From patchwork Fri Nov 11 23:16:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Evan Green X-Patchwork-Id: 19051 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp1015629wru; Fri, 11 Nov 2022 15:21:05 -0800 (PST) X-Google-Smtp-Source: AA0mqf7CES8n1aLKNEeyZUrdbtrKLz3epN/MJHXMU68RoU+tNthlNk5DOA6YoIa8k4qZ4XC3d7G4 X-Received: by 2002:a05:6a00:4489:b0:565:dc13:bb6b with SMTP id cu9-20020a056a00448900b00565dc13bb6bmr4816357pfb.45.1668208865608; Fri, 11 Nov 2022 15:21:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668208865; cv=none; d=google.com; s=arc-20160816; b=ppXQ6VsvOHxTvJHq5UCvfyoAvA1q3dQ7hDMzWXBndtOSrOqZ8O91De5+ZQKQCt2mcL 4Gr91ywUf+fou8pfsBiNXJbAD1isKmlFbClbcbFjmiUJCTEI9EcBSv76m0Zm/Kb8RIws 1b9TEpCLZQBnrSBdN0BGOMEbPrFEviaiYuEDSnpA4nCWRMkvxEi1XTDeFhIzITfp+0zY sR2AgiQA2A2Zhn1WmGryuTZLGrSC5YUvv2jB85ALVYMS6scqii9kXY1ec56XD+ka8APq mmcmtUy7EGyXUn8GzB5bGWZ7oM7gj47Ggxjrn70wurN+HUctLhZ7AHae3SBCM6qWUxBY hK+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=0i0QEQiN8N6kWJaFnnOPreeJ6mOVw1qdLR4E8EZb574=; b=kK2yJGXa+y7q+/W6S6mn6l3OxNax60QnBDC12pyFuNB8qcICahp8PGzoy8aEB1FpFf l/N/57y5cBx4MInnmQrHVK28wPrcGUxC2n453uHkUJGYi3ZnT52psQSoNmfEToF6RmxQ aYYlU6a6TASf9w6kpDUXCRfGYqvoOGUbroyCTSDp961DDgdIrQ0dfHaYhPqFuTIjZLRl wV51ypJOhZwuoSMdA9epiIgjqowVvDlpVUmay0DpZfUaPKvey7jr33slZUjpVNswx+Re aZlzpMI3QSHRhVQMaKdyvpa4MmaAp7j9S1ZaQ5+qCLydoEao3ltgUII0HGt1V3F/Z4NI FoDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=j0sOuXL3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h11-20020a170902f70b00b00186c3afe179si3643981plo.422.2022.11.11.15.20.52; Fri, 11 Nov 2022 15:21:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=j0sOuXL3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234610AbiKKXUR (ORCPT + 99 others); Fri, 11 Nov 2022 18:20:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47092 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234522AbiKKXTz (ORCPT ); Fri, 11 Nov 2022 18:19:55 -0500 Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DF0D82937 for ; Fri, 11 Nov 2022 15:19:49 -0800 (PST) Received: by mail-pl1-x62c.google.com with SMTP id y4so5392521plb.2 for ; Fri, 11 Nov 2022 15:19:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0i0QEQiN8N6kWJaFnnOPreeJ6mOVw1qdLR4E8EZb574=; b=j0sOuXL3t/5MxHh4ziRJcxsV6WuCyyRXKIUnXkmE9l2HHtMnM2zwez5AC0YhPLvPKr lfjYYzI0IOdaR0Tk+uk0AfLK/Rh1SvJxA29G2dXPRsKFpblpjDjAMSlYidKoY8TIM7vQ 9vu8va++By1TIkdKup+QjSA9y0T72AksG31ws= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0i0QEQiN8N6kWJaFnnOPreeJ6mOVw1qdLR4E8EZb574=; b=FhJtcVXjHbh49FPdsZIfS4SM9e56q9PaG2sC8AdNsHQZIm9t7F9SLXJOitbx2AWGyg 6CbkoSQJ4ZejXjppbHr9gzGDK75+sy7kRkLTOSn33QpSW07hN5fSwm/TgPEmKujZ9CLf JdGLEVIdxJRTzoVcIgAeA7XbSmJHCNiQa44rea1MQQEX7EQfKZuZq+YD3myzRljQCB9h f+UH92u8YHV7X8Za5Y5HDqTQVrS8VzjZghhscw0At345BdkduQB2gZbgTdT+YH/vaCVL ZfsRRaVDTboRknMzzciuauH4rCeyTcXVD99INRbo5cTMl+g0EPvSnWEIcLj4yxlx5MZm 0KQA== X-Gm-Message-State: ANoB5pm5K1WrJm0AsXYEAmh8N8+Nzh3WiS0LI7DByC0ziZaTpSvNir0q JWnOx38Ahx5iC5LqHoz0Hr9EI5Q2mtZbXU6C X-Received: by 2002:a17:90b:1891:b0:210:4438:2d40 with SMTP id mn17-20020a17090b189100b0021044382d40mr4125013pjb.196.1668208788735; Fri, 11 Nov 2022 15:19:48 -0800 (PST) Received: from evgreen-glaptop.lan ([98.45.28.95]) by smtp.gmail.com with ESMTPSA id x128-20020a623186000000b0056da2ad6503sm2106900pfx.39.2022.11.11.15.19.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Nov 2022 15:19:48 -0800 (PST) From: Evan Green To: linux-kernel@vger.kernel.org Cc: corbet@lwn.net, linux-integrity@vger.kernel.org, Eric Biggers , gwendal@chromium.org, dianders@chromium.org, apronin@chromium.org, Pavel Machek , Ben Boeckel , rjw@rjwysocki.net, jejb@linux.ibm.com, Kees Cook , dlunev@google.com, zohar@linux.ibm.com, Matthew Garrett , jarkko@kernel.org, linux-pm@vger.kernel.org, Matthew Garrett , Evan Green , Ben Boeckel , David Howells , James Morris , Paul Moore , "Serge E. Hallyn" , keyrings@vger.kernel.org, linux-doc@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH v5 05/11] security: keys: trusted: Allow storage of PCR values in creation data Date: Fri, 11 Nov 2022 15:16:30 -0800 Message-Id: <20221111151451.v5.5.I32591db064b6cdc91850d777f363c9d05c985b39@changeid> X-Mailer: git-send-email 2.38.1.431.g37b22c650d-goog In-Reply-To: <20221111231636.3748636-1-evgreen@chromium.org> References: <20221111231636.3748636-1-evgreen@chromium.org> MIME-Version: 1.0 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749243779294770891?= X-GMAIL-MSGID: =?utf-8?q?1749243779294770891?= From: Matthew Garrett When TPMs generate keys, they can also generate some information describing the state of the PCRs at creation time. This data can then later be certified by the TPM, allowing verification of the PCR values. This allows us to determine the state of the system at the time a key was generated. Add an additional argument to the trusted key creation options, allowing the user to provide the set of PCRs that should have their values incorporated into the creation data. Link: https://lore.kernel.org/lkml/20210220013255.1083202-6-matthewgarrett@google.com/ Signed-off-by: Matthew Garrett Signed-off-by: Evan Green Reviewed-by: Ben Boeckel Reviewed-by: Kees Cook --- Changes in v5: - Make Matthew's tag match author Changes in v3: - Clarified creationpcrs documentation (Ben) .../security/keys/trusted-encrypted.rst | 6 +++++ include/keys/trusted-type.h | 1 + security/keys/trusted-keys/trusted_tpm1.c | 9 +++++++ security/keys/trusted-keys/trusted_tpm2.c | 25 +++++++++++++++++-- 4 files changed, 39 insertions(+), 2 deletions(-) diff --git a/Documentation/security/keys/trusted-encrypted.rst b/Documentation/security/keys/trusted-encrypted.rst index 9bc9db8ec6517c..a1872964fe862f 100644 --- a/Documentation/security/keys/trusted-encrypted.rst +++ b/Documentation/security/keys/trusted-encrypted.rst @@ -199,6 +199,12 @@ Usage:: policyhandle= handle to an authorization policy session that defines the same policy and with the same hash algorithm as was used to seal the key. + creationpcrs= hex integer representing the set of PCRs to be + included in the creation data. For each bit set, the + corresponding PCR will be included in the key creation + data. Bit 0 corresponds to PCR0. Currently only the first + PC standard 24 PCRs are supported on the currently active + bank. Leading zeroes are optional. TPM2 only. "keyctl print" returns an ascii hex copy of the sealed key, which is in standard TPM_STORED_DATA format. The key length for new keys are always in bytes. diff --git a/include/keys/trusted-type.h b/include/keys/trusted-type.h index 209086fed240a5..8523d41507b2a4 100644 --- a/include/keys/trusted-type.h +++ b/include/keys/trusted-type.h @@ -54,6 +54,7 @@ struct trusted_key_options { uint32_t policydigest_len; unsigned char policydigest[MAX_DIGEST_SIZE]; uint32_t policyhandle; + uint32_t creation_pcrs; }; struct trusted_key_ops { diff --git a/security/keys/trusted-keys/trusted_tpm1.c b/security/keys/trusted-keys/trusted_tpm1.c index aa108bea6739b3..2975827c01bec0 100644 --- a/security/keys/trusted-keys/trusted_tpm1.c +++ b/security/keys/trusted-keys/trusted_tpm1.c @@ -713,6 +713,7 @@ enum { Opt_hash, Opt_policydigest, Opt_policyhandle, + Opt_creationpcrs, }; static const match_table_t key_tokens = { @@ -725,6 +726,7 @@ static const match_table_t key_tokens = { {Opt_hash, "hash=%s"}, {Opt_policydigest, "policydigest=%s"}, {Opt_policyhandle, "policyhandle=%s"}, + {Opt_creationpcrs, "creationpcrs=%s"}, {Opt_err, NULL} }; @@ -858,6 +860,13 @@ static int getoptions(char *c, struct trusted_key_payload *pay, return -EINVAL; opt->policyhandle = handle; break; + case Opt_creationpcrs: + if (!tpm2) + return -EINVAL; + res = kstrtoint(args[0].from, 16, &opt->creation_pcrs); + if (res < 0) + return -EINVAL; + break; default: return -EINVAL; } diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c index ff2aede8986236..3d84c3d41bdee1 100644 --- a/security/keys/trusted-keys/trusted_tpm2.c +++ b/security/keys/trusted-keys/trusted_tpm2.c @@ -428,7 +428,7 @@ int tpm2_seal_trusted(struct tpm_chip *chip, struct tpm_buf buf; u32 hash; u32 flags; - int i; + int i, j; int rc; for (i = 0; i < ARRAY_SIZE(tpm2_hash_map); i++) { @@ -497,7 +497,28 @@ int tpm2_seal_trusted(struct tpm_chip *chip, tpm_buf_append_u16(&buf, 0); /* creation PCR */ - tpm_buf_append_u32(&buf, 0); + if (options->creation_pcrs) { + /* One bank */ + tpm_buf_append_u32(&buf, 1); + /* Which bank to use */ + tpm_buf_append_u16(&buf, hash); + /* Length of the PCR bitmask */ + tpm_buf_append_u8(&buf, 3); + /* PCR bitmask */ + for (i = 0; i < 3; i++) { + char tmp = 0; + + for (j = 0; j < 8; j++) { + char bit = (i * 8) + j; + + if (options->creation_pcrs & (1 << bit)) + tmp |= (1 << j); + } + tpm_buf_append_u8(&buf, tmp); + } + } else { + tpm_buf_append_u32(&buf, 0); + } if (buf.flags & TPM_BUF_OVERFLOW) { rc = -E2BIG;