Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2912439pxk; Sun, 4 Oct 2020 17:30:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOMV/6Vq01pMGQqu343Sj1/wG4TFrpXSTKlx8CUnwRbKZEiXFdBuGOA9kusO0WD6w/ERwD X-Received: by 2002:a05:6402:2055:: with SMTP id bc21mr1960842edb.67.1601857847406; Sun, 04 Oct 2020 17:30:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601857847; cv=none; d=google.com; s=arc-20160816; b=PTX5LCiQj5HT4x3swSpO0s1A9J/JVO/0gguYE+wGy6e8KVGVPO1pw2hLOTNXEWPVxG WYfrzwp+smobHfAOh04Fsi3xSU8fMjDvsixRb5MehSL4ZIW+ps77UEonVvLimCIdHR6l 4fb2NTsJWuSDwkjzuUKnfINWdO9JmV/mpN2zQJ6drhDLutglTKj1yG9qt2jqp0FopXQE /vBo/SLbj9Yspyj9knb0NgSW0inqcfTVIlUSH3ZLKE5qvqjjZUd1pQxPkoSkpfBWAm4/ V4BlE11WB+DSFIH9rcF1VBMMBWtco0lAVOctKL/Kll+wevPV+v4zWNJuY3gyDycovuWR /P6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=/R0Ay56nYLnuVFL0f7VYMxs0+VRMV1FUu6U6s9GSR2k=; b=jNL8+9qxQYpqC7VwRWW2pFwC+XwHorRAJvW786hRE8njeB9jenOXvEFzH9AWLTsdK4 kbkU1awCdFGjIFwVHdrYNg1BWixtN9Tz4xoRaAF6cNvDyUL4PWIhOQCITEv0dETZ42wZ XsoAd4chpanBRnj5htfgfrAlS0VrQPLXj1sL23vcG/3ddka3UpSOeJ2xy/ElUZf0oENd 7YSFqCojoQT350jh48tNYBzUvLDPX+dqpo9CGP4+6fwneW8wc+Z1zP30qzFCD/2winJK OAMlQk68XhJTb3XTxbZFceLPLLGDDKSeGbEW5nXg1H+roWaHCO3m/uGghE66klBFyZRM f2BA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g19si6916162ejz.9.2020.10.04.17.30.24; Sun, 04 Oct 2020 17:30:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725917AbgJEA1w (ORCPT + 99 others); Sun, 4 Oct 2020 20:27:52 -0400 Received: from mga14.intel.com ([192.55.52.115]:53964 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725836AbgJEA1v (ORCPT ); Sun, 4 Oct 2020 20:27:51 -0400 IronPort-SDR: UZhr41qS1peOPl92DobqGrsBYS2Iazd4y83Zvg7hrhOJCvO5l5/MBDtyiYF+JUGD6ugzBTWlix YXpa+YBgnNcA== X-IronPort-AV: E=McAfee;i="6000,8403,9764"; a="162553486" X-IronPort-AV: E=Sophos;i="5.77,337,1596524400"; d="scan'208";a="162553486" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Oct 2020 17:27:26 -0700 IronPort-SDR: HHKDxYsBN2JMo14719Gg0KrFAvnwVPj5mUEIRD+UvUgrueJtpjyjrFJW5db5JLd2YeSM8CA2dX X4RjEQDCcqbw== X-IronPort-AV: E=Sophos;i="5.77,337,1596524400"; d="scan'208";a="295931133" Received: from avahldie-mobl.amr.corp.intel.com (HELO localhost) ([10.249.32.74]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Oct 2020 17:27:22 -0700 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: Jarkko Sakkinen , stable@vger.kernel.org, Mimi Zohar , "James E.J. Bottomley" , David Howells , Kent Yoder , James Bottomley , James Morris , "Serge E. Hallyn" , "H. Peter Anvin" , David Safford , keyrings@vger.kernel.org (open list:KEYS-TRUSTED), linux-security-module@vger.kernel.org (open list:SECURITY SUBSYSTEM), linux-kernel@vger.kernel.org (open list) Subject: [PATCH 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random() Date: Mon, 5 Oct 2020 03:26:57 +0300 Message-Id: <20201005002659.81588-2-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20201005002659.81588-1-jarkko.sakkinen@linux.intel.com> References: <20201005002659.81588-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When tpm_get_random() was introduced, it defined the following API for the return value: 1. A positive value tells how many bytes of random data was generated. 2. A negative value on error. However, in the call sites the API was used incorrectly, i.e. as it would only return negative values and otherwise zero. Returning he positive read counts to the user space does not make any possible sense. Fix this by returning -EIO when tpm_get_random() returns a positive value. Fixes: 41ab999c80f1 ("tpm: Move tpm_get_random api into the TPM device driver") Cc: stable@vger.kernel.org Cc: Mimi Zohar Cc: "James E.J. Bottomley" Cc: David Howells Cc: Kent Yoder Signed-off-by: Jarkko Sakkinen --- security/keys/trusted-keys/trusted_tpm1.c | 20 +++++++++++++++++--- 1 file changed, 17 insertions(+), 3 deletions(-) diff --git a/security/keys/trusted-keys/trusted_tpm1.c b/security/keys/trusted-keys/trusted_tpm1.c index b9fe02e5f84f..c7b1701cdac5 100644 --- a/security/keys/trusted-keys/trusted_tpm1.c +++ b/security/keys/trusted-keys/trusted_tpm1.c @@ -403,9 +403,12 @@ static int osap(struct tpm_buf *tb, struct osapsess *s, int ret; ret = tpm_get_random(chip, ononce, TPM_NONCE_SIZE); - if (ret != TPM_NONCE_SIZE) + if (ret < 0) return ret; + if (ret != TPM_NONCE_SIZE) + return -EIO; + tpm_buf_reset(tb, TPM_TAG_RQU_COMMAND, TPM_ORD_OSAP); tpm_buf_append_u16(tb, type); tpm_buf_append_u32(tb, handle); @@ -496,8 +499,12 @@ static int tpm_seal(struct tpm_buf *tb, uint16_t keytype, goto out; ret = tpm_get_random(chip, td->nonceodd, TPM_NONCE_SIZE); + if (ret < 0) + return ret; + if (ret != TPM_NONCE_SIZE) - goto out; + return -EIO; + ordinal = htonl(TPM_ORD_SEAL); datsize = htonl(datalen); pcrsize = htonl(pcrinfosize); @@ -601,9 +608,12 @@ static int tpm_unseal(struct tpm_buf *tb, ordinal = htonl(TPM_ORD_UNSEAL); ret = tpm_get_random(chip, nonceodd, TPM_NONCE_SIZE); + if (ret < 0) + return ret; + if (ret != TPM_NONCE_SIZE) { pr_info("trusted_key: tpm_get_random failed (%d)\n", ret); - return ret; + return -EIO; } ret = TSS_authhmac(authdata1, keyauth, TPM_NONCE_SIZE, enonce1, nonceodd, cont, sizeof(uint32_t), @@ -1013,8 +1023,12 @@ static int trusted_instantiate(struct key *key, case Opt_new: key_len = payload->key_len; ret = tpm_get_random(chip, payload->key, key_len); + if (ret < 0) + goto out; + if (ret != key_len) { pr_info("trusted_key: key_create failed (%d)\n", ret); + ret = -EIO; goto out; } if (tpm2) -- 2.25.1