy is loaded are measured immediately (not queued). If the kernel is built with both CONFIG_IMA and CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled then the IMA policy must be applied as a custom policy. Not providing a custom policy in the above configuration would result in asymmeteric keys being queued until a custom policy is loaded. This is by design. [1] https://lore.kernel.org/linux-integrity/20191204224131.3384-1-nramas@linux.microsoft.com/ Testing performed: * Booted the kernel with this change. * Added .builtin_trusted_keys in "keyrings=" option in the IMA policy and verified the keys added to this keyring are measured. * Specified only func=KEY_CHECK and not "keyrings=" option, and verified the keys added to builtin_trusted_keys keyring are processed. * Added keys at runtime and verified they are measured if the IMA policy permitted. => For example, added keys to .ima keyring and verified. Changelog: v1 => Code cleanup v0 => Based changes on v5.4-rc8 => The following patchsets should be applied in that order https://lore.kernel.org/linux-integrity/1572492694-6520-1-git-send-email-zohar@linux.ibm.com https://lore.kernel.org/linux-integrity/20191204224131.3384-1-nramas@linux.microsoft.com/ => Added functions to queue and dequeue keys, and process the queued keys when custom IMA policies are applied. Lakshmi Ramasubramanian (2): IMA: Define workqueue for early boot "key" measurements IMA: Call workqueue functions to measure queued keys security/integrity/ima/ima.h | 15 +++ security/integrity/ima/ima_asymmetric_keys.c | 134 +++++++++++++++++++ security/integrity/ima/ima_policy.c | 6 + 3 files changed, 155 insertions(+) -- 2.17.1