Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1642056rwb; Fri, 23 Sep 2022 16:21:08 -0700 (PDT) X-Google-Smtp-Source: AMsMyM51CDlA0KSLHp/qSbG4Lg+EBE9zlFyLC/GOOvvU9L6f0onCAlhmhTXk+dXJSZ+d26aLzEqC X-Received: by 2002:a17:902:d492:b0:177:ee56:3b6a with SMTP id c18-20020a170902d49200b00177ee563b6amr10826875plg.132.1663975268033; Fri, 23 Sep 2022 16:21:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663975268; cv=none; d=google.com; s=arc-20160816; b=qhvs9hoeZ7jQTVD96BvZATDoJ9hELTXUBLkmyT895dN4ZcDQWCIzNsk/Lm7tOfyAZU 5fPImLYDvPJ5myitdaV1zEan7Uy+pAjHZm31U/JlRzOin1vDGRzUQ3ZiQ9uUIgbbO+Ey e2kHDebxkl3Q0Pkekzf+DqeHBExv9hFMo9KRzoliIvUeNAeZj0ztLrNlIQF6KcJ84SL6 FQt90itK5zFWI9kzSjB2TXFUj6sG4hmhMPNsDLULd7WfLfWeJhked4vy9PvHgPEN82K9 6gWeJi7YVjFhigk2McPDL+VNxD7wBdLG4gw9mddFe3VKMKY1fSx4s89Ob3bch189UKc2 Dayw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=hdQMsqBIYDf8xQ7R7tGLHzz9I5HM0m8MMLdxASUc44Y=; b=zeMIPAUWbLapthlluHnf5JTSSuZFaEzoGpUOavMaakCiJUY2t5V1QX9Qm3K0rCqpx0 8INPABsKdwKogl5Iykv3NA6WTkfxQ5jEZj8f1UvaL09SE0QBFcnGpQXyA23WpjwfrZJ2 UmZwSAQVQof47jkuw9nvdSoBPz6F8VloTCS+/NFfEZuV89i3whI15FNLXdAhRkDWfrBs DAX223xVzRSA/oNUVS/pncrLVnHkvHhv5KNR3AQluaCgcuzk7gDNyh4mO9gVbC9CldbI DYyRiGAbHlPSd5V85PqIz/yOJjPGWwdkhGKgdrBKXECjwHo8zVkhSKoH2KD2qdLPWmBJ AAQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=I5q3AKT5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q5-20020a170902bd8500b0017280be5a02si4146451pls.589.2022.09.23.16.20.56; Fri, 23 Sep 2022 16:21:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=I5q3AKT5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232228AbiIWWY2 (ORCPT + 99 others); Fri, 23 Sep 2022 18:24:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58760 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231517AbiIWWYZ (ORCPT ); Fri, 23 Sep 2022 18:24:25 -0400 Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D4A1F149D38 for ; Fri, 23 Sep 2022 15:24:22 -0700 (PDT) Received: by mail-ej1-x631.google.com with SMTP id hy2so3379406ejc.8 for ; Fri, 23 Sep 2022 15:24:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=hdQMsqBIYDf8xQ7R7tGLHzz9I5HM0m8MMLdxASUc44Y=; b=I5q3AKT58dZwj2NQAFLoX+IV6j+7obRBlimBQYtNG/nERjA41yfzPY1fzDCIU25/dt ItnLN77MxUv0GaE0vcDo7E8yddVIuL8h187wZ8wBqz1HT4CMvh0bPePaKG7ol9I2hDm0 XLl0NrO7Mf6yflot4ozYzss1dJ8Ya27q6AmB0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=hdQMsqBIYDf8xQ7R7tGLHzz9I5HM0m8MMLdxASUc44Y=; b=uk/AAMXV077/MCZDA1vidK2UGtys1oWI6IenWd7v7JFrwqz4iSUCBo13AhksEU8/6o nMg07GwdaXJQ74RnjT5DtQ4D2GFM9ArQRBRZOBKZhYtFxzUp7Jkl/3Knr2FUbVm8QVFs 7glVm8o2xdgZKuKuRzmzht1I/XxEGJ2WL9+4ariXbL6nHnua/wcmv1RF2xN+tn77spi1 hACGMv3FV1JVyUx1RmD3NNHXmSdPAFPypmPlwWkT55jZOzIKKZZ+U56rDeUtsxm/P5vs UvBZt6R4j6VHeQ6w961huKJzB66+fCrSfdCF3vOw3lrBOR67OsaBgwH4DFl3JnYQV825 5TRA== X-Gm-Message-State: ACrzQf2jtfNI4YnDi+oI3ujFg97YUIaa71n8q/FHZN/JDuh2Yl4IfH8p EPhxjgQfIQQwUckbCN4mHKOmvV7YamimFGWT X-Received: by 2002:a17:906:fe08:b0:77e:a290:988e with SMTP id wy8-20020a170906fe0800b0077ea290988emr8564196ejb.223.1663971862116; Fri, 23 Sep 2022 15:24:22 -0700 (PDT) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com. [209.85.128.43]) by smtp.gmail.com with ESMTPSA id o6-20020a17090608c600b00770c8e157ccsm4538176eje.136.2022.09.23.15.24.20 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 23 Sep 2022 15:24:20 -0700 (PDT) Received: by mail-wm1-f43.google.com with SMTP id o5so1078594wms.1 for ; Fri, 23 Sep 2022 15:24:20 -0700 (PDT) X-Received: by 2002:a05:600c:34c2:b0:3b4:76f2:9c3b with SMTP id d2-20020a05600c34c200b003b476f29c3bmr13898395wmq.179.1663971860021; Fri, 23 Sep 2022 15:24:20 -0700 (PDT) MIME-Version: 1.0 References: <20220823222526.1524851-1-evgreen@chromium.org> <20220823152108.v2.7.Ibd067e73916b9fae268a5824c2dd037416426af8@changeid> <202209201610.C06F8CA@keescook> In-Reply-To: <202209201610.C06F8CA@keescook> From: Evan Green Date: Fri, 23 Sep 2022 15:23:43 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2 07/10] PM: hibernate: Use TPM-backed keys to encrypt image To: Kees Cook Cc: LKML , Gwendal Grignou , Eric Biggers , Matthew Garrett , Jarkko Sakkinen , Mimi Zohar , linux-integrity@vger.kernel.org, Pavel Machek , apronin@chromium.org, Daniil Lunev , "Rafael J. Wysocki" , Linux PM , Jonathan Corbet , "James E.J. Bottomley" , Len Brown , "Rafael J. Wysocki" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 20, 2022 at 4:16 PM Kees Cook wrote: > > On Tue, Aug 23, 2022 at 03:25:23PM -0700, Evan Green wrote: > > When using encrypted hibernate images, have the TPM create a key for us > > and seal it. By handing back a sealed blob instead of the raw key, we > > prevent usermode from being able to decrypt and tamper with the > > hibernate image on a different machine. > > > > We'll also go through the motions of having PCR23 set to a known value at > > the time of key creation and unsealing. Currently there's nothing that > > enforces the contents of PCR23 as a condition to unseal the key blob, > > that will come in a later change. > > > > Sourced-from: Matthew Garrett > > Signed-off-by: Evan Green > > > > --- > > Matthew's incarnation of this patch is at: > > https://patchwork.kernel.org/project/linux-pm/patch/20210220013255.1083202-9-matthewgarrett@google.com/ > > > > Changes in v2: > > - Rework load/create_kernel_key() to eliminate a label (Andrey) > > - Call put_device() needed from calling tpm_default_chip(). > > > > kernel/power/Kconfig | 2 + > > kernel/power/snapenc.c | 207 +++++++++++++++++++++++++++++++++++++++-- > > kernel/power/user.h | 1 + > > 3 files changed, 201 insertions(+), 9 deletions(-) > > > > diff --git a/kernel/power/Kconfig b/kernel/power/Kconfig > > index cd574af0b43379..ff15361c5d8fad 100644 > > --- a/kernel/power/Kconfig > > +++ b/kernel/power/Kconfig > > @@ -96,6 +96,8 @@ config ENCRYPTED_HIBERNATION > > bool "Encryption support for userspace snapshots" > > depends on HIBERNATION_SNAPSHOT_DEV > > depends on CRYPTO_AEAD2=y > > + depends on KEYS > > + depends on TRUSTED_KEYS > > nit: TRUSTED_KEYS already depends on KEYS, so the KEYS depend can be > dropped. > > > default n > > help > > Enable support for kernel-based encryption of hibernation snapshots > > diff --git a/kernel/power/snapenc.c b/kernel/power/snapenc.c > > index cb90692d6ab83a..90079f6d4f184b 100644 > > --- a/kernel/power/snapenc.c > > +++ b/kernel/power/snapenc.c > > @@ -4,13 +4,23 @@ > > #include > > #include > > #include > > +#include > > +#include > > #include > > #include > > +#include > > #include > > > > #include "power.h" > > #include "user.h" > > > > +/* sha256("To sleep, perchance to dream") */ > > +static struct tpm_digest known_digest = { .alg_id = TPM_ALG_SHA256, > > + .digest = {0x92, 0x78, 0x3d, 0x79, 0x2d, 0x00, 0x31, 0xb0, 0x55, 0xf9, > > + 0x1e, 0x0d, 0xce, 0x83, 0xde, 0x1d, 0xc4, 0xc5, 0x8e, 0x8c, > > + 0xf1, 0x22, 0x38, 0x6c, 0x33, 0xb1, 0x14, 0xb7, 0xec, 0x05, > > + 0x5f, 0x49}}; > > + > > /* Encrypt more data from the snapshot into the staging area. */ > > static int snapshot_encrypt_refill(struct snapshot_data *data) > > { > > @@ -313,6 +323,12 @@ void snapshot_teardown_encryption(struct snapshot_data *data) > > { > > int i; > > > > + if (data->key) { > > + key_revoke(data->key); > > + key_put(data->key); > > + data->key = NULL; > > + } > > + > > if (data->aead_req) { > > aead_request_free(data->aead_req); > > data->aead_req = NULL; > > @@ -381,11 +397,83 @@ static int snapshot_setup_encryption_common(struct snapshot_data *data) > > return rc; > > } > > > > +static int snapshot_create_kernel_key(struct snapshot_data *data) > > +{ > > + const struct cred *cred = current_cred(); > > + struct tpm_digest *digests = NULL; > > + struct tpm_chip *chip; > > + struct key *key = NULL; > > + int ret, i; > > + /* Create a key sealed by the SRK. */ > > + char *keyinfo = "new\t32\tkeyhandle=0x81000000"; > > + > > + chip = tpm_default_chip(); > > + if (!chip) > > + return -ENODEV; > > + > > + if (!(tpm_is_tpm2(chip))) { > > + ret = -ENODEV; > > + goto out_dev; > > + } > > + > > + ret = tpm_pcr_reset(chip, 23); > > + if (ret) > > + goto out; > > + > > + digests = kcalloc(chip->nr_allocated_banks, sizeof(struct tpm_digest), > > + GFP_KERNEL); > > + if (!digests) { > > + ret = -ENOMEM; > > + goto out; > > + } > > + > > + for (i = 0; i <= chip->nr_allocated_banks; i++) { > > + digests[i].alg_id = chip->allocated_banks[i].alg_id; > > + if (digests[i].alg_id == known_digest.alg_id) > > + memcpy(&digests[i], &known_digest, sizeof(known_digest)); > > + } > > + > > + ret = tpm_pcr_extend(chip, 23, digests); > > + if (ret != 0) > > + goto out; > > + > > + key = key_alloc(&key_type_trusted, "swsusp", GLOBAL_ROOT_UID, > > + GLOBAL_ROOT_GID, cred, 0, KEY_ALLOC_NOT_IN_QUOTA, > > + NULL); > > + > > + if (IS_ERR(key)) { > > + ret = PTR_ERR(key); > > + key = NULL; > > + goto out; > > + } > > + > > + ret = key_instantiate_and_link(key, keyinfo, strlen(keyinfo) + 1, NULL, > > + NULL); > > + if (ret != 0) > > + goto out; > > + > > + data->key = key; > > + key = NULL; > > + > > +out: > > + if (key) { > > + key_revoke(key); > > + key_put(key); > > + } > > + > > + kfree(digests); > > + tpm_pcr_reset(chip, 23); > > + > > +out_dev: > > + put_device(&chip->dev); > > + return ret; > > +} > > + > > int snapshot_get_encryption_key(struct snapshot_data *data, > > struct uswsusp_key_blob __user *key) > > { > > - u8 aead_key[SNAPSHOT_ENCRYPTION_KEY_SIZE]; > > u8 nonce[USWSUSP_KEY_NONCE_SIZE]; > > + struct trusted_key_payload *payload; > > int rc; > > /* Don't pull a random key from a world that can be reset. */ > > if (data->ready) > > @@ -399,21 +487,28 @@ int snapshot_get_encryption_key(struct snapshot_data *data, > > get_random_bytes(nonce, sizeof(nonce)); > > memcpy(&data->nonce_low, &nonce[0], sizeof(data->nonce_low)); > > memcpy(&data->nonce_high, &nonce[8], sizeof(data->nonce_high)); > > - /* Build a random key */ > > - get_random_bytes(aead_key, sizeof(aead_key)); > > - rc = crypto_aead_setkey(data->aead_tfm, aead_key, sizeof(aead_key)); > > + > > + /* Create a kernel key, and set it. */ > > + rc = snapshot_create_kernel_key(data); > > + if (rc) > > + goto fail; > > + > > + payload = data->key->payload.data[0]; > > + /* Install the key */ > > + rc = crypto_aead_setkey(data->aead_tfm, payload->key, SNAPSHOT_ENCRYPTION_KEY_SIZE); > > if (rc) > > goto fail; > > > > - /* Hand the key back to user mode (to be changed!) */ > > - rc = put_user(sizeof(struct uswsusp_key_blob), &key->blob_len); > > + /* Hand the key back to user mode in sealed form. */ > > + rc = put_user(payload->blob_len, &key->blob_len); > > if (rc) > > goto fail; > > > > - rc = copy_to_user(&key->blob, &aead_key, sizeof(aead_key)); > > + rc = copy_to_user(&key->blob, &payload->blob, payload->blob_len); > > if (rc) > > goto fail; > > > > + /* The nonce just gets handed back in the clear. */ > > rc = copy_to_user(&key->nonce, &nonce, sizeof(nonce)); > > if (rc) > > goto fail; > > @@ -425,10 +520,99 @@ int snapshot_get_encryption_key(struct snapshot_data *data, > > return rc; > > } > > > > +static int snapshot_load_kernel_key(struct snapshot_data *data, > > + struct uswsusp_key_blob *blob) > > +{ > > + > > + const struct cred *cred = current_cred(); > > + char *keytemplate = "load\t%s\tkeyhandle=0x81000000"; > > + struct tpm_digest *digests = NULL; > > + char *blobstring = NULL; > > + char *keyinfo = NULL; > > + struct tpm_chip *chip; > > + struct key *key = NULL; > > + int i, ret; > > + > > + chip = tpm_default_chip(); > > + if (!chip) > > + return -ENODEV; > > + > > + if (!(tpm_is_tpm2(chip))) { > > + ret = -ENODEV; > > + goto out_dev; > > + } > > + > > + ret = tpm_pcr_reset(chip, 23); > > + if (ret) > > + goto out; > > + > > + digests = kcalloc(chip->nr_allocated_banks, sizeof(struct tpm_digest), > > + GFP_KERNEL); > > + if (!digests) > > + goto out; > > + > > + for (i = 0; i <= chip->nr_allocated_banks; i++) { > > + digests[i].alg_id = chip->allocated_banks[i].alg_id; > > + if (digests[i].alg_id == known_digest.alg_id) > > + memcpy(&digests[i], &known_digest, sizeof(known_digest)); > > + } > > So I can confirm my unerstanding here: this is just putting a starting > value in the PCR? (As mentioned in the commit log?) Correct, the PCR is reset above and set (well, extended from 0) to the magic value here ahead of the unseal operation. Once we add the policy in patch 10, the TPM will refuse to unseal the key unless PCR23 is set to this magic value. > > > + > > + ret = tpm_pcr_extend(chip, 23, digests); > > + if (ret != 0) > > + goto out; > > + > > + blobstring = kmalloc(blob->blob_len * 2, GFP_KERNEL); > > + if (!blobstring) { > > + ret = -ENOMEM; > > + goto out; > > + } > > + > > + bin2hex(blobstring, blob->blob, blob->blob_len); > > + keyinfo = kasprintf(GFP_KERNEL, keytemplate, blobstring); > > + if (!keyinfo) { > > + ret = -ENOMEM; > > + goto out; > > + } > > + > > + key = key_alloc(&key_type_trusted, "swsusp", GLOBAL_ROOT_UID, > > + GLOBAL_ROOT_GID, cred, 0, KEY_ALLOC_NOT_IN_QUOTA, > > + NULL); > > + > > + if (IS_ERR(key)) { > > + ret = PTR_ERR(key); > > + key = NULL; > > + goto out; > > + } > > + > > + ret = key_instantiate_and_link(key, keyinfo, strlen(keyinfo) + 1, NULL, > > + NULL); > > You want to keep the trailing NUL byte here so it's easier to read back > later? Reading it back will need to verify the trailing NUL regardless. > (Does this get read back?) Are you referring to the trailing nul on keyinfo? The keyinfo string is only used within this function, as key_instantiate_and_link() receives it as a parameter string. I can see that trusted_instantiate() also null-terminates the buffer defensively for itself, but it still seemed prudent to hand in a terminated string. I can remove the + 1 if you think it's better. > > > + if (ret != 0) > > + goto out; > > + > > + data->key = key; > > + key = NULL; > > + > > +out: > > + if (key) { > > + key_revoke(key); > > + key_put(key); > > + } > > + > > + kfree(keyinfo); > > + kfree(blobstring); > > + kfree(digests); > > + tpm_pcr_reset(chip, 23); > > + > > +out_dev: > > + put_device(&chip->dev); > > + return ret; > > +} > > + > > int snapshot_set_encryption_key(struct snapshot_data *data, > > struct uswsusp_key_blob __user *key) > > { > > struct uswsusp_key_blob blob; > > + struct trusted_key_payload *payload; > > int rc; > > > > /* It's too late if data's been pushed in. */ > > @@ -444,13 +628,18 @@ int snapshot_set_encryption_key(struct snapshot_data *data, > > if (rc) > > goto crypto_setup_fail; > > > > - if (blob.blob_len != sizeof(struct uswsusp_key_blob)) { > > + if (blob.blob_len > sizeof(key->blob)) { > > rc = -EINVAL; > > goto crypto_setup_fail; > > } > > > > + rc = snapshot_load_kernel_key(data, &blob); > > + if (rc) > > + goto crypto_setup_fail; > > + > > + payload = data->key->payload.data[0]; > > rc = crypto_aead_setkey(data->aead_tfm, > > - blob.blob, > > + payload->key, > > SNAPSHOT_ENCRYPTION_KEY_SIZE); > > > > if (rc) > > diff --git a/kernel/power/user.h b/kernel/power/user.h > > index 6823e2eba7ec53..591b30bb213349 100644 > > --- a/kernel/power/user.h > > +++ b/kernel/power/user.h > > @@ -31,6 +31,7 @@ struct snapshot_data { > > uint64_t crypt_total; > > uint64_t nonce_low; > > uint64_t nonce_high; > > + struct key *key; > > #endif > > > > }; > > -- > > 2.31.0 > > > > -- > Kees Cook