Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6830803imu; Wed, 14 Nov 2018 07:35:51 -0800 (PST) X-Google-Smtp-Source: AJdET5f2ctAzZSNkXtpreP5B0CEYi0IVHf8jzP+TkRkTasrnHR/YSepIfo/vbPjZ0F3+g8FJxVbY X-Received: by 2002:a63:5664:: with SMTP id g36mr2145686pgm.313.1542209751825; Wed, 14 Nov 2018 07:35:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542209751; cv=none; d=google.com; s=arc-20160816; b=FfF9XtFBH8vx/Y5gyUa5CpqYUw0jnrHF42N8QYci+7J1xpnFn5QNp6Dfwf1tBH/RJ2 USOKmnZSV8FOpbYtIJ0oIB2nRY9SxqxzdxGRtOcFIv3R7t+Ttwg5M5gKJthAuGiDZ1+c ADijDHYherwW7E8q5t6UCdKgSa2UovFo9AGy4ibn+n3MgblFOoo88506Baf+dYFDJ6Xu zAaMH1OvH5I5c69RzLpAamkSAbuaJYd9Tr/2U35C8Z461MWMZZ9BVbxKoG9vqTu5n3Vq R11trKVELDBzNNh87DIaqNXYg8XgzlrsLH1j65VFGx3jVHqX1jVdMeSIDoXeqjUmelC9 Xtfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=0hrRGhbfW4bxtdAqs4WXQQhYNawKLkqifYhYN0zjgMg=; b=c2ylwT7prGdgrowHOitVCNPgA3N4GloeOUui8vX5ikot0oZQp4IuLycZgi0bVCmMP4 2A8YFH4DCQ3zakntj1TSeHBK03ixzI4XENTuZ0PvU5o8Ug/KGxMgOzKST57C2H3f+8vM hNUD8TxXAW9rmZCkFmGsfGzR7K4m6Mk0i0bW3k9qcpzHx0Npij6xlkbmJ0c4F2QWW2QN L6mpJZFQRJSGZGl9s+piIe0DIOt+LJ/7tRFo5OGg+IG/J8okOWw9loeZTBU7hiEulHfL LD97u7HaLlp8mHHT0GNAc/KRRG7AHvEQrIKjsgyhP24wnpiuHClrDRaT7n4Zh7UWxcUX 6VPw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o14si3688737pgj.59.2018.11.14.07.35.36; Wed, 14 Nov 2018 07:35:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733233AbeKOBhO (ORCPT + 99 others); Wed, 14 Nov 2018 20:37:14 -0500 Received: from lhrrgout.huawei.com ([185.176.76.210]:32764 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727731AbeKOBhO (ORCPT ); Wed, 14 Nov 2018 20:37:14 -0500 Received: from LHREML714-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id B9EE8C5A1AE9F; Wed, 14 Nov 2018 15:33:25 +0000 (GMT) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.153) by smtpsuk.huawei.com (10.201.108.37) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 14 Nov 2018 15:33:22 +0000 From: Roberto Sassu To: , , , CC: , , , , Roberto Sassu Subject: [PATCH v5 0/7] tpm: retrieve digest size of unknown algorithms from TPM Date: Wed, 14 Nov 2018 16:31:01 +0100 Message-ID: <20181114153108.12907-1-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.153] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update This version of the patch set includes an additional patch (7/7) which modifies the definition of tpm_pcr_extend() and tpm2_pcr_extend(). The new patch has been included to facilitate the review of the changes to support TPM 2.0 crypto agility for reading/extending PCRs. Original patch set description The TPM driver currently relies on the crypto subsystem to determine the digest size of supported TPM algorithms. In the future, TPM vendors might implement new algorithms in their chips, and those algorithms might not be supported by the crypto subsystem. Usually, vendors provide patches for the new hardware, and likely the crypto subsystem will be updated before the new algorithm is introduced. However, old kernels might be updated later, after patches are included in the mainline kernel. This would leave the opportunity for attackers to misuse PCRs, as PCR banks with an unknown algorithm are not extended. This patch set provides a long term solution for this issue. If a TPM algorithm is not known by the crypto subsystem, the TPM driver retrieves the digest size from the TPM with a PCR read. All the PCR banks are extended, even if the algorithm is not yet supported by the crypto subsystem. PCR bank information (TPM algorithm ID, digest size, crypto subsystem ID) is stored in the tpm_chip structure and available for users of the TPM driver. Changelog v4: - rename active_banks to allocated_banks - replace kmalloc_array() with kcalloc() - increment nr_allocated_banks if at least one PCR in the bank is selected - pass multiple digests to tpm_pcr_extend() v3: - remove end marker change - replace active_banks static array with pointer to dynamic array - remove TPM2_ACTIVE_PCR_BANKS v2: - change the end marker of the active_banks array - check digest size from output of PCR read command - remove count parameter from tpm_pcr_read() and tpm2_pcr_read() v1: - modify definition of tpm_pcr_read() - move hash algorithms and definition of tpm2_digest to include/linux/tpm.h Roberto Sassu (7): tpm: dynamically allocate the allocated_banks array tpm: remove definition of TPM2_ACTIVE_PCR_BANKS tpm: rename and export tpm2_digest and tpm2_algorithms tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm tpm: retrieve digest size of unknown algorithms with PCR read tpm: ensure that the output of PCR read contains the correct digest size tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend() drivers/char/tpm/tpm-chip.c | 1 + drivers/char/tpm/tpm-interface.c | 36 +++---- drivers/char/tpm/tpm.h | 23 ++--- drivers/char/tpm/tpm1-cmd.c | 26 ++++- drivers/char/tpm/tpm2-cmd.c | 155 +++++++++++++++++++++------- include/linux/tpm.h | 43 +++++++- include/linux/tpm_eventlog.h | 12 +-- security/integrity/ima/ima_crypto.c | 10 +- security/integrity/ima/ima_queue.c | 5 +- security/keys/trusted.c | 5 +- 10 files changed, 213 insertions(+), 103 deletions(-) -- 2.17.1