Skip to content

Commit

Permalink
integrity: Only use machine keyring when uefi_check_trust_mok_keys is…
Browse files Browse the repository at this point in the history
… true

With the introduction of uefi_check_trust_mok_keys, it signifies the end-
user wants to trust the machine keyring as trusted keys.  If they have
chosen to trust the machine keyring, load the qualifying keys into it
during boot, then link it to the secondary keyring .  If the user has not
chosen to trust the machine keyring, it will be empty and not linked to
the secondary keyring.

Signed-off-by: Eric Snowberg <[email protected]>
Reviewed-by: Jarkko Sakkinen <[email protected]>
Signed-off-by: Jarkko Sakkinen <[email protected]>
  • Loading branch information
esnowberg authored and jarkkojs committed Mar 8, 2022
1 parent 74f5e30 commit 3d6ae1a
Show file tree
Hide file tree
Showing 4 changed files with 23 additions and 2 deletions.
2 changes: 1 addition & 1 deletion security/integrity/digsig.c
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ static int __init __integrity_init_keyring(const unsigned int id,
} else {
if (id == INTEGRITY_KEYRING_PLATFORM)
set_platform_trusted_keys(keyring[id]);
if (id == INTEGRITY_KEYRING_MACHINE)
if (id == INTEGRITY_KEYRING_MACHINE && trust_moklist())
set_machine_trusted_keys(keyring[id]);
if (id == INTEGRITY_KEYRING_IMA)
load_module_cert(keyring[id]);
Expand Down
5 changes: 5 additions & 0 deletions security/integrity/integrity.h
Original file line number Diff line number Diff line change
Expand Up @@ -287,9 +287,14 @@ static inline void __init add_to_platform_keyring(const char *source,

#ifdef CONFIG_INTEGRITY_MACHINE_KEYRING
void __init add_to_machine_keyring(const char *source, const void *data, size_t len);
bool __init trust_moklist(void);
#else
static inline void __init add_to_machine_keyring(const char *source,
const void *data, size_t len)
{
}
static inline bool __init trust_moklist(void)
{
return false;
}
#endif
2 changes: 1 addition & 1 deletion security/integrity/platform_certs/keyring_handler.c
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ __init efi_element_handler_t get_handler_for_db(const efi_guid_t *sig_type)
__init efi_element_handler_t get_handler_for_mok(const efi_guid_t *sig_type)
{
if (efi_guidcmp(*sig_type, efi_cert_x509_guid) == 0) {
if (IS_ENABLED(CONFIG_INTEGRITY_MACHINE_KEYRING))
if (IS_ENABLED(CONFIG_INTEGRITY_MACHINE_KEYRING) && trust_moklist())
return add_to_machine_keyring;
else
return add_to_platform_keyring;
Expand Down
16 changes: 16 additions & 0 deletions security/integrity/platform_certs/machine_keyring.c
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@
#include <linux/efi.h>
#include "../integrity.h"

static bool trust_mok;

static __init int machine_keyring_init(void)
{
int rc;
Expand Down Expand Up @@ -59,3 +61,17 @@ static __init bool uefi_check_trust_mok_keys(void)

return false;
}

bool __init trust_moklist(void)
{
static bool initialized;

if (!initialized) {
initialized = true;

if (uefi_check_trust_mok_keys())
trust_mok = true;
}

return trust_mok;
}

0 comments on commit 3d6ae1a

Please sign in to comment.