[PATCH] tpm: do handle area size validation only when TPM space used

Jarkko Sakkinen jarkko.sakkinen at linux.intel.com
Tue Mar 28 12:47:30 UTC 2017


On Tue, Mar 28, 2017 at 11:27:53AM +0000, Alexander.Steffen at infineon.com wrote:
> Yes, this fixes the issue for me. Thanks.
> 
> Alexander

Great. I will squash this to the infrastructure patch. Thank you.

/Jarkko

> > -----Original Message-----
> > From: Jarkko Sakkinen [mailto:jarkko.sakkinen at linux.intel.com]
> > Sent: Tuesday, March 28, 2017 12:25 PM
> > To: Steffen Alexander (IFAG CCS ESS D SW A)
> > Cc: tpmdd-devel at lists.sourceforge.net; linux-security-
> > module at vger.kernel.org; Peter Huewe; Marcel Selhorst; Jason Gunthorpe;
> > open list
> > Subject: Re: [PATCH] tpm: do handle area size validation only when TPM
> > space used
> > 
> > So do you need this or not?
> > 
> > /Jarkko
> > 
> > On Mon, Mar 27, 2017 at 12:08:15AM +0300, Jarkko Sakkinen wrote:
> > > In order to not cause backwards compatibility issues with
> > > /dev/tpm0 disable handle area size validation if tpm_transmit is not
> > > called with a TPM space.
> > >
> > > Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen at iki.fi>
> > > ---
> > >  drivers/char/tpm/tpm-interface.c | 9 +++++++--
> > >  1 file changed, 7 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/drivers/char/tpm/tpm-interface.c
> > > b/drivers/char/tpm/tpm-interface.c
> > > index bf0c3fa..158c1db 100644
> > > --- a/drivers/char/tpm/tpm-interface.c
> > > +++ b/drivers/char/tpm/tpm-interface.c
> > > @@ -328,7 +328,9 @@ unsigned long tpm_calc_ordinal_duration(struct
> > > tpm_chip *chip,  }  EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
> > >
> > > -static bool tpm_validate_command(struct tpm_chip *chip, const u8
> > > *cmd,
> > > +static bool tpm_validate_command(struct tpm_chip *chip,
> > > +				 struct tpm_space *space,
> > > +				 const u8 *cmd,
> > >  				 size_t len)
> > >  {
> > >  	const struct tpm_input_header *header = (const void *)cmd; @@ -
> > 340,6
> > > +342,9 @@ static bool tpm_validate_command(struct tpm_chip *chip,
> > const u8 *cmd,
> > >  	if (len < TPM_HEADER_SIZE)
> > >  		return false;
> > >
> > > +	if (!space)
> > > +		return true;
> > > +
> > >  	if (chip->flags & TPM_CHIP_FLAG_TPM2 && chip->nr_commands) {
> > >  		cc = be32_to_cpu(header->ordinal);
> > >
> > > @@ -386,7 +391,7 @@ ssize_t tpm_transmit(struct tpm_chip *chip, struct
> > tpm_space *space,
> > >  	unsigned long stop;
> > >  	bool need_locality;
> > >
> > > -	if (!tpm_validate_command(chip, buf, bufsiz))
> > > +	if (!tpm_validate_command(chip, space, buf, bufsiz))
> > >  		return -EINVAL;
> > >
> > >  	if (bufsiz > TPM_BUFSIZE)
> > > --
> > > 2.9.3
> > >
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list