Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8888505imu; Tue, 4 Dec 2018 16:24:35 -0800 (PST) X-Google-Smtp-Source: AFSGD/UJhe8EgKo+h3sdRRatcLoiVsE2d3PsH2MbUONmqvtBuziXb6Kfn6DQd4CJZhaqjrOpPMUa X-Received: by 2002:a17:902:9f89:: with SMTP id g9mr22345443plq.214.1543969475592; Tue, 04 Dec 2018 16:24:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543969475; cv=none; d=google.com; s=arc-20160816; b=EeDTGltvoev0p3Dl3MKIBdBoBvdz4H3RB+HG+uOOkbwSEyweG7oIMYzrDg1dOkIJzW Cvm/RYwead+Iq5FVHzjHa4229iHkWqc9a2EQkJRFBCMtNGgrajT2dTaWXNTT8jWksGlq rvM4bRQIZgKbW2yi46jKvBh40yS+HWXKuRwTSi/B9DEpTJ2cq+Q1CBhE1iQyeQ9UXrmd D2T/s4vtwRwUwZDjWAcwDt02ffwOJpr1kK8ZUT2TNR+oJKQ4hdONHUKb+zb5dlGAbZWt XckDAVI670Y2OKkjKP0zseSURZxIHA8DhzKqxmRsiZMaTFQlv/Qx5dsORpS5u6mrcZ43 PGcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=E5L11oIvbsrpljHKG30xUqJjPsqbJTzrH3Z7wl5jyRA=; b=YIct6gJql86dzNxkff9VPrpV4iegbFdb9dGFmZx8zientPdVe5e62B6AU3u5OdwR5o eJ35d1+kvD2KvkrA0NJ40IEagrVf/4Kq1moqjSfNbKeJUvoPEk4h12m4qGBEeuh2Q0sh Qg4yKesaOy30rrIHfHIqMkgIojlCkuR1IKI++bKSTIX8pHQzf7up3F9WB6PvrE0SBsyc GGtAFzsyfdV1XOJYbaIC82hWsuASFixixAbW5by6eJuDqfK3TN7IYEjHIetbKmTRTBwf sebpDTZE0gsfM58HH0YGZTuLEtEW1yk0WCvjR3cOjAHXA0ngHiWdf7FqTPAdb8NAnd3B 7qHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1si16177073pgs.417.2018.12.04.16.24.19; Tue, 04 Dec 2018 16:24:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726581AbeLEAXE (ORCPT + 99 others); Tue, 4 Dec 2018 19:23:04 -0500 Received: from mga05.intel.com ([192.55.52.43]:20493 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725905AbeLEAXD (ORCPT ); Tue, 4 Dec 2018 19:23:03 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Dec 2018 16:23:03 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,316,1539673200"; d="scan'208";a="107334987" Received: from jsakkine-mobl1.jf.intel.com (HELO localhost) ([10.24.8.183]) by orsmga003.jf.intel.com with ESMTP; 04 Dec 2018 16:23:02 -0800 Date: Tue, 4 Dec 2018 16:23:02 -0800 From: Jarkko Sakkinen To: Roberto Sassu Cc: zohar@linux.ibm.com, david.safford@ge.com, monty.wiseman@ge.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, silviu.vlasceanu@huawei.com Subject: Re: [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM Message-ID: <20181205002302.GB12210@linux.intel.com> References: <20181204082138.24600-1-roberto.sassu@huawei.com> <20181205002155.GA12210@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181205002155.GA12210@linux.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 04, 2018 at 04:21:55PM -0800, Jarkko Sakkinen wrote: > On Tue, Dec 04, 2018 at 09:21:31AM +0100, Roberto Sassu wrote: > > Update > > > > This version of the patch set includes an additional patch (7/7) which > > modifies the definition of tpm_pcr_extend() and tpm2_pcr_extend(). The new > > patch has been included to facilitate the review of the changes to support > > TPM 2.0 crypto agility for reading/extending PCRs. > > > > > > Original patch set description > > > > The TPM driver currently relies on the crypto subsystem to determine the > > digest size of supported TPM algorithms. In the future, TPM vendors might > > implement new algorithms in their chips, and those algorithms might not > > be supported by the crypto subsystem. > > > > Usually, vendors provide patches for the new hardware, and likely > > the crypto subsystem will be updated before the new algorithm is > > introduced. However, old kernels might be updated later, after patches > > are included in the mainline kernel. This would leave the opportunity > > for attackers to misuse PCRs, as PCR banks with an unknown algorithm > > are not extended. > > > > This patch set provides a long term solution for this issue. If a TPM > > algorithm is not known by the crypto subsystem, the TPM driver retrieves > > the digest size from the TPM with a PCR read. All the PCR banks are > > extended, even if the algorithm is not yet supported by the crypto > > subsystem. > > > > PCR bank information (TPM algorithm ID, digest size, crypto subsystem ID) > > is stored in the tpm_chip structure and available for users of the TPM > > driver. > > > > Changelog > > > > v5: > > - rename digest_struct variable to digest > > - add _head suffix to tcg_efi_specid_event and tcg_pcr_event2 > > - rename digest_size member of tpm_bank_list to extend_size > > - change type of alg_id member of tpm_bank list from u8 to u16 > > - add missing semi-colon in pcrlock() > > > > v4: > > - rename active_banks to allocated_banks > > - replace kmalloc_array() with kcalloc() > > - increment nr_allocated_banks if at least one PCR in the bank is selected > > - pass multiple digests to tpm_pcr_extend() > > > > v3: > > - remove end marker change > > - replace active_banks static array with pointer to dynamic array > > - remove TPM2_ACTIVE_PCR_BANKS > > > > v2: > > - change the end marker of the active_banks array > > - check digest size from output of PCR read command > > - remove count parameter from tpm_pcr_read() and tpm2_pcr_read() > > > > v1: > > - modify definition of tpm_pcr_read() > > - move hash algorithms and definition of tpm2_digest to include/linux/tpm.h > > > > Roberto Sassu (7): > > tpm: dynamically allocate the allocated_banks array > > tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2 > > tpm: rename and export tpm2_digest and tpm2_algorithms > > tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm > > tpm: retrieve digest size of unknown algorithms with PCR read > > tpm: ensure that the output of PCR read contains the correct digest > > size > > tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend() > > > > drivers/char/tpm/eventlog/tpm2.c | 12 +-- > > drivers/char/tpm/tpm-chip.c | 1 + > > drivers/char/tpm/tpm-interface.c | 36 +++---- > > drivers/char/tpm/tpm.h | 23 ++--- > > drivers/char/tpm/tpm1-cmd.c | 26 ++++- > > drivers/char/tpm/tpm2-cmd.c | 154 +++++++++++++++++++++------- > > include/linux/tpm.h | 43 +++++++- > > include/linux/tpm_eventlog.h | 19 +--- > > security/integrity/ima/ima_crypto.c | 10 +- > > security/integrity/ima/ima_queue.c | 5 +- > > security/keys/trusted.c | 5 +- > > 11 files changed, 220 insertions(+), 114 deletions(-) > > > > -- > > 2.17.1 > > > > Some generic stuff I noticed: > > * Use SHA1_DIGEST_SIZE, not TPM_DIGEST_SIZE. The latter is just > uninforming constant that we want to get rid off. Oops, sent by mistake. Other thing was that if you have an array in the tail of the struct you can just have [] no subcript zero needed. /Jarkko