Skip to content

Commit b13f40b

Browse files
committed
Merge tag 'integrity-v5.8-fix-2' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity
Pull integrity updates from Mimi Zohar: "Include PCRs 8 & 9 in per TPM 2.0 bank boot_aggregate calculation. Prior to Linux 5.8 the SHA1 "boot_aggregate" value was padded with 0's and extended into the other TPM 2.0 banks. Included in the Linux 5.8 open window, TPM 2.0 PCR bank specific "boot_aggregate" values (PCRs 0 - 7) are calculated and extended into the TPM banks. Distro releases are now shipping grub2 with TPM support, which extend PCRs 8 & 9. I'd like for PCRs 8 & 9 to be included in the new "boot_aggregate" calculations. For backwards compatibility, if the hash is SHA1, these new PCRs are not included in the boot aggregate" * tag 'integrity-v5.8-fix-2' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity: ima: extend boot_aggregate with kernel measurements
2 parents 7c30b85 + 20c59ce commit b13f40b

File tree

2 files changed

+15
-2
lines changed

2 files changed

+15
-2
lines changed

security/integrity/ima/ima.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030

3131
enum ima_show_type { IMA_SHOW_BINARY, IMA_SHOW_BINARY_NO_FIELD_LEN,
3232
IMA_SHOW_BINARY_OLD_STRING_FMT, IMA_SHOW_ASCII };
33-
enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 };
33+
enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8, TPM_PCR10 = 10 };
3434

3535
/* digest size for IMA, fits SHA1 or MD5 */
3636
#define IMA_DIGEST_SIZE SHA1_DIGEST_SIZE

security/integrity/ima/ima_crypto.c

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -823,13 +823,26 @@ static int ima_calc_boot_aggregate_tfm(char *digest, u16 alg_id,
823823
if (rc != 0)
824824
return rc;
825825

826-
/* cumulative sha1 over tpm registers 0-7 */
826+
/* cumulative digest over TPM registers 0-7 */
827827
for (i = TPM_PCR0; i < TPM_PCR8; i++) {
828828
ima_pcrread(i, &d);
829829
/* now accumulate with current aggregate */
830830
rc = crypto_shash_update(shash, d.digest,
831831
crypto_shash_digestsize(tfm));
832832
}
833+
/*
834+
* Extend cumulative digest over TPM registers 8-9, which contain
835+
* measurement for the kernel command line (reg. 8) and image (reg. 9)
836+
* in a typical PCR allocation. Registers 8-9 are only included in
837+
* non-SHA1 boot_aggregate digests to avoid ambiguity.
838+
*/
839+
if (alg_id != TPM_ALG_SHA1) {
840+
for (i = TPM_PCR8; i < TPM_PCR10; i++) {
841+
ima_pcrread(i, &d);
842+
rc = crypto_shash_update(shash, d.digest,
843+
crypto_shash_digestsize(tfm));
844+
}
845+
}
833846
if (!rc)
834847
crypto_shash_final(shash, digest);
835848
return rc;

0 commit comments

Comments
 (0)