Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp4921068imd; Tue, 30 Oct 2018 09:17:46 -0700 (PDT) X-Google-Smtp-Source: AJdET5eNQI7jj95LNWSVR4VLwSkKis697GD6uxypSYLpTRL/xJwm8H/YEbbW1JMM1fm9ypNFye2c X-Received: by 2002:a17:902:20c5:: with SMTP id v5-v6mr8523763plg.156.1540916266752; Tue, 30 Oct 2018 09:17:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540916266; cv=none; d=google.com; s=arc-20160816; b=wJLd+dVvuNTThC3HYA0bGp259Js3VXimACKHTi7EX3Jh9SHdf/gga7Go3mD4PnLBR1 foydiby27IOZDIx+OPz4kT8N1W/BYXZphxVfx0HpUjoZMgCFjBD/dkzlLBtgGn3YfGEq cABGYPuGAZcLDu6t+2sHlTPo2A6fb3zR+4V44NJw0GXrlpQjAkcotc2DfKh2JCI2UlO7 1ZgrTmW60Yc8h4AfXvg9S5VT5ZAEl0tzW2fDfvs0W/g2LqpAn26mZYkl6MvvLVyQVvQs 56rMrTr79ygLxGGQOCBnjFjCGwCQNG/sXZmQuRQNQe6BN/1brwe+i4gz/ZpwqYgM4c67 /KFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=kXQyezx10XUUGeQ7/BY5OVNk4DjaTF2gw/5hQiy02JA=; b=aosks36OR9o4Ml0weB/hjQB2SqLHuOGaDnp5x+9kikPIY2wTlIgqXQ96rrVDVb9dU/ RylQKXtxrkec79TwFh9f/bF4AyETmJYIJt0+IlqZwBlLHQEipefq33o/tW7+rqRWjqX9 WNdULtK1SLn8epdwxGP+1h+kab7w+t8AyL/xSsmsy0eeKt6Dk1NWtH+NHhiYIdl4pM+J /KX60BlbWwhBQb9w8m87t10XNr5TxLAj6eo0slau7GkpFqYf6PayGAK0H2qxuLcH8TlU K8/9HnOO+P62196pBLtIKcogtdP3ZuTrA5SDUREDhyTvQrFY1Y4w+f7ocvyitVNGQCn9 +5XA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g1-v6si24833429pgk.593.2018.10.30.09.17.30; Tue, 30 Oct 2018 09:17:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727624AbeJaAoR (ORCPT + 99 others); Tue, 30 Oct 2018 20:44:17 -0400 Received: from lhrrgout.huawei.com ([185.176.76.210]:32703 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725853AbeJaAoQ (ORCPT ); Tue, 30 Oct 2018 20:44:16 -0400 Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id A24C8950F1832; Tue, 30 Oct 2018 15:50:12 +0000 (GMT) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.153) by smtpsuk.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 30 Oct 2018 15:50:05 +0000 From: Roberto Sassu To: , CC: , , , , Roberto Sassu Subject: [PATCH v3 0/5] tpm: retrieve digest size of unknown algorithms from TPM Date: Tue, 30 Oct 2018 16:47:06 +0100 Message-ID: <20181030154711.2782-1-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.153] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The TPM driver currently relies on the crypto subsystem to determine the digest size of supported TPM algorithms. In the future, TPM vendors might implement new algorithms in their chips, and those algorithms might not be supported by the crypto subsystem. Usually, vendors provide patches for the new hardware, and likely the crypto subsystem will be updated before the new algorithm is introduced. However, old kernels might be updated later, after patches are included in the mainline kernel. This would leave the opportunity for attackers to misuse PCRs, as PCR banks with an unknown algorithm are not extended. This patch set provides a long term solution for this issue. If a TPM algorithm is not known by the crypto subsystem, the TPM driver retrieves the digest size from the TPM with a PCR read. All the PCR banks are extended, even if the algorithm is not yet supported by the crypto subsystem. PCR bank information (TPM algorithm ID, digest size, crypto subsystem ID) is stored in the tpm_chip structure and available for users of the TPM driver. Changelog v2: - change the end marker of the active_banks array - check digest size from output of PCR read command - remove count parameter from tpm_pcr_read() and tpm2_pcr_read() v1: - modify definition of tpm_pcr_read() - move hash algorithms and definition of tpm2_digest to include/linux/tpm.h Roberto Sassu (5): tpm: change the end marker of the active_banks array to zero tpm: rename and export tpm2_digest and tpm2_algorithms tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm tpm: retrieve digest size of unknown algorithms with PCR read tpm: ensure that output of PCR read contains the correct digest size drivers/char/tpm/tpm-interface.c | 19 ++++-- drivers/char/tpm/tpm.h | 18 ++---- drivers/char/tpm/tpm2-cmd.c | 99 +++++++++++++++++++++-------- include/linux/tpm.h | 30 ++++++++- include/linux/tpm_eventlog.h | 9 +-- security/integrity/ima/ima_crypto.c | 10 +-- 6 files changed, 122 insertions(+), 63 deletions(-) -- 2.17.1