From patchwork Fri May 5 14:21:50 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Roberto Sassu X-Patchwork-Id: 759046 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.sourceforge.net (lists.sourceforge.net [216.34.181.88]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3wKDft123Jz9s7f for ; Sat, 6 May 2017 00:24:22 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=sfs-ml-2.v29.ch3.sourceforge.com) by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1d6e9U-0005P1-Ql; Fri, 05 May 2017 14:24:12 +0000 Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1d6e9U-0005Ot-5l; Fri, 05 May 2017 14:24:12 +0000 Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of huawei.com designates 194.213.3.17 as permitted sender) client-ip=194.213.3.17; envelope-from=roberto.sassu@huawei.com; helo=lhrrgout.huawei.com; Received: from lhrrgout.huawei.com ([194.213.3.17]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1d6e9R-0006IZ-HL; Fri, 05 May 2017 14:24:12 +0000 Received: from 172.18.7.190 (EHLO LHREML712-CAH.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DGB13041; Fri, 05 May 2017 14:23:59 +0000 (GMT) Received: from roberto-HP-EliteDesk-800-G2-DM-65W.huawei.com (10.204.66.1) by smtpsuk.huawei.com (10.201.108.35) with Microsoft SMTP Server (TLS) id 14.3.301.0; Fri, 5 May 2017 15:23:49 +0100 From: Roberto Sassu To: Date: Fri, 5 May 2017 16:21:50 +0200 Message-ID: <20170505142152.29795-4-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170505142152.29795-1-roberto.sassu@huawei.com> References: <20170505142152.29795-1-roberto.sassu@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.204.66.1] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.590C8B00.006F, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: ad5c51728a8820b9a0feefe9ddbe255d X-Spam-Score: -1.5 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain -0.0 SPF_PASS SPF: sender matches SPF record -0.0 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain X-Headers-End: 1d6e9R-0006IZ-HL Cc: linux-ima-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [tpmdd-devel] [PATCH v2 3/5] tpm: pass multiple digests to tpm_pcr_extend() X-BeenThere: tpmdd-devel@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Tpm Device Driver maintainance List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: tpmdd-devel-bounces@lists.sourceforge.net The tpm_pcr_extend() definition has been modified to take an array of tpm2_digest structures, and the size of the array as arguments. The function now checks if callers provided a digests for each active PCR bank (or a SHA1 digest for TPM 1.2), to follow the recomendation from the TCG specifications. See commit c1f92b4b04ad ("tpm: enhance TPM 2.0 PCR extend to support multiple banks"). All banks should be extended because unused banks could be used by an attacker to hide the true integrity status of the platform. The only allowed exception to the rule above is to pass a SHA1 digest. It has been introduced to maintain compatibility with applications that expect to interact with a TPM 1.2, and provide only a SHA1 digest. In this case, the behavior of tpm_pcr_extend() is unchanged and remaining PCR banks are extended with that digest, padded with zeros. Signed-off-by: Roberto Sassu --- v2 - tpm_pcr_extend() arguments checked by tpm_pcr_check_input() - modified parameters of tpm_pcr_extend() drivers/char/tpm/tpm-interface.c | 76 +++++++++++++++++++++++++++++++++++++--- drivers/char/tpm/tpm.h | 6 ---- include/linux/tpm.h | 11 ++++-- 3 files changed, 80 insertions(+), 13 deletions(-) diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c index aac703e..4b08b02 100644 --- a/drivers/char/tpm/tpm-interface.c +++ b/drivers/char/tpm/tpm-interface.c @@ -867,6 +867,55 @@ static int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash, } /** + * tpm_pcr_check_input - check digests argument + * + * Return values: + * 1: input correct + * 0: fill digests with SHA1 digest padded with zeros + * -EINVAL: input incorrect + */ +static int tpm_pcr_check_input(struct tpm_chip *chip, int count, + struct tpm2_digest *digests) +{ + bool sha1_only; + int found = 0, not_found = 0; + int i, j; + + if (count <= 0 || digests == NULL) + return -EINVAL; + + sha1_only = (count == 1 && digests[0].alg_id == TPM2_ALG_SHA1); + + if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) + return sha1_only ? 1 : -EINVAL; + + if (sha1_only) + return 0; + + for (i = 0; i < ARRAY_SIZE(chip->active_banks) && + chip->active_banks[i] != TPM2_ALG_ERROR; i++) { + for (j = 0; j < count; j++) { + if (digests[j].alg_id == chip->active_banks[i]) { + found++; + break; + } + } + + if (j == count) { + dev_dbg(&chip->dev, "%s: missing algorithm 0x%X\n", + __func__, chip->active_banks[i]); + not_found++; + } + } + + if (not_found == 0 && found != count) + dev_dbg(&chip->dev, + "%s: duplicate or unsupported algorithm\n", __func__); + + return (not_found == 0 && found == count) ? 1 : -EINVAL; +} + +/** * tpm_pcr_extend - extend pcr value with hash * @chip_num: tpm idx # or AN& * @pcr_idx: pcr idx to extend @@ -876,29 +925,46 @@ static int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash, * isn't, protect against the chip disappearing, by incrementing * the module usage count. */ -int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) +int tpm_pcr_extend(u32 chip_num, int pcr_idx, int count, + struct tpm2_digest *digests) { int rc; struct tpm_chip *chip; struct tpm2_digest digest_list[ARRAY_SIZE(chip->active_banks)]; - u32 count = 0; + struct tpm2_digest *digests_ptr = digests; + u32 filled_count = 0; + u8 *hash; int i; chip = tpm_chip_find_get(chip_num); if (chip == NULL) return -ENODEV; - if (chip->flags & TPM_CHIP_FLAG_TPM2) { + rc = tpm_pcr_check_input(chip, count, digests); + if (rc < 0) { + dev_dbg(&chip->dev, "%s: invalid arguments\n", __func__); + tpm_put_ops(chip); + return rc; + } + + hash = digests[0].digest; + + if (!rc) { memset(digest_list, 0, sizeof(digest_list)); for (i = 0; i < ARRAY_SIZE(chip->active_banks) && chip->active_banks[i] != TPM2_ALG_ERROR; i++) { digest_list[i].alg_id = chip->active_banks[i]; memcpy(digest_list[i].digest, hash, TPM_DIGEST_SIZE); - count++; + filled_count++; } - rc = tpm2_pcr_extend(chip, pcr_idx, count, digest_list); + digests_ptr = digest_list; + count = filled_count; + } + + if (chip->flags & TPM_CHIP_FLAG_TPM2) { + rc = tpm2_pcr_extend(chip, pcr_idx, count, digests_ptr); tpm_put_ops(chip); return rc; } diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h index b22bc25..6d775c4 100644 --- a/drivers/char/tpm/tpm.h +++ b/drivers/char/tpm/tpm.h @@ -34,7 +34,6 @@ #include #include #include -#include enum tpm_const { TPM_MINOR = 224, /* officially assigned */ @@ -405,11 +404,6 @@ struct tpm_cmd_t { tpm_cmd_params params; } __packed; -struct tpm2_digest { - u16 alg_id; - u8 digest[SHA512_DIGEST_SIZE]; -} __packed; - /* A string buffer type for constructing TPM commands. This is based on the * ideas of string buffer code in security/keys/trusted.h but is heap based * in order to keep the stack usage minimal. diff --git a/include/linux/tpm.h b/include/linux/tpm.h index 9ecd12c..5c5a600 100644 --- a/include/linux/tpm.h +++ b/include/linux/tpm.h @@ -36,6 +36,11 @@ struct tpm_chip; struct trusted_key_payload; struct trusted_key_options; +struct tpm2_digest { + u16 alg_id; + u8 digest[SHA512_DIGEST_SIZE]; +} __packed; + enum TPM_OPS_FLAGS { TPM_OPS_AUTO_STARTUP = BIT(0), }; @@ -70,7 +75,8 @@ struct tpm_class_ops { extern int tpm_is_tpm2(u32 chip_num); extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf); -extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash); +extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, int count, + struct tpm2_digest *digests); extern int tpm_pcr_algorithms(u32 chip_num, int count, enum tpm2_algorithms *algorithms); extern enum hash_algo tpm_pcr_algo_to_crypto(enum tpm2_algorithms tpm_id); @@ -91,7 +97,8 @@ static inline int tpm_is_tpm2(u32 chip_num) static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { return -ENODEV; } -static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { +static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, int count, + struct tpm2_digest *digests) { return -ENODEV; } static inline int tpm_pcr_algorithms(u32 chip_num, int count,