Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5457956ybi; Tue, 28 May 2019 13:28:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0gnmmFb6PLS2SmKCrorYTpDaJA/9aPkEitCfPdb99U0RHCObYSF4fqi03EUM/IgwHZWQx X-Received: by 2002:a65:56cb:: with SMTP id w11mr114809225pgs.236.1559075288751; Tue, 28 May 2019 13:28:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559075288; cv=none; d=google.com; s=arc-20160816; b=l1LHfQ6uToCb4ARKg4w2LwIBE0KwuUW1vo+/EdyEeXrD5yRQ/rjsZ6R6DWCwWNs2y8 tOJCay/L8D/BibKWMAzbML0UwnL8tgDndQWjED4An3xp27+pOGxiGCFKcWwdHRP8w6QF FuUyzOXZIorSvIeFhrzojcDxrxTWuhsuLoSe/0q3Jj+7DsoMkVtGUAbzu3w5904v+bZL 0G8I9eFPV/uARgMUpNFUngWZee0+ZhSbclzrOmzU8H+4vWG4XDvzbF17O41r3eIyOj4z ctDkgVqKJNfzntOaoW26/YjxhvMgg/7cOeazXDpeFE4GYUBabbXF9+QXBrotGEbbPaDO Jr3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=QaUbD1k3WeGIlCfs1lHmeou+m5jZqshP1fny+ubHw14=; b=KANScyk+IVk4c/OYAJED8zQh083ZwqwYRbCf2w8ktZgmzMLEN5ikzh+1QA3Sm6EDbI eGE1iLYD/qsdVRdxG5APyBTQJl7WGQ9MBo8AzFBBUbkFSymMsptImzi6iv0VuXylYYuH YQLcxX0+Nq/mJRJhp6VS83F12HbSJkNQLhSIUpWTRL3bhTosSSqiNgpOSujd+MXWDlLd /aYpn77YUP/mOKIAAkJTCfZSAjGdDQaUmJtjkInob7XS+5qs4/iZ2NcywxS6YX/Yn4CA b7OqU0FjUSu7/EC1fXFiVjQnDOI/jPoArtYkFGEwewOKxXhwcYCOS4Zsoto0xK1YNc64 WNhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c18si30357pfi.171.2019.05.28.13.27.52; Tue, 28 May 2019 13:28:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727529AbfE1TCx (ORCPT + 99 others); Tue, 28 May 2019 15:02:53 -0400 Received: from mail-vk1-f193.google.com ([209.85.221.193]:41170 "EHLO mail-vk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727013AbfE1TCx (ORCPT ); Tue, 28 May 2019 15:02:53 -0400 Received: by mail-vk1-f193.google.com with SMTP id l73so4995530vkl.8 for ; Tue, 28 May 2019 12:02:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=QaUbD1k3WeGIlCfs1lHmeou+m5jZqshP1fny+ubHw14=; b=ris5ra8k/6L/OeA+vsIjqyU8ARJ7S9iZ4nuXekC4HA7Y9OrNm7YroaOOZRzFEtmhZf uH6StZzXZG2WWT7jQuYGA6P8WJEcHBMbEFxbjVuHX6olgsgCb8Ys2HPsIJ0jisRTss5m lT1Hfd3hRnUOdrqBnXdZ84OJMz7LuiGClywTCajNiOOnCFH5S3yaNlyrMNJUNNCV1dZg sDNACMqz0sCCbAGzJyykaKjKNAhaPAzjFet7RRMWYVmDoTuoIxxHSmF4/K9rMSbkWkMq xMaVFy7FpZcxQ67lnIGZ4c8bcjZBmPesyKrafYpL8SMalFgR0i/VWpXoH+BKBSNWtq0v sjYw== X-Gm-Message-State: APjAAAVrLI2evpFPvTlV1CA4kHMsYpaWKzOoVb9p+rhwnkuq8xTGFbF9 kKZRxJBewGAwqlTD9goXdSkbbw== X-Received: by 2002:a1f:1102:: with SMTP id 2mr27364526vkr.90.1559070171574; Tue, 28 May 2019 12:02:51 -0700 (PDT) Received: from ?IPv6:2601:543:8101:1d87::b0a3? ([2601:543:8101:1d87::b0a3]) by smtp.gmail.com with ESMTPSA id 126sm6060970vkt.14.2019.05.28.12.02.50 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Tue, 28 May 2019 12:02:50 -0700 (PDT) Subject: Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random" To: Jarkko Sakkinen , "Winkler, Tomas" Cc: Kees Cook , Jason Gunthorpe , James Bottomley , Phil Baker , Craig Robson , "linux-kernel@vger.kernel.org" , Peter Huewe , Arnd Bergmann , "linux-integrity@vger.kernel.org" References: <20190401190607.GA23795@beast> <20190401234625.GA29016@linux.intel.com> <20190402164057.GA4544@linux.intel.com> <5B8DA87D05A7694D9FA63FD143655C1B9DAE2759@hasmsx108.ger.corp.intel.com> <20190403175207.GC13396@linux.intel.com> From: Laura Abbott Message-ID: Date: Tue, 28 May 2019 15:02:49 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190403175207.GC13396@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/3/19 1:52 PM, Jarkko Sakkinen wrote: > On Tue, Apr 02, 2019 at 07:13:52PM +0000, Winkler, Tomas wrote: >> >> >>> On Tue, Apr 02, 2019 at 02:46:25AM +0300, Jarkko Sakkinen wrote: >>>> On Mon, Apr 01, 2019 at 12:06:07PM -0700, Kees Cook wrote: >>>>> A "get random" may fail with a TPM error, but those codes were >>>>> returned as-is to the caller, which assumed the result was the >>>>> number of bytes that had been written to the target buffer, which >>>>> could lead to a kernel heap memory exposure and over-read. >>>>> >>>>> This fixes tpm1_get_random() to mask positive TPM errors into -EIO, >>>>> as before. >>>>> >>>>> [ 18.092103] tpm tpm0: A TPM error (379) occurred attempting get >>> random >>>>> [ 18.092106] usercopy: Kernel memory exposure attempt detected from >>> SLUB object 'kmalloc-64' (offset 0, size 379)! >>>>> >>>>> Link: https://bugzilla.redhat.com/show_bug.cgi?id=1650989 >>>>> Reported-by: Phil Baker >>>>> Reported-by: Craig Robson >>>>> Fixes: 7aee9c52d7ac ("tpm: tpm1: rewrite tpm1_get_random() using >>>>> tpm_buf structure") >>>>> Cc: Laura Abbott >>>>> Cc: Tomas Winkler >>>>> Cc: Jarkko Sakkinen >>>>> Cc: stable@vger.kernel.org >>>>> Signed-off-by: Kees Cook >>>>> --- >>>>> v3: fix never-succeed, limit checks to tpm cmd return (James, Jason) >>>>> v2: also fix tpm2 implementation (Jason Gunthorpe) >>>>> --- >>>>> drivers/char/tpm/tpm1-cmd.c | 7 +++++-- >>>>> drivers/char/tpm/tpm2-cmd.c | 7 +++++-- >>>>> 2 files changed, 10 insertions(+), 4 deletions(-) >>>>> >>>>> diff --git a/drivers/char/tpm/tpm1-cmd.c >>>>> b/drivers/char/tpm/tpm1-cmd.c index 85dcf2654d11..faacbe1ffa1a >>>>> 100644 >>>>> --- a/drivers/char/tpm/tpm1-cmd.c >>>>> +++ b/drivers/char/tpm/tpm1-cmd.c >>>>> @@ -510,7 +510,7 @@ struct tpm1_get_random_out { >>>>> * >>>>> * Return: >>>>> * * number of bytes read >>>>> - * * -errno or a TPM return code otherwise >>>>> + * * -errno (positive TPM return codes are masked to -EIO) >>>>> */ >>>>> int tpm1_get_random(struct tpm_chip *chip, u8 *dest, size_t max) { >>>>> @@ -531,8 +531,11 @@ int tpm1_get_random(struct tpm_chip *chip, u8 >>>>> *dest, size_t max) >>>>> >>>>> rc = tpm_transmit_cmd(chip, &buf, sizeof(out->rng_data_len), >>>>> "attempting get random"); >>>>> - if (rc) >>>>> + if (rc) { >>>>> + if (rc > 0) >>>>> + rc = -EIO; >>>>> goto out; >>>>> + } >>>>> >>>>> out = (struct tpm1_get_random_out >>> *)&buf.data[TPM_HEADER_SIZE]; >>>>> >>>>> diff --git a/drivers/char/tpm/tpm2-cmd.c >>>>> b/drivers/char/tpm/tpm2-cmd.c index e74c5b7b64bf..8ffa6af61580 >>>>> 100644 >>>>> --- a/drivers/char/tpm/tpm2-cmd.c >>>>> +++ b/drivers/char/tpm/tpm2-cmd.c >>>>> @@ -301,7 +301,7 @@ struct tpm2_get_random_out { >>>>> * >>>>> * Return: >>>>> * size of the buffer on success, >>>>> - * -errno otherwise >>>>> + * -errno otherwise ((positive TPM return codes are masked to -EIO) >>>>> */ >>>>> int tpm2_get_random(struct tpm_chip *chip, u8 *dest, size_t max) { >>>>> @@ -328,8 +328,11 @@ int tpm2_get_random(struct tpm_chip *chip, u8 >>> *dest, size_t max) >>>>> offsetof(struct tpm2_get_random_out, >>>>> buffer), >>>>> "attempting get random"); >>>>> - if (err) >>>>> + if (err) { >>>>> + if (err > 0) >>>>> + err = -EIO; >>>>> goto out; >>>>> + } >>>>> >>>>> out = (struct tpm2_get_random_out *) >>>>> &buf.data[TPM_HEADER_SIZE]; >>>>> -- >>>>> 2.17.1 >>>>> >>>>> >>>>> -- >>>>> Kees Cook >>>> >>>> Reviewed-by: Jarkko Sakkinen >>> >>> Applied to my master branch. Jason, Tomas, do you want me to add reviewed- >>> by's? >> Sure, it fixes my patch. > > Great, I'll add it. Thank you. Just want to be explicit with these > things as I consider them as if I was asking a signature from someone > :-) > > /Jarkko > Was this intended to go in for 5.2? I still don't see it in the tree. Thanks, Laura