Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp4057563rwa; Tue, 23 Aug 2022 15:28:54 -0700 (PDT) X-Google-Smtp-Source: AA6agR7oGlcmpRwrmPj9J3h2/uHeJVj36jyXTsa1MFLz7sKOcEEIWFwyZXYewZvVfhj41A6VYrQC X-Received: by 2002:a05:6a00:1741:b0:536:baed:52ee with SMTP id j1-20020a056a00174100b00536baed52eemr9659517pfc.68.1661293734570; Tue, 23 Aug 2022 15:28:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661293734; cv=none; d=google.com; s=arc-20160816; b=vFsxi87pglv5NRLyPE5G6NGm0s8/5iljBPoLvGNfX0EYQNGagQHjz1zOWi6C3SnGAl bi4zJwbvi6Gd/abcLsD1bJM+chDHGwjUHktZOx1S+Vm6qMCwjeBjA0fFxJKLaQf8DElb utPrQJhZ4bhI8aXS5G7qR1YxoM0HMoBfWXgMABmqDy0QTcYhrO5ecBnQfcnkSQyvCsjj UZ5LyYGxCxJiUye+X+so5Ij/Lddj3FCro6a7fWFn9LGCCBGfR4akjpvCf4blj+lKIQsi 0QtXVNvRluoHCYjI53iHy46GhjwJzb/9FIhxJPPpRTq18VqqJ2tD+N7nlPjLLNci4BWM uvPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=h89V1jB8raz93s1UBdB755/qSlB/lATdkVzyb86xPlg=; b=U/Bskknlq10khfPWQgjHJ3yfnbiGPKEVndERviHSwlFjzuW7HJKiNHxjXm1JYweU2X yD2QfExZmF7N13rPQ+yv7qJccKiISIWPJfXx2DLB+9WSP8wcVHH3NyU31rVsYaVEhzsq dn7SBRNLOy7c/RnQjb0mYdH+TKvlWcNV7HQYL5KnUFjQNDuKw3GEnH2Byr7iKhShVnez E2ARpMRp9NayZMgbURAh1NbxCcJDgxEdxpH8eRuqXrE5A7kLOxnOv8sh1CCVIGaMIoQw dYRSigJ/0U3UcpwCPXhNtDgCQdG0CyN/kxJcMe+NOIrEWY7IGw9Lrz+3WLqb902jTvKn UbOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=nUlTu7qh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 8-20020a17090a0a8800b001ec9e904597si16334188pjw.27.2022.08.23.15.28.43; Tue, 23 Aug 2022 15:28:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=nUlTu7qh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233635AbiHWW05 (ORCPT + 99 others); Tue, 23 Aug 2022 18:26:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52604 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233250AbiHWW0R (ORCPT ); Tue, 23 Aug 2022 18:26:17 -0400 Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64DFD87688 for ; Tue, 23 Aug 2022 15:26:10 -0700 (PDT) Received: by mail-pj1-x102b.google.com with SMTP id o14-20020a17090a0a0e00b001fabfd3369cso16085713pjo.5 for ; Tue, 23 Aug 2022 15:26:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc; bh=h89V1jB8raz93s1UBdB755/qSlB/lATdkVzyb86xPlg=; b=nUlTu7qh1+o9COlB+JNxnTLFZQTa21AWzmc5sREQt16+4GKZCIQRkcyAEa9vEdLjFC MLZN9LcUOkjMGlexXqOKvML0eL7cxFfEybdFjI4Golhz8r3+DMqZvh8D2yrr+i813YdN D3AF/4liowxe+gcSd9iEKQUzpVAGnA7uWp0BE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc; bh=h89V1jB8raz93s1UBdB755/qSlB/lATdkVzyb86xPlg=; b=uEDwLpE6xWdYIFRlOCRC+lelI0oI4WXdDRwMe9/AnlTbyW2UvLDeEDMRwwJsCUcMu4 sHubY6sQHrqvVaXP1UAZ9idu9mbUKhgQxE/z/y3AlWFVtL7wc0RcRF0hmRqiJEUCj94e xtURQ6vPYM8JSyAfZiujgZIG5fYsQ5FN7I24XCj5Oz1SUXrC3RHfGUu+QY0y6pUeyK2h uOI9ZihC1hC328AHzcjO2dzroecrxDEA+SOoj73LwuOFJOMOZdfF3qsgZnf77xBrrK3S SelcaGR617XFUxj8L9LuAqa7ZEppQ/lxlTJw39bKjUdHarjk2HIwbt1fMBTo2WdaCOHw UTKA== X-Gm-Message-State: ACgBeo1o9V8HxDd4gcF/cxs1yZDLyb4W6r+pcTdcP865khGiqZNs+hyn vm3MjN5qiAj8DcUOV+GGu18inXptqNtz9g== X-Received: by 2002:a17:90a:e7c2:b0:1f5:85ab:938c with SMTP id kb2-20020a17090ae7c200b001f585ab938cmr5289101pjb.133.1661293569204; Tue, 23 Aug 2022 15:26:09 -0700 (PDT) Received: from evgreen-glaptop.lan ([98.45.66.167]) by smtp.gmail.com with ESMTPSA id f76-20020a62384f000000b0052f20d70845sm11256292pfa.150.2022.08.23.15.26.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Aug 2022 15:26:08 -0700 (PDT) From: Evan Green To: linux-kernel@vger.kernel.org Cc: gwendal@chromium.org, Eric Biggers , Matthew Garrett , jarkko@kernel.org, zohar@linux.ibm.com, linux-integrity@vger.kernel.org, Pavel Machek , apronin@chromium.org, dlunev@google.com, rjw@rjwysocki.net, linux-pm@vger.kernel.org, corbet@lwn.net, jejb@linux.ibm.com, Matthew Garrett , Matthew Garrett , Evan Green , David Howells , James Morris , Paul Moore , "Serge E. Hallyn" , keyrings@vger.kernel.org, linux-doc@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH v2 04/10] security: keys: trusted: Allow storage of PCR values in creation data Date: Tue, 23 Aug 2022 15:25:20 -0700 Message-Id: <20220823152108.v2.4.I32591db064b6cdc91850d777f363c9d05c985b39@changeid> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20220823222526.1524851-1-evgreen@chromium.org> References: <20220823222526.1524851-1-evgreen@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matthew Garrett When TPMs generate keys, they can also generate some information describing the state of the PCRs at creation time. This data can then later be certified by the TPM, allowing verification of the PCR values. This allows us to determine the state of the system at the time a key was generated. Add an additional argument to the trusted key creation options, allowing the user to provide the set of PCRs that should have their values incorporated into the creation data. From: Matthew Garrett Signed-off-by: Matthew Garrett Signed-off-by: Evan Green --- Matthew's original version of this patch is at: https://patchwork.kernel.org/patch/12096503/ (no changes since v1) .../security/keys/trusted-encrypted.rst | 4 +++ include/keys/trusted-type.h | 1 + security/keys/trusted-keys/trusted_tpm1.c | 9 +++++++ security/keys/trusted-keys/trusted_tpm2.c | 25 +++++++++++++++++-- 4 files changed, 37 insertions(+), 2 deletions(-) diff --git a/Documentation/security/keys/trusted-encrypted.rst b/Documentation/security/keys/trusted-encrypted.rst index 0bfb4c33974890..dc9e11bb4824da 100644 --- a/Documentation/security/keys/trusted-encrypted.rst +++ b/Documentation/security/keys/trusted-encrypted.rst @@ -199,6 +199,10 @@ Usage:: policyhandle= handle to an authorization policy session that defines the same policy and with the same hash algorithm as was used to seal the key. + creationpcrs= hex integer representing the set of PCR values to be + included in the PCR creation data. The bit corresponding + to each PCR should be 1 to be included, 0 to be ignored. + TPM2 only. "keyctl print" returns an ascii hex copy of the sealed key, which is in standard TPM_STORED_DATA format. The key length for new keys are always in bytes. diff --git a/include/keys/trusted-type.h b/include/keys/trusted-type.h index 209086fed240a5..8523d41507b2a4 100644 --- a/include/keys/trusted-type.h +++ b/include/keys/trusted-type.h @@ -54,6 +54,7 @@ struct trusted_key_options { uint32_t policydigest_len; unsigned char policydigest[MAX_DIGEST_SIZE]; uint32_t policyhandle; + uint32_t creation_pcrs; }; struct trusted_key_ops { diff --git a/security/keys/trusted-keys/trusted_tpm1.c b/security/keys/trusted-keys/trusted_tpm1.c index aa108bea6739b3..2975827c01bec0 100644 --- a/security/keys/trusted-keys/trusted_tpm1.c +++ b/security/keys/trusted-keys/trusted_tpm1.c @@ -713,6 +713,7 @@ enum { Opt_hash, Opt_policydigest, Opt_policyhandle, + Opt_creationpcrs, }; static const match_table_t key_tokens = { @@ -725,6 +726,7 @@ static const match_table_t key_tokens = { {Opt_hash, "hash=%s"}, {Opt_policydigest, "policydigest=%s"}, {Opt_policyhandle, "policyhandle=%s"}, + {Opt_creationpcrs, "creationpcrs=%s"}, {Opt_err, NULL} }; @@ -858,6 +860,13 @@ static int getoptions(char *c, struct trusted_key_payload *pay, return -EINVAL; opt->policyhandle = handle; break; + case Opt_creationpcrs: + if (!tpm2) + return -EINVAL; + res = kstrtoint(args[0].from, 16, &opt->creation_pcrs); + if (res < 0) + return -EINVAL; + break; default: return -EINVAL; } diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c index 1f166d4fa307a9..1d1470b880ca01 100644 --- a/security/keys/trusted-keys/trusted_tpm2.c +++ b/security/keys/trusted-keys/trusted_tpm2.c @@ -389,7 +389,7 @@ int tpm2_seal_trusted(struct tpm_chip *chip, struct tpm_buf buf; u32 hash; u32 flags; - int i; + int i, j; int rc; for (i = 0; i < ARRAY_SIZE(tpm2_hash_map); i++) { @@ -458,7 +458,28 @@ int tpm2_seal_trusted(struct tpm_chip *chip, tpm_buf_append_u16(&buf, 0); /* creation PCR */ - tpm_buf_append_u32(&buf, 0); + if (options->creation_pcrs) { + /* One bank */ + tpm_buf_append_u32(&buf, 1); + /* Which bank to use */ + tpm_buf_append_u16(&buf, hash); + /* Length of the PCR bitmask */ + tpm_buf_append_u8(&buf, 3); + /* PCR bitmask */ + for (i = 0; i < 3; i++) { + char tmp = 0; + + for (j = 0; j < 8; j++) { + char bit = (i * 8) + j; + + if (options->creation_pcrs & (1 << bit)) + tmp |= (1 << j); + } + tpm_buf_append_u8(&buf, tmp); + } + } else { + tpm_buf_append_u32(&buf, 0); + } if (buf.flags & TPM_BUF_OVERFLOW) { rc = -E2BIG; -- 2.31.0