Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3758363ybb; Mon, 6 Apr 2020 15:17:36 -0700 (PDT) X-Google-Smtp-Source: APiQypLMhEdA8P+wJZoROpU+PrQCJlvY8tMucbwnYwPld6Jm68wwprmH1DsVJrLJZ/6U/B8+L81p X-Received: by 2002:a05:6830:8d:: with SMTP id a13mr19548523oto.321.1586211456500; Mon, 06 Apr 2020 15:17:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586211456; cv=none; d=google.com; s=arc-20160816; b=jiCe73DBrRjJdRbRrzOipTVVA64F2W+QgN+8K2igc5qORJPonmBBYMADbMtRdwtYc2 dUtiLFyTIQHR1IIzJcj7o+n67CXHKBQZJhc6FQm0bt7uhq4fdV3fSMPyZwVUeD3H7eU2 NVeHA0vH2qOia5vNZoV1KKqnZcj7yHrjmNlXrOtQK/0IoxPRxuoec+eC2GKccbOS42P0 MtLluGKItsb4iZMdP3pzQBQUVM5hG3ze52FiMvK5ifcqFyqrT4OUGb9p/Mv1w5AmOCHD 5iQV3XeuyKU9WHbt7N4d8R73hoh6fpydKj/CVMYNkiKICLousYYY3rTIfZf81vVSARWv v3sQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=P9n7+UpIgC9iVSLYj1Fo2stDBpEmg08YMF+B1Mh0GN4=; b=0FJsIOcTVsTE0jPO96pOr98C4zL5P4iPQLSTBzXL1jeohHfhcOfQon3xR2tXWFSxJf 9bn1++/YkYMPFHA/gRlA8m5MVFffqBGcgTBgZ60o+fgOasyZNUMlAbIppvDEm/k88wXP MSOKBkfbz+EY2hZka6vfANR/O4QiYDNbklVq26/9e6uqxlNMYeEQLHtzNAuR3X0D0FrZ OkhYoDS+Z5BQJoSgKTohgBHJ+IaD8L9BahlhIWkmUTrQRJ/1KjqKFXDlrMyZzLHBPtvC 8wsU6eJd4wiII1JSpIngYiYpPSc6Lpm3jDg3l8YYkql4vuBI21dmXaEsM3PcUUeBD7Pw dNUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Deu0PwPH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t5si378700otl.193.2020.04.06.15.17.24; Mon, 06 Apr 2020 15:17:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=Deu0PwPH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726794AbgDFWPi (ORCPT + 99 others); Mon, 6 Apr 2020 18:15:38 -0400 Received: from linux.microsoft.com ([13.77.154.182]:58668 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726469AbgDFWOv (ORCPT ); Mon, 6 Apr 2020 18:14:51 -0400 Received: from dede-linux.corp.microsoft.com (unknown [131.107.147.242]) by linux.microsoft.com (Postfix) with ESMTPSA id 79407207295A; Mon, 6 Apr 2020 15:14:48 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 79407207295A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1586211288; bh=P9n7+UpIgC9iVSLYj1Fo2stDBpEmg08YMF+B1Mh0GN4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Deu0PwPHddfQ+lRzrHWtTITvkreSo/ck6ta8aRKxavzg7mCNiBAPVvZR9cauFTnhy eb/FrsIO/9hXaRBAVggOtrlL3C9MnNmfCpuC9cQiuR8SuGbR/QVkzB9V8HjdK1bzlc EMPRdBFQglYamLOLLCviP2cL/0uTcBg0QzQgUWQs= From: deven.desai@linux.microsoft.com To: agk@redhat.com, axboe@kernel.dk, snitzer@redhat.com, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, dm-devel@redhat.com, linux-block@vger.kernel.org Cc: tyhicks@linux.microsoft.com, pasha.tatashin@soleen.com, sashal@kernel.org, jaskarankhurana@linux.microsoft.com, nramas@linux.microsoft.com, mdsakib@linux.microsoft.com, linux-kernel@vger.kernel.org Subject: [RFC PATCH v2 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature Date: Mon, 6 Apr 2020 15:14:34 -0700 Message-Id: <20200406221439.1469862-8-deven.desai@linux.microsoft.com> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200406221439.1469862-1-deven.desai@linux.microsoft.com> References: <20200406221439.1469862-1-deven.desai@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Deven Bowers Add a security hook call to set a security property of a block_device in dm-verity with the results of a verified, signed root-hash. Signed-off-by: Deven Bowers --- drivers/md/dm-verity-verify-sig.c | 7 +++++++ include/linux/device-mapper.h | 2 ++ 2 files changed, 9 insertions(+) diff --git a/drivers/md/dm-verity-verify-sig.c b/drivers/md/dm-verity-verify-sig.c index 27dac8aa2e5a..242e2421d3c8 100644 --- a/drivers/md/dm-verity-verify-sig.c +++ b/drivers/md/dm-verity-verify-sig.c @@ -8,7 +8,10 @@ #include #include #include +#include +#include #include +#include "dm-core.h" #include "dm-verity.h" #include "dm-verity-verify-sig.h" @@ -182,6 +185,10 @@ int verity_verify_root_hash(const struct dm_verity *v) goto cleanup; sig_target->passed = true; + + ret = security_bdev_setsecurity(dm_table_get_md(v->ti->table)->bdev, + DM_VERITY_SIGNATURE_SEC_NAME, + v->sig->sig, v->sig->sig_size); cleanup: kfree(root_hash); return ret; diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h index 475668c69dbc..6bd49aa48186 100644 --- a/include/linux/device-mapper.h +++ b/include/linux/device-mapper.h @@ -624,4 +624,6 @@ static inline unsigned long to_bytes(sector_t n) return (n << SECTOR_SHIFT); } +#define DM_VERITY_SIGNATURE_SEC_NAME DM_NAME ".verity-sig" + #endif /* _LINUX_DEVICE_MAPPER_H */ -- 2.26.0