From patchwork Fri Jan 27 00:29:02 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: James Bottomley X-Patchwork-Id: 9540415 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id BE543601D2 for ; Fri, 27 Jan 2017 00:31:19 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A41B727F17 for ; Fri, 27 Jan 2017 00:31:19 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 97F2728305; Fri, 27 Jan 2017 00:31:19 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D523827F17 for ; Fri, 27 Jan 2017 00:31:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751804AbdA0AbS (ORCPT ); Thu, 26 Jan 2017 19:31:18 -0500 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:60012 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752614AbdA0AbR (ORCPT ); Thu, 26 Jan 2017 19:31:17 -0500 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id BB53D8EE0E7; Thu, 26 Jan 2017 16:29:04 -0800 (PST) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P71qy7zNn4T4; Thu, 26 Jan 2017 16:29:04 -0800 (PST) Received: from [153.66.254.194] (unknown [50.46.144.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id EA65F8EE0CD; Thu, 26 Jan 2017 16:29:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1485476944; bh=UTkUz+lcxYfpl1tT299rZvJ/ZsuXTpaG3fxfkMe7qZw=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=bZkFj6901Nl+pf3zEupHlf+lttusTzBv4F+4xJC+ThWKfEI7BsrZTvRN6YvCCzUkv 0u4eYI4tDywPRbiIa+UjsyhRNkv0yR0GlRyafOiUtzPN+lSCmX5VOnN/iluVEZ1XAu zkr8ehL6WVV2IeQoDSEawO5FRV1GQ1ntf6UzaSps= Message-ID: <1485476942.2457.45.camel@HansenPartnership.com> Subject: Re: [tpmdd-devel] [PATCH RFC v3 5/5] tpm2: expose resource manager via a device link /dev/tpms From: James Bottomley To: Jarkko Sakkinen Cc: linux-security-module@vger.kernel.org, tpmdd-devel@lists.sourceforge.net, open list Date: Thu, 26 Jan 2017 16:29:02 -0800 In-Reply-To: <20170125134004.g77ezmfkkhya643y@intel.com> References: <1485107342.2504.7.camel@HansenPartnership.com> <1485110892.2504.12.camel@HansenPartnership.com> <20170122203055.zg52yraahqvn4rbv@intel.com> <20170122210107.zwrvuhnelrvaoe5h@intel.com> <20170122210441.ivzujugb3urzndhj@intel.com> <1485120988.2504.21.camel@HansenPartnership.com> <20170123140942.svnurymdxsyo6cum@intel.com> <20170123165823.hbgwphsqqpn6jwiz@intel.com> <20170123214255.vt2dumjm6jo5oxd3@intel.com> <1485209797.2534.29.camel@HansenPartnership.com> <20170125134004.g77ezmfkkhya643y@intel.com> X-Mailer: Evolution 3.16.5 Mime-Version: 1.0 Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: X-Virus-Scanned: ClamAV using ClamSMTP On Wed, 2017-01-25 at 15:40 +0200, Jarkko Sakkinen wrote: > On Mon, Jan 23, 2017 at 02:16:37PM -0800, James Bottomley wrote: > > On Mon, 2017-01-23 at 23:42 +0200, Jarkko Sakkinen wrote: > > > On Mon, Jan 23, 2017 at 06:58:23PM +0200, Jarkko Sakkinen wrote: > > > > On Mon, Jan 23, 2017 at 04:09:42PM +0200, Jarkko Sakkinen > > > > wrote: > > > > > On Sun, Jan 22, 2017 at 01:36:28PM -0800, James Bottomley > > > > > wrote: > > > > > > On Sun, 2017-01-22 at 23:04 +0200, Jarkko Sakkinen wrote: > > > > > > > On Sun, Jan 22, 2017 at 11:01:07PM +0200, Jarkko Sakkinen > > > > > > > wrote: > > > > > > > > On Sun, Jan 22, 2017 at 10:30:55PM +0200, Jarkko > > > > > > > > Sakkinen > > > > > > > > wrote: > > > > > > > > > On Sun, Jan 22, 2017 at 10:48:12AM -0800, James > > > > > > > > > Bottomley > > > > > > > > > wrote: > > > > > > > > > > On Sun, 2017-01-22 at 09:49 -0800, James Bottomley > > > > > > > > > > wrote: > > > > > > > > > > > On Fri, 2017-01-20 at 23:05 +0200, Jarkko > > > > > > > > > > > Sakkinen > > > > > > > > > > > wrote: > > > > > > > > > > > > 'tabrm4' branch has been now rebased. It's now > > > > > > > > > > > > on > > > > > > > > > > > > top of > > > > > > > > > > > > master > > > > > > > > > > > > branch that contains Stefan's latest patch (min > > > > > > > > > > > > body length > > > > > > > > > > > > check) > > > > > > > > > > > > that I've reviewed and tested. It also contains > > > > > > > > > > > > your > > > > > > > > > > > > updated > > > > > > > > > > > > /dev/tpms patch. > > > > > > > > > > > > > > > > > > > > > > > > I guess the 5 commits that are there now are > > > > > > > > > > > > such > > > > > > > > > > > > that we > > > > > > > > > > > > have > > > > > > > > > > > > fairly good consensus, don't we? If so, can I > > > > > > > > > > > > add > > > > > > > > > > > > your > > > > > > > > > > > > reviewed-by > > > > > > > > > > > > and tested-by to my commits and vice versa? > > > > > > > > > > > > > > > > > > > > > > We're still failing my test_transients. This is > > > > > > > > > > > the > > > > > > > > > > > full > > > > > > > > > > > python of > > > > > > > > > > > the test case: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > def test_transients(self): > > > > > > > > > > > k = self.open_transients() > > > > > > > > > > > self.c.flush_context(k[0]) > > > > > > > > > > > self.c.change_auth(self.c.SRK, k[1], > > > > > > > > > > > None, > > > > > > > > > > > pwd1) > > > > > > > > > > > ... > > > > > > > > > > > > > > > > > > > > > > It's failing at self.c.flush_context(k[0]) with > > > > > > > > > > > TPM_RC_VALUE. > > > > > > > > > > > It's > > > > > > > > > > > the same problem Ken complained about: > > > > > > > > > > > TPM2_FlushContext > > > > > > > > > > > doesn't have > > > > > > > > > > > a declared handle area so we don't translate the > > > > > > > > > > > handle being > > > > > > > > > > > sent > > > > > > > > > > > down. We have to fix this either by intercepting > > > > > > > > > > > the > > > > > > > > > > > flush > > > > > > > > > > > and > > > > > > > > > > > manually translating the context, or by being > > > > > > > > > > > dangerously > > > > > > > > > > > clever and > > > > > > > > > > > marking flush as a command which takes one > > > > > > > > > > > handle. > > > > > > > > > > > > > > > > > > > > This is what the dangerously clever fix looks like. > > > > > > > > > > With this > > > > > > > > > > and a > > > > > > > > > > few other changes, my smoke tests now pass. > > > > > > > > > > > > > > > > > > > > James > > > > > > > > > > > > > > > > > > I don't want to be clever here. I will rather > > > > > > > > > intercept > > > > > > > > > the body > > > > > > > > > and > > > > > > > > > try to keep the core code simple and easy to > > > > > > > > > understand. > > > > > > > > > > > > > > > > It came out quite clean actually. > > > > > > > > > > > > > > > > I just encapsulated handle mapping and have this in the > > > > > > > > beginning > > > > > > > > of > > > > > > > > tpm2_map_command: > > > > > > > > > > > > > > > > if (cc == TPM2_CC_FLUSH_CONTEXT) > > > > > > > > return tpm2_map_to_phandle(space, > > > > > > > > &cmd[TPM_HEADER_SIZE]); > > > > > > > > > > > > > > > > I think this documents better what is actually going on > > > > > > > > than > > > > > > > > tinkering > > > > > > > > cc_attr_tbl. > > > > > > > > > > > > > > > > /Jarkko > > > > > > > > > > > > > > Actually what you suggested is much better idea because > > > > > > > it > > > > > > > will also > > > > > > > take care of validation. > > > > > > > > > > > > Yes, that's why it's clever ... I'm just always wary of > > > > > > clever > > > > > > code > > > > > > because of the Kernighan principle. > > > > > > > > > > > > > I'm still going to keep tpm2_map_to_phandle because it > > > > > > > makes > > > > > > > the > > > > > > > code flow a lot cleaner and probably sessions have to > > > > > > > anyway > > > > > > > make it > > > > > > > even more complicated. > > > > > > > > > > > > OK, there's one more thing that seems to be causing > > > > > > problems: > > > > > > when > > > > > > tpm2_save_context fails because the handle no longer exists > > > > > > (like it's > > > > > > been flushed) it returns TPM_RC_REFERENCE_H0 not > > > > > > TPM_RC_HANDLE > > > > > > (the > > > > > > session code does seem to return TPM_RC_HANDLE under some > > > > > > circumstances). > > > > > > > > > > > > James > > > > > > > > > > What is your way for reproducing this issue? Just want to add > > > > > a test case for my smoke test suite so that I can verify that > > > > > the issue is fixed once I've fixed it. > > > > > > > > Right. Too easy. Sorry about this. I'll push a fix for this to > > > > tabrm4 branch. > > > > > > 1. I pushed a fix to the repository. > > > > I don't think the fix is right; this is what you now have > > > > } else if ((rc & TPM2_RC_REFERENCE_H0) == TPM2_RC_REFERENCE_H0) > > { > > > > That should be > > > > } else if (rc == TPM2_RC_REFERENCE_H0) > > Right I see your point. > > And yes, also for RC_HANDLE the error handling was done incorrectly. > It should be masked like you said with 0xff to catch error number > and the F flag (bit 7). > > As it is format zero error code it should be fine to check without > any mask. > > Thanks for noting this. It is easy to shoot yourself into foot when > there's lot of stuff packed :-) OK, I've rebased and retested to tabrm5. Apart from the obvious introduced bug into the last patch (fix below if you need it) everything works, so you can add my tested and reviewed bys. James --- commit b63aa4b3a5dce31cbc874fa32bd7252b62f55813 Author: James Bottomley Date: Thu Jan 26 08:43:55 2017 -0800 fix compile failure -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/drivers/char/tpm/tpms-dev.c b/drivers/char/tpm/tpms-dev.c index 5030f8c..5720885 100644 --- a/drivers/char/tpm/tpms-dev.c +++ b/drivers/char/tpm/tpms-dev.c @@ -39,7 +39,7 @@ static int tpms_release(struct inode *inode, struct file *file) struct tpms_priv *priv = container_of(fpriv, struct tpms_priv, priv); tpm_common_release(file, fpriv); - tpm2_del_space(&priv->space): + tpm2_del_space(&priv->space); kfree(priv); return 0;