Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp227660ima; Fri, 1 Feb 2019 02:21:16 -0800 (PST) X-Google-Smtp-Source: AHgI3IZ1qqFfZps9AX0xnNKbm1aO+9iOy2vzUXRJTXbswHWz6cIDTO/2taGHX+s2nartleUTDY2C X-Received: by 2002:a63:3602:: with SMTP id d2mr1578431pga.404.1549016476179; Fri, 01 Feb 2019 02:21:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549016476; cv=none; d=google.com; s=arc-20160816; b=jeaX7hpQNsKEfgbljdSZ+v5NHBte0SQT3wlCfWsgpMziaEbhAQUhuJhLCJqB2xFBc2 V3dwq66AFL6NbzyubKbMt2x+uRJa4IRsZ4RFGc48H0+PtGJOd+BdGYDzgpK1HpZlMR3+ i4fr2TECsG3Hcyl1kHEA9f3+40LAluCvLnNCyDE6N2otvxwYIsr4KY7R0fzG3Z5PUhzm phGQP4MmMMMUUiJALzQGV3E8et0IODpE4MrqyvNVbf0cs2Eu7ccWEcuNJ5RO7oCdl2zW ojEHwBpapM1q0/7GvgezvCXs8s5fxTwnatg6jVGNVCkRUmWvNtPUc4b55m68KXMPbseq GCsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=Y4XowSrH3tntXatnn7hB71CuAbJ9NerPEtHmOKQFQjA=; b=S88Ep2AJQ5EikjPPVo2KSo98QXMLieiAIZPxmx0EoRh6yKjYPalAHPNV8d5FYjkg+b vIlKYOKOKSM9gdj/mfbvIsA+K77cQjktzslvxvFlkOEUxSDN6NoeL1MtQqp3KmHKbuia o3r3Nh47IRb78GLmFt3wSAQr0l0tRPR//W7+hPSF0BI3vC+0sCJZI4fgYyB9UR29Ed15 hcqtsDl2L7uA5nICr5gsagYimvgyzbWILXMP1/uHNbkYJMZm1xZGstHYtS4hudtiVKzW 8LZCR72zautg7c3FA7Sr4mc8wlmEB4ZG9jaofvWH+WjtIb3K4RI5RBurBMN3OoLMIrt3 2+IQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p66si7075143pfp.144.2019.02.01.02.21.00; Fri, 01 Feb 2019 02:21:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729398AbfBAKOk (ORCPT + 99 others); Fri, 1 Feb 2019 05:14:40 -0500 Received: from lhrrgout.huawei.com ([185.176.76.210]:32849 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726116AbfBAKOj (ORCPT ); Fri, 1 Feb 2019 05:14:39 -0500 Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id D08ADC12E4358926A474; Fri, 1 Feb 2019 10:14:37 +0000 (GMT) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.65.141) by smtpsuk.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 1 Feb 2019 10:14:27 +0000 From: Roberto Sassu To: , , , , CC: , , , , , Roberto Sassu Subject: [PATCH v9 0/6] tpm: retrieve digest size of unknown algorithms from TPM Date: Fri, 1 Feb 2019 11:06:35 +0100 Message-ID: <20190201100641.26936-1-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.204.65.141] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update This version of the patch set includes three additional patches (5-7/7) that allow users of the TPM driver to provide a digest for each PCR bank to tpm_pcr_extend(). The new patches have been included to facilitate the review of all the changes to support TPM 2.0 crypto agility for reading and extending PCRs. Original patch set description The TPM driver currently relies on the crypto subsystem to determine the digest size of supported TPM algorithms. In the future, TPM vendors might implement new algorithms in their chips, and those algorithms might not be supported by the crypto subsystem. Usually, vendors provide patches for the new hardware, and likely the crypto subsystem will be updated before the new algorithm is introduced. However, old kernels might be updated later, after patches are included in the mainline kernel. This would leave the opportunity for attackers to misuse PCRs, as PCR banks with an unknown algorithm are not extended. This patch set provides a long term solution for this issue. If a TPM algorithm is not known by the crypto subsystem, the TPM driver retrieves the digest size from the TPM with a PCR read. All the PCR banks are extended, even if the algorithm is not yet supported by the crypto subsystem. PCR bank information (TPM algorithm ID, digest size, crypto subsystem ID) is stored in the tpm_chip structure and available for users of the TPM driver. Changelog v8: - set digest array length in tpm_digest to new constant TPM_MAX_DIGEST_SIZE - replace enum tpm_const with #define - rename labels in init_trusted() - allocate tpm_digest array after retrieving random data in init_digests() v7: - use memchr_inv() in tpm2_get_pcr_allocation() - add patch to move tpm_chip to include/linux/tpm.h - add patch to set the tpm_chip argument in trusted.c to a pointer from tpm_default_chip() - remove definition of tpm_extend_digest - remove code in tpm2_pcr_extend() to extend unused PCR banks with the first digest passed by the caller of tpm_pcr_extend() - remove count parameter from tpm_pcr_extend() and tpm2_pcr_extend() - remove padding of SHA1 digest in tpm_pcr_extend() - pre-allocate and initialize array of tpm_digest structures in security/keys/trusted.c and security/integrity/ima/ima_init.c v6: - squash patches 4-6 - rename tpm_bank_list to tpm_extend_digest, extend_size and extend_data members to size and data - add comment in tpm2_init_bank_info() v5: - rename digest_struct variable to digest - add _head suffix to tcg_efi_specid_event and tcg_pcr_event2 - rename digest_size member of tpm_bank_list to extend_size - change type of alg_id member of tpm_bank_list from u8 to u16 - add missing semi-colon in pcrlock() v4: - rename active_banks to allocated_banks - replace kmalloc_array() with kcalloc() - increment nr_allocated_banks if at least one PCR in the bank is selected - pass multiple digests to tpm_pcr_extend() v3: - remove end marker change - replace active_banks static array with pointer to dynamic array - remove TPM2_ACTIVE_PCR_BANKS v2: - change the end marker of the active_banks array - check digest size from output of PCR read command - remove count parameter from tpm_pcr_read() and tpm2_pcr_read() v1: - modify definition of tpm_pcr_read() - move hash algorithms and definition of tpm2_digest to include/linux/tpm.h Roberto Sassu (6): tpm: dynamically allocate the allocated_banks array tpm: rename and export tpm2_digest and tpm2_algorithms tpm: retrieve digest size of unknown algorithms with PCR read tpm: move tpm_chip definition to include/linux/tpm.h KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip() tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend() drivers/char/tpm/tpm-chip.c | 1 + drivers/char/tpm/tpm-interface.c | 38 ++++---- drivers/char/tpm/tpm.h | 117 ++--------------------- drivers/char/tpm/tpm1-cmd.c | 12 +++ drivers/char/tpm/tpm2-cmd.c | 139 ++++++++++++++++++++-------- include/linux/tpm.h | 126 ++++++++++++++++++++++++- include/linux/tpm_eventlog.h | 9 +- security/integrity/ima/ima.h | 1 + security/integrity/ima/ima_crypto.c | 10 +- security/integrity/ima/ima_init.c | 22 +++++ security/integrity/ima/ima_queue.c | 6 +- security/keys/trusted.c | 73 +++++++++++---- 12 files changed, 346 insertions(+), 208 deletions(-) -- 2.17.1