From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 832243A1DB for ; Tue, 16 Sep 2025 02:05:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757988302; cv=none; b=TC8L8gSUaIPQ1dNi+A1DSilB9t98p5epbxmS+2NalLaZcrYPgkb5xRNIP/K3oIEl3OyunjQxIIiudzOJbxvsIb1RjZ16Zw9CjH8Wj5sqZq+h4jmH1i1YjphQhiutXaiaiBrz3TdqL9j+Yk+cm7+eoQu3SQvItcu32do3QYae1NY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757988302; c=relaxed/simple; bh=+/HZqhtPGkbUh1RUFyeNTL6CEjCpQxjBEVc0IqQo4ok=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=mctCy6DTDgJ4z0LIyLC0jz2v4xtc1WBbQVjKqLBz9FDv53YQdFMsdvVtO/x9+0nGhTyI8JEIcFO8nR0GYy5b1BcthDwkzh2+eO7XXDiBuOnRQ8d4RU5OtbA9YOjkTgwcz/NDuiBMPulKqo6mlabWfP8BrWU7L0I3Nedn7fCB+G0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=gek2hHps; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gek2hHps" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B7407C4CEF1; Tue, 16 Sep 2025 02:05:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1757988302; bh=+/HZqhtPGkbUh1RUFyeNTL6CEjCpQxjBEVc0IqQo4ok=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gek2hHpssDFaaKAl5do+ynUPPZe56qxDGkFFMIeIVh9BcS3Smip3iPBVBxyRllyer Qxns7V9prer+TUjHKGFZTlXonD3C+/gKWCI13kVDka50pYGlIyACnA4HCBUNfR7nXA GTzpeQQLs8Oqyno0BsiRy1k3c79vVRO0n7noMA/H7GRacvWPpr0fCWjmNM0HbN+uSY jefTw9WNHUTCTRFeleKIGxxcTgqqW0Swf3Amct8G3OW6m4aSs6lw2V5c4E0huKs4Oc 8nr5M+LwSGhSPuivZEjiF1rVkrwOtAHSgNFfg95IJ+Wzr9U8kQNC8w3dPB82DWGVzs 12GZU6hNR2r8g== Date: Tue, 16 Sep 2025 05:04:58 +0300 From: Jarkko Sakkinen To: Denis Aleksandrov Cc: peterhuewe@gmx.de, jgg@ziepe.ca, linux-integrity@vger.kernel.org, Jan Stancek , Paul Menzel Subject: Re: [PATCH v5] tpm: Prevent local DOS via tpm/tpm0/ppi/*operations Message-ID: References: <20250915210829.6661-1-daleksan@redhat.com> Precedence: bulk X-Mailing-List: linux-integrity@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250915210829.6661-1-daleksan@redhat.com> On Mon, Sep 15, 2025 at 05:08:29PM -0400, Denis Aleksandrov wrote: > Reads on tpm/tpm0/ppi/*operations can become very long on > misconfigured systems. Reading the TPM is a blocking operation, > thus a user could effectively trigger a DOS. > > Resolve this by caching the results and avoiding the blocking > operations after the first read. > > Reported-by: Jan Stancek > Signed-off-by: Denis Aleksandrov > Suggested-by: Jarkko Sakkinen > Reviewed-by: Paul Menzel > Reviewed-by: Jarkko Sakkinen > --- > > Changes in v5: > - Unlocks the tpm_ppi_lock if cache_ppi_operations() returns and > error. > > drivers/char/tpm/tpm_ppi.c | 89 ++++++++++++++++++++++++++++---------- > 1 file changed, 66 insertions(+), 23 deletions(-) > > diff --git a/drivers/char/tpm/tpm_ppi.c b/drivers/char/tpm/tpm_ppi.c > index d53fce1c9d6f..47655407fea5 100644 > --- a/drivers/char/tpm/tpm_ppi.c > +++ b/drivers/char/tpm/tpm_ppi.c > @@ -33,6 +33,20 @@ static const guid_t tpm_ppi_guid = > GUID_INIT(0x3DDDFAA6, 0x361B, 0x4EB4, > 0xA4, 0x24, 0x8D, 0x10, 0x08, 0x9D, 0x16, 0x53); > > +static const char * const tpm_ppi_info[] = { > + "Not implemented", > + "BIOS only", > + "Blocked for OS by system firmware", > + "User required", > + "User not required", > +}; > + > +/* A spinlock to protect access to the cache from concurrent reads */ > +static DEFINE_SPINLOCK(tpm_ppi_lock); > + > +static u32 ppi_operations_cache[PPI_VS_REQ_END + 1]; > +static bool ppi_cache_populated; > + > static bool tpm_ppi_req_has_parameter(u64 req) > { > return req == 23; > @@ -277,8 +291,7 @@ static ssize_t tpm_show_ppi_response(struct device *dev, > return status; > } > > -static ssize_t show_ppi_operations(acpi_handle dev_handle, char *buf, u32 start, > - u32 end) > +static ssize_t cache_ppi_operations(acpi_handle dev_handle, char *buf) > { > int i; > u32 ret; > @@ -286,34 +299,22 @@ static ssize_t show_ppi_operations(acpi_handle dev_handle, char *buf, u32 start, > union acpi_object *obj, tmp; > union acpi_object argv = ACPI_INIT_DSM_ARGV4(1, &tmp); > > - static char *info[] = { > - "Not implemented", > - "BIOS only", > - "Blocked for OS by BIOS", > - "User required", > - "User not required", > - }; > - > if (!acpi_check_dsm(dev_handle, &tpm_ppi_guid, TPM_PPI_REVISION_ID_1, > 1 << TPM_PPI_FN_GETOPR)) > return -EPERM; > > tmp.integer.type = ACPI_TYPE_INTEGER; > - for (i = start; i <= end; i++) { > + for (i = 0; i <= PPI_VS_REQ_END; i++) { > tmp.integer.value = i; > obj = tpm_eval_dsm(dev_handle, TPM_PPI_FN_GETOPR, > ACPI_TYPE_INTEGER, &argv, > TPM_PPI_REVISION_ID_1); > - if (!obj) { > + if (!obj) > return -ENOMEM; > - } else { > - ret = obj->integer.value; > - ACPI_FREE(obj); > - } > > - if (ret > 0 && ret < ARRAY_SIZE(info)) > - len += sysfs_emit_at(buf, len, "%d %d: %s\n", > - i, ret, info[ret]); > + ret = obj->integer.value; > + ppi_operations_cache[i] = ret; > + ACPI_FREE(obj); > } > > return len; > @@ -324,9 +325,30 @@ static ssize_t tpm_show_ppi_tcg_operations(struct device *dev, > char *buf) > { > struct tpm_chip *chip = to_tpm_chip(dev); > + ssize_t len = 0; > + u32 ret; > + int i; > + > + spin_lock(&tpm_ppi_lock); > + if (!ppi_cache_populated) { > + len = cache_ppi_operations(chip->acpi_dev_handle, buf); > + if (len < 0) { > + spin_unlock(&tpm_ppi_lock); > + return len; > + } > > - return show_ppi_operations(chip->acpi_dev_handle, buf, 0, > - PPI_TPM_REQ_MAX); > + ppi_cache_populated = true; > + } > + > + for (i = 0; i <= PPI_TPM_REQ_MAX; i++) { > + ret = ppi_operations_cache[i]; > + if (ret >= 0 && ret < ARRAY_SIZE(tpm_ppi_info)) > + len += sysfs_emit_at(buf, len, "%d %d: %s\n", > + i, ret, tpm_ppi_info[ret]); > + } > + spin_unlock(&tpm_ppi_lock); > + > + return len; > } > > static ssize_t tpm_show_ppi_vs_operations(struct device *dev, > @@ -334,9 +356,30 @@ static ssize_t tpm_show_ppi_vs_operations(struct device *dev, > char *buf) > { > struct tpm_chip *chip = to_tpm_chip(dev); > + ssize_t len = 0; > + u32 ret; > + int i; > > - return show_ppi_operations(chip->acpi_dev_handle, buf, PPI_VS_REQ_START, > - PPI_VS_REQ_END); > + spin_lock(&tpm_ppi_lock); > + if (!ppi_cache_populated) { > + len = cache_ppi_operations(chip->acpi_dev_handle, buf); > + if (len < 0) { > + spin_unlock(&tpm_ppi_lock); > + return len; > + } > + > + ppi_cache_populated = true; > + } > + > + for (i = PPI_VS_REQ_START; i <= PPI_VS_REQ_END; i++) { > + ret = ppi_operations_cache[i]; > + if (ret >= 0 && ret < ARRAY_SIZE(tpm_ppi_info)) > + len += sysfs_emit_at(buf, len, "%d %d: %s\n", > + i, ret, tpm_ppi_info[ret]); > + } > + spin_unlock(&tpm_ppi_lock); > + > + return len; > } > > static DEVICE_ATTR(version, S_IRUGO, tpm_show_ppi_version, NULL); > -- > 2.48.1 > Thank you. 'next' has been updated. BR, Jarkko