Re: [tpmdd-devel] [PATCH RFC 0/4] RFC: in-kernel resource manager
From: Jason Gunthorpe
Date: Thu Jan 05 2017 - 12:29:36 EST
On Thu, Jan 05, 2017 at 03:52:02PM +0000, Fuchs, Andreas wrote:
> Great to see this coming along so well. Thanks a lot to Jarkko !
> The TPM allows an application to get the list of currently loaded
> handles TPM2_GetCapabilities(TPM_CAP_HANDLES). It would be great to
> have the RM be as transparent to userspace as possible. The RM spec
> of TCG therefore says that you need to intercept and override this
I'd rather just ban unnecessary stuff like this on the RM fd.
Tracking active handles can be done in userspace by the app
itself. Debugging can be done by using the non-RM fd or debugfs.
IMHO we need to focus narrowly on enabling *specific* unpriviledged
user space use models and safe co-existence with kernel users.
> - Constant session handles (hurray):
> Sessions do not change their handles on contextsave/contextload, so
> you do not need to virtualize session handles.
The kernel still needs to track them, so they can be cleaned up and
access controlled.
> - Session Limits (here it gets ugly):
> Even thought the TPM supports the same swapping-scheme for sessions
> as it does for transient objects, it only allows for a limited
> number of session to be opened (64 in case of PC-Client), called
> active sessions. This means that a single process can still DoS the
> TPM if it allocates 64 sessions, or 64 processes can DoS the TPM if
Well, if we have an unpriv fd then it should not be able to DOS the
system - that would suggest either that FD cannot use sessions or we
need some kernel solution to guarentee the DOS is not possible.
A combo ioctl that could setup the session, issue an operation in it
and then delete the session, for instance.
Jason