lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <10b81a727ba940889095fa4bb29d0863@infineon.com> Date: Thu, 14 Dec 2017 12:20:31 +0000 From: <Alexander.Steffen@...ineon.com> To: <pmenzel@...gen.mpg.de>, <jgg@...pe.ca> CC: <linux-integrity@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <mario.limonciello@...l.com> Subject: RE: [Regression 4.15-rc2] New messages `tpm tpm0: A TPM error (2314) occurred continue selftest` > [Mario from Dell added to CC list.] > > Dear Alexander, > > > On 12/11/17 17:08, Alexander.Steffen@...ineon.com wrote: > > >> On 12/08/17 17:18, Jason Gunthorpe wrote: > >>> On Fri, Dec 08, 2017 at 05:07:39PM +0100, Paul Menzel wrote: > >>> > >>>> I have no access to the system right now, but want to point out, that > the > >>>> log was created by `journactl -k`, so I do not know if that messes with > the > >>>> time stamps. I checked the output of `dmesg` but didn’t see the TPM > error > >>>> messages in the output – only `tpm_tis MSFT0101:00: 2.0 TPM (device- > id 0xFE, > >>>> rev-id 4)`. Do I need to pass a different error message to `dmesg`? > >>> > >>> It is a good question, I don't know.. If your kernel isn't setup to > >>> timestamp messages then the journalstamp will certainly be garbage. > >>> > >>> No idea why you wouldn't see the messages in dmesg, if they are not in > >>> dmesg they couldn't get into the journal > >> > >> It looks like I was running an older Linux kernel version, when running > >> `dmesg`. Sorry for the noise. Here are the messages with the Linux > >> kernel time stamps, showing that the delays work correctly. > >> > >> ``` > >> $ uname -a > >> Linux Ixpees 4.15.0-041500rc2-generic #201712031230 SMP Sun Dec 3 > >> 17:32:03 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux > >> $ sudo dmesg | grep TPM > >> [ 0.000000] ACPI: TPM2 0x000000006F332168 000034 (v03 Tpm2Tabl > >> 00000001 AMI 00000000) > >> [ 1.114355] tpm_tis MSFT0101:00: 2.0 TPM (device-id 0xFE, rev-id 4) > >> [ 1.125250] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 1.156645] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 1.208053] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 1.299640] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 1.471223] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 1.802819] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 2.454320] tpm tpm0: A TPM error (2314) occurred continue selftest > >> [ 3.734808] tpm tpm0: TPM self test failed > >> [ 3.759675] ima: No TPM chip found, activating TPM-bypass! (rc=-19) > >> ``` > > > > Thanks for the fixed log. So your TPM seems to be rather slow with > executing the selftests. Could try to apply the patch that I've just sent you? It > ensures that your TPM gets more time to execute all the tests, up to the limit > set in the PTP. > > Thank you for your patch. Judging from the time stamps, it seems it > works, but the TPM still fails. > > ``` > $ dmesg | grep tpm > [ 1.100958] tpm_tis MSFT0101:00: 2.0 TPM (device-id 0xFE, rev-id 4) > [ 1.111768] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 1.143020] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 1.194251] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 1.285509] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 1.457103] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 1.788709] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 2.440216] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 3.731704] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 6.303216] tpm tpm0: A TPM error (2314) occurred continue selftest > [ 6.303242] tpm tpm0: TPM self test failed > ``` > > To be clear, this issue is not reproducible during every start. (But > that was the same before.) Thanks for testing. Now you are in the unlucky situation that your TPM was probably always broken, but old kernels did not detect that and used it anyway. To add some more details to what the problem is: The PTP limits the maximum runtime of the TPM2_SelfTest command that we try to execute here to 2000ms (see https://trustedcomputinggroup.org/wp-content/uploads/TCG_PC_Client_Platform_TPM_Profile_PTP_Specification_Family_2.0_Revision_1.3v22.pdf table 15, page 65 in the PDF, page 57 according to the printed page numbers). Technically, we have no evidence that your TPM is in violation of that specification, because it does reply to the command within 2000ms, it just has not completed the selftests within that timeframe. But clearly the intention of the specification authors was to have the selftests completed within that limit, there is no sense in allowing 2s just for the TPM to generate an answer without actually making any progress. The TPM2_SelfTest command is special in that it is allowed to either execute all selftests and then return TPM_RC_SUCCESS or just schedule the selftest execution in the background and return TPM_RC_TESTING immediately (see https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-3-Commands-01.38.pdf chapter 10.2.1, page 43/29). Your TPM apparently chooses the second option, but (sometimes?) fails to complete the selftests within the limit that we set (which is far longer than the 2s from the PTP). I'm not sure what to do about that now. We could increase the timeout even further, but if your TPM does not abide by the specification, what would be the right limit? Maybe there is a bug in your TPM that sometimes causes it to end up in a state where it can never complete the selftests. The only other idea I have would be to use a different variant of the TPM2_SelfTest command. Currently, we execute the selftest command with the parameter fullTest=NO, so that the TPM only has to execute the missing tests (which should be the fastest implementation for a spec-compliant TPM). Maybe instead of giving up, we can extend the current algorithm to try fullTest=YES once, which should reset the selftest state so that maybe then your TPM can complete them successfully. I'll try to implement a patch to that effect. Alexander
Powered by blists - more mailing lists