Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1086580ybl; Fri, 13 Dec 2019 09:19:29 -0800 (PST) X-Google-Smtp-Source: APXvYqyuLm7L49QT7/E48Qs2j+8111oUay2+4m8mmSpiR5dG2thiV7U9rSfHi2gdM9sCnGrcw3D6 X-Received: by 2002:a05:6830:2141:: with SMTP id r1mr14846094otd.124.1576257569317; Fri, 13 Dec 2019 09:19:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576257569; cv=none; d=google.com; s=arc-20160816; b=y872ILr5ZnaLTqpj6HrO/w9UGKlLJfxo2lT/cJuYlWkmc02gG4Nss65KZlAe6vfUBB dd+3Uo6xANvmOyltNAZL1iWCu9Mh45k2uF+OuOyE+eYNQ5VAIdkC0ihopkiSpJ3SQeyi AXW4sqb5vFSw/Bv2C1AheL6qqIpgvkGbubGV/7WeGdJZmAo/YiHEuuvSM6ykpY5Valew IPTGfBtPhlOT1Ae1bkpbso8rsuaQaBLHM9U/n/tZwvPtDc7krn9ApZv3eLfaJgGTP74G 6yRdYVEFK2pUWNQQBKvj0A+vLN0B4MTGco8PXnIdwTfClQm/d5DRH6g9H3JpIkhVjgr5 UrjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=HUR/7PIaBPEifHrzxR+iFv6S9OSSul8DqgbDSwazjJc=; b=o/odqWhbjwbVk8lTV6kHeKwqwn5akY80DLDjpN6Sf/tKr0Q+XrTqiW/utdX4KJznct ePCTFkOTc9RIjlPK9u1tFZVRzeUBec/NFtS5e0Di9y0JwMS9V6u9VbZPtls6GNw/gp4h F05WLO5rwVqL1NgWLsJBs5AE85OnD3UlZ0TelkrpDpZ5kV3XKcvIITHVKWjTsmMGFN+r Q3GJpD5lnJYSLkBJ9DQ/KEF1CH2BxXcgfrUiBPPvPkIsxLqabyS3bZSVgwbxUeuiL1eU UGniwhOapCrAiZFTXzUcVoO++EduDzPbI0+dluD3Hy/EqZnqnQ38lNsExaH95a+w+6mK 1v3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=CPSsmHNV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9si5291232otp.111.2019.12.13.09.19.17; Fri, 13 Dec 2019 09:19:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=CPSsmHNV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728478AbfLMRSf (ORCPT + 99 others); Fri, 13 Dec 2019 12:18:35 -0500 Received: from linux.microsoft.com ([13.77.154.182]:35396 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728406AbfLMRSe (ORCPT ); Fri, 13 Dec 2019 12:18:34 -0500 Received: from nramas-ThinkStation-P520.corp.microsoft.com (unknown [131.107.174.108]) by linux.microsoft.com (Postfix) with ESMTPSA id 60C0C20B7189; Fri, 13 Dec 2019 09:18:33 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 60C0C20B7189 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1576257513; bh=HUR/7PIaBPEifHrzxR+iFv6S9OSSul8DqgbDSwazjJc=; h=From:To:Cc:Subject:Date:From; b=CPSsmHNV+rTClvxrnjSWPSbuViuYkM9SA3ik3FbVEUoR6PSBOGgFcfQEtLdJxssBP PQuZVrUoK93I9vNCqbpXe7nduyEh59KMKMcZo6LIumR4Y09LBNxo5BmKdIpqjPgi4n QvfMEPnphyYFNJ/GebLgdlWXaL8fdorqoBMZ89HU= From: Lakshmi Ramasubramanian To: zohar@linux.ibm.com, linux-integrity@vger.kernel.org Cc: eric.snowberg@oracle.com, dhowells@redhat.com, mathew.j.martineau@linux.intel.com, matthewgarrett@google.com, sashal@kernel.org, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org Subject: [PATCH v4 0/2] IMA: Deferred measurement of keys Date: Fri, 13 Dec 2019 09:18:25 -0800 Message-Id: <20191213171827.28657-1-nramas@linux.microsoft.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset extends the previous version[1] by adding support for deferred processing of keys. With the patchset referenced above, the IMA subsystem supports measuring asymmetric keys when the key is created or updated. But keys created or updated before a custom IMA policy is loaded are currently not measured. This includes keys added to, for instance, .builtin_trusted_keys which happens early in the boot process. This change adds support for queuing keys created or updated before a custom IMA policy is loaded. The queued keys are processed when a custom policy is loaded. Keys created or updated after a custom policy is loaded are measured immediately (not queued). If the kernel is built with both CONFIG_IMA and CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE enabled then the IMA policy must be applied as a custom policy. Not providing a custom policy in the above configuration would result in asymmeteric keys being queued until a custom policy is loaded. This is by design. [1] https://lore.kernel.org/linux-integrity/20191211164707.4698-1-nramas@linux.microsoft.com/ Testing performed: * Booted the kernel with this change. * Added .builtin_trusted_keys in "keyrings=" option in the IMA policy and verified the keys added to this keyring are measured. * Specified only func=KEY_CHECK and not "keyrings=" option, and verified the keys added to builtin_trusted_keys keyring are processed. * Added keys at runtime and verified they are measured if the IMA policy permitted. => For example, added keys to .ima keyring and verified. Changelog: v4 => Check and set ima_process_keys flag with mutex held. v3 => Defined ima_process_keys flag to be static. => Set ima_process_keys with ima_keys_mutex held. => Added a comment in ima_process_queued_keys() function to state the use of temporary list for keys. v2 => Rebased the changes to v5.5-rc1 => Updated function names, variable names, and code comments to be less verbose. v1 => Code cleanup v0 => Based changes on v5.4-rc8 => The following patchsets should be applied in that order https://lore.kernel.org/linux-integrity/1572492694-6520-1-git-send-email-zohar@linux.ibm.com https://lore.kernel.org/linux-integrity/20191204224131.3384-1-nramas@linux.microsoft.com/ => Added functions to queue and dequeue keys, and process the queued keys when custom IMA policies are applied. Lakshmi Ramasubramanian (2): IMA: Define workqueue for early boot key measurements IMA: Call workqueue functions to measure queued keys security/integrity/ima/ima.h | 15 ++ security/integrity/ima/ima_asymmetric_keys.c | 136 +++++++++++++++++++ security/integrity/ima/ima_policy.c | 3 + 3 files changed, 154 insertions(+) -- 2.17.1