Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1320159rwb; Tue, 27 Sep 2022 11:16:35 -0700 (PDT) X-Google-Smtp-Source: AMsMyM43T/6F+8pYVYYX5qqMiPSl+k16TBhLLcx5oEqTGk7nVqtFMzRcbXxmDJtcqQ3/NPV6eG4H X-Received: by 2002:a63:2253:0:b0:43c:c924:e56a with SMTP id t19-20020a632253000000b0043cc924e56amr7212238pgm.122.1664302595520; Tue, 27 Sep 2022 11:16:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664302595; cv=none; d=google.com; s=arc-20160816; b=j4h+aAat3dVAL5TNM0z3cu9/B3+g5Lgh4MfJxk+asxNLUtOfc40Pl0Li+FQc3exKO9 QQkPqP2yiIAg+gi5E7jufjgET9y970e18TEiZ+KL7uNFHGFk54Ot93RuUyy7dY6Fblyh 1lPTA6/JmHexbmN6PF1NvelYRkxfW4M/9HFtAAS4eZlpVXNXaUkIS8nAOT2cx1/9rOrN zlFzPdEb1v2glSA3ewjT69snMBAt/Wl4dCf4D1OR2QcOQ+6ZtXR8jTc54yNmklFFMi4k ogjhzLJuWN7MaRU8FQz9019pfY4RNYrhR0FNv6n5x3KDhHBQ9MEjqMIVTtQpXXf4mY14 Osqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Osgivv1xZqrvAofoxgxtt3Fhv5buczncGhXN6IzEZgM=; b=dtA/jG2QRZu3Apl0nr49OzuCW/UDwdZdN6tV7UG6y/3AJ4hCJ8edMm6cM0RrX2sUhn 8So1N/MFEqFvus0lluqEcIdxIH04iSc0Y8uZLp2TKM9C0Zr6pJRR+K6LtA30HcAH+XL7 xiNvACfTiJdTjEtdYpUbHYZQBqRGqIa0l8Z5yDdHkTsi0J/1T0cxSQ61KprOuIbzihle PXQYvEQqDIlZEmxHNd3p4BpniGaREOvxecoru6BCtL3RbCA5FiHuYi1uB4IKxNfxICE2 pAwQI5tl4xcmbydjWLnPMThP+thcJGcouXb9DsqiFNVLkxjcGb6cbnT6907XKRCvWB01 gaqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MnrEQZGG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s17-20020a17090a881100b002007ef7a2a0si14724651pjn.71.2022.09.27.11.16.21; Tue, 27 Sep 2022 11:16:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MnrEQZGG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231863AbiI0Qu4 (ORCPT + 99 others); Tue, 27 Sep 2022 12:50:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53130 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233254AbiI0QuL (ORCPT ); Tue, 27 Sep 2022 12:50:11 -0400 Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B6955A2EC for ; Tue, 27 Sep 2022 09:50:07 -0700 (PDT) Received: by mail-pg1-x535.google.com with SMTP id v4so9893828pgi.10 for ; Tue, 27 Sep 2022 09:50:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date; bh=Osgivv1xZqrvAofoxgxtt3Fhv5buczncGhXN6IzEZgM=; b=MnrEQZGGGi7Zz5FsNy2Hp51B9vBhT3Qw6PnZqJ8R1qlLmr9ahYCagnw0WtklFIQ77J WB9FmgJGeez4cna1TcM4yZVBghJmmKK/4rqdTnorUHJKRzyIazqEyoYoDR0ScsJQaQgY Lb3shhu74tkzqegJoyfLluUZF7kePYYkzwBNc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date; bh=Osgivv1xZqrvAofoxgxtt3Fhv5buczncGhXN6IzEZgM=; b=53AkN+R04iGXT76/cEN66y6Wl8QmKaPwQpzDypXaXgXgaeLIYV0NFx305lkFsMGWW8 44o3tl+R6Hqx+V2ehpKZ5k/xp10PAVyQhimRa5MF9bAd3AkxpwDKLEj3t9x/DuCULS2p sYzXN0jcw7pRCz1EOVR35lxbLpo6SnNPeGwrMLoge2eG9JDuCd5mXjpoWkrGZH8o5WR/ ugskqTKhFJnC5LnVsWzUiHzmAdbAB9lOs9IEZ0uSuZ/cRNkKsWPm4u9jDtjJretJEbUE XJv0uFQ1q9pS4ZtAdbraKplM8zPE+531HAHaeoR9jqmy3WgDENLkte/ZbNFPj5rz8wom DioA== X-Gm-Message-State: ACrzQf1RiHJGInVzO4E3wfGUBPcYSUIWKO/jmQxbMLYvyF9oo3XqkfYh 0Dwqaeas8AHQ1O+cLPIqJp1c1B5rR9rT8cmoFq8= X-Received: by 2002:a63:8643:0:b0:440:2914:c57 with SMTP id x64-20020a638643000000b0044029140c57mr921010pgd.604.1664297406379; Tue, 27 Sep 2022 09:50:06 -0700 (PDT) Received: from evgreen-glaptop.lan ([73.231.74.141]) by smtp.gmail.com with ESMTPSA id p13-20020a63950d000000b00434272fe870sm1753509pgd.88.2022.09.27.09.50.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 27 Sep 2022 09:50:05 -0700 (PDT) From: Evan Green To: linux-kernel@vger.kernel.org Cc: linux-integrity@vger.kernel.org, apronin@chromium.org, dlunev@google.com, jarkko@kernel.org, Pavel Machek , Ben Boeckel , rjw@rjwysocki.net, corbet@lwn.net, linux-pm@vger.kernel.org, zohar@linux.ibm.com, Kees Cook , Eric Biggers , jejb@linux.ibm.com, gwendal@chromium.org, Matthew Garrett , Matthew Garrett , Matthew Garrett , Evan Green , David Howells , James Morris , Paul Moore , "Serge E. Hallyn" , keyrings@vger.kernel.org, linux-doc@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH v3 05/11] security: keys: trusted: Allow storage of PCR values in creation data Date: Tue, 27 Sep 2022 09:49:16 -0700 Message-Id: <20220927094559.v3.5.I32591db064b6cdc91850d777f363c9d05c985b39@changeid> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20220927164922.3383711-1-evgreen@chromium.org> References: <20220927164922.3383711-1-evgreen@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matthew Garrett When TPMs generate keys, they can also generate some information describing the state of the PCRs at creation time. This data can then later be certified by the TPM, allowing verification of the PCR values. This allows us to determine the state of the system at the time a key was generated. Add an additional argument to the trusted key creation options, allowing the user to provide the set of PCRs that should have their values incorporated into the creation data. Link: https://lore.kernel.org/lkml/20210220013255.1083202-6-matthewgarrett@google.com/ Signed-off-by: Matthew Garrett Signed-off-by: Evan Green --- Changes in v3: - Clarified creationpcrs documentation (Ben) .../security/keys/trusted-encrypted.rst | 6 +++++ include/keys/trusted-type.h | 1 + security/keys/trusted-keys/trusted_tpm1.c | 9 +++++++ security/keys/trusted-keys/trusted_tpm2.c | 25 +++++++++++++++++-- 4 files changed, 39 insertions(+), 2 deletions(-) diff --git a/Documentation/security/keys/trusted-encrypted.rst b/Documentation/security/keys/trusted-encrypted.rst index 0bfb4c33974890..fd9c7cd72a6254 100644 --- a/Documentation/security/keys/trusted-encrypted.rst +++ b/Documentation/security/keys/trusted-encrypted.rst @@ -199,6 +199,12 @@ Usage:: policyhandle= handle to an authorization policy session that defines the same policy and with the same hash algorithm as was used to seal the key. + creationpcrs= hex integer representing the set of PCRs to be + included in the creation data. For each bit set, the + corresponding PCR will be included in the key creation + data. Bit 0 corresponds to PCR0. Currently only the first + PC standard 24 PCRs are supported on the currently active + bank. Leading zeroes are optional. TPM2 only. "keyctl print" returns an ascii hex copy of the sealed key, which is in standard TPM_STORED_DATA format. The key length for new keys are always in bytes. diff --git a/include/keys/trusted-type.h b/include/keys/trusted-type.h index 209086fed240a5..8523d41507b2a4 100644 --- a/include/keys/trusted-type.h +++ b/include/keys/trusted-type.h @@ -54,6 +54,7 @@ struct trusted_key_options { uint32_t policydigest_len; unsigned char policydigest[MAX_DIGEST_SIZE]; uint32_t policyhandle; + uint32_t creation_pcrs; }; struct trusted_key_ops { diff --git a/security/keys/trusted-keys/trusted_tpm1.c b/security/keys/trusted-keys/trusted_tpm1.c index aa108bea6739b3..2975827c01bec0 100644 --- a/security/keys/trusted-keys/trusted_tpm1.c +++ b/security/keys/trusted-keys/trusted_tpm1.c @@ -713,6 +713,7 @@ enum { Opt_hash, Opt_policydigest, Opt_policyhandle, + Opt_creationpcrs, }; static const match_table_t key_tokens = { @@ -725,6 +726,7 @@ static const match_table_t key_tokens = { {Opt_hash, "hash=%s"}, {Opt_policydigest, "policydigest=%s"}, {Opt_policyhandle, "policyhandle=%s"}, + {Opt_creationpcrs, "creationpcrs=%s"}, {Opt_err, NULL} }; @@ -858,6 +860,13 @@ static int getoptions(char *c, struct trusted_key_payload *pay, return -EINVAL; opt->policyhandle = handle; break; + case Opt_creationpcrs: + if (!tpm2) + return -EINVAL; + res = kstrtoint(args[0].from, 16, &opt->creation_pcrs); + if (res < 0) + return -EINVAL; + break; default: return -EINVAL; } diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c index e1388d7d799a36..a7ad83bc0e5396 100644 --- a/security/keys/trusted-keys/trusted_tpm2.c +++ b/security/keys/trusted-keys/trusted_tpm2.c @@ -401,7 +401,7 @@ int tpm2_seal_trusted(struct tpm_chip *chip, struct tpm_buf buf; u32 hash; u32 flags; - int i; + int i, j; int rc; for (i = 0; i < ARRAY_SIZE(tpm2_hash_map); i++) { @@ -470,7 +470,28 @@ int tpm2_seal_trusted(struct tpm_chip *chip, tpm_buf_append_u16(&buf, 0); /* creation PCR */ - tpm_buf_append_u32(&buf, 0); + if (options->creation_pcrs) { + /* One bank */ + tpm_buf_append_u32(&buf, 1); + /* Which bank to use */ + tpm_buf_append_u16(&buf, hash); + /* Length of the PCR bitmask */ + tpm_buf_append_u8(&buf, 3); + /* PCR bitmask */ + for (i = 0; i < 3; i++) { + char tmp = 0; + + for (j = 0; j < 8; j++) { + char bit = (i * 8) + j; + + if (options->creation_pcrs & (1 << bit)) + tmp |= (1 << j); + } + tpm_buf_append_u8(&buf, tmp); + } + } else { + tpm_buf_append_u32(&buf, 0); + } if (buf.flags & TPM_BUF_OVERFLOW) { rc = -E2BIG; -- 2.31.0