Received: by 10.223.185.116 with SMTP id b49csp5387324wrg; Wed, 7 Mar 2018 10:52:49 -0800 (PST) X-Google-Smtp-Source: AG47ELsgMkOFhXhFg08tSlKsqhcMAtlPHAO7GmdgebgG5KGyfmwZrdPV0/VJDAv7C34+cAt2QBS+ X-Received: by 2002:a17:902:4827:: with SMTP id s36-v6mr21207585pld.269.1520448768948; Wed, 07 Mar 2018 10:52:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520448768; cv=none; d=google.com; s=arc-20160816; b=I4JNgdLNQfeN3u/GQFrY2by8RNvsbaE/O2lyhOZJrU6h0DBMpbpsEUl0LmUX/ydedv RZxp8Et5S5oKB2b3gKKFrtU8KS7AvpGhGJ4Bm2LoigVZFnW1aolztmKKMf6oCAxtDak9 P9o5JT8fuBuXw1xqliaJtWVjGg4aLOOcSNTzv12Rp4BN/7UpEdIMvU7XEmcPpJxjfq2C QbQoZCDibrsyK2MmTuANRQ9YWq9irwXQr1rKa7cNG3qkPDLupgxAc9o3lAAI7w6KMEAB HHrR6Tyt13SlO1mws89UILnAzjIPJEZp/8HbslBpw48q3L5tbWMtawqDIuLuSxgBy3ra T7Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=QxlaLu2+TlADv+bCInEtJemwesASldnNj/+Zh5glExY=; b=Uz7EjyX6zYIa1DSi2irUXaawzA70GG6PSZYkxU62tfjFZQWHp3CisVXmXfGh5mh4Y7 qoSX1IAf9/yDPk1L+y6xgw3oZ8L6tmlEV7o8fkUKoRttdjlta2prsHbPC56ciRXTYdKH qedsEIBp3F34UGLaWeiDL31EDVOHWHSY6EbcAGjuL3IeKoNIKDqpaHHr63lOkCV+grV3 kFwong31CCA2eSfXoi5QRI5UAgp9WtyziLs1BqK7u6iByuwfaQ6x/piOwyZttYAYaQbC zYGFadO+VGZqClIcws3zLHcE3AkDtMD7fCeW9HoCCL8vdSli4IG3qfTl/ticp0LndX63 AtbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=Cprs8cS4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7-v6si13298111pll.307.2018.03.07.10.52.34; Wed, 07 Mar 2018 10:52:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=Cprs8cS4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754395AbeCGSvl (ORCPT + 99 others); Wed, 7 Mar 2018 13:51:41 -0500 Received: from mail-wr0-f196.google.com ([209.85.128.196]:44164 "EHLO mail-wr0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753934AbeCGSvj (ORCPT ); Wed, 7 Mar 2018 13:51:39 -0500 Received: by mail-wr0-f196.google.com with SMTP id v65so3226837wrc.11 for ; Wed, 07 Mar 2018 10:51:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ziepe.ca; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=QxlaLu2+TlADv+bCInEtJemwesASldnNj/+Zh5glExY=; b=Cprs8cS4rPDnmtJlm/KDYdc4IIl5qEMBIqTuBiC+5JlkUDRruEgeleeDHIYOjmaN52 8uLCU4nduzCQgV50mOT5uUxheS7e18HV5hVQK/tlRr7hnqLcByWhBNZQ7lePgr3zpB9y zTVqhODbNkEEdoMIDDZVmomfhQwzYY5gcyiUl/niAwedtri3qj8T9OhULZC3EVQlpdS+ U76kMKVF5ZJCQZ1OUd2dCqgjlOZ2Mz68fqCGYSnvD3KMj1w7aPZ4xiok681M/u1L9JNG gdruwiAh24UO8L1psC/j/GA7OiwMHyu0OOhPgOYscaGurp2mBWd8XyiLmH73ij5iq7VA 2OxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=QxlaLu2+TlADv+bCInEtJemwesASldnNj/+Zh5glExY=; b=umlxemEu5CzGEhdBYKwgdVES/m48pZl+d0COAm3yDE08Z2Y166hWLOMSxF9pbFHyMe ts3/XJc/LiVkZc+AMUabJlbllMNeFLlsznwzNQ3cI4vgs64AddL6lANmawEypJxAy567 iav0tTIoX9KFoj3vKzLsrijHzjZRsRUbQZRhH/NDNqVFX0RA7Gnz5bdE0WX5WWG4vk46 FU0OGuXVhbnHbw8pdukIz3ARmun85uD8qaClw9KPqS8ZaZg9kwEBU60EURYEm2pzrhQh yCN0Uxh5JKh5OApwNyvYA0wZfYdD5WvvDaMBgQOmJQms3CzKiPXUEEigiH2jYIj6uiZm 9a+w== X-Gm-Message-State: APf1xPCIg82eAXzo4Wwk8B3PPw0yxDH+NLB5svsgRE0mdyM8S7dnNus0 LIcPlRSKtcfsnLPV9Rmk2LKW/g== X-Received: by 10.223.184.17 with SMTP id h17mr21616392wrf.9.1520448697840; Wed, 07 Mar 2018 10:51:37 -0800 (PST) Received: from ziepe.ca (S010614cc2056d97f.ed.shawcable.net. [70.74.179.152]) by smtp.gmail.com with ESMTPSA id b68sm12843210wmi.30.2018.03.07.10.51.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 07 Mar 2018 10:51:36 -0800 (PST) Received: from jgg by mlx.ziepe.ca with local (Exim 4.86_2) (envelope-from ) id 1eteA0-0001Dm-Pe; Wed, 07 Mar 2018 11:51:32 -0700 Date: Wed, 7 Mar 2018 11:51:32 -0700 From: Jason Gunthorpe To: Jiandi An Cc: zohar@linux.vnet.ibm.com, dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com, linux-integrity@vger.kernel.org, linux-ima-devel@lists.sourceforge.net, linux-ima-user@lists.sourceforge.net, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] security: Fix IMA Kconfig for dependencies on ARM64 Message-ID: <20180307185132.GA30102@ziepe.ca> References: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 06, 2018 at 11:26:26PM -0600, Jiandi An wrote: > TPM_CRB driver is the TPM support for ARM64. If it > is built as module, TPM chip is registered after IMA > init. tpm_pcr_read() in IMA driver would fail and > display the following message even though eventually > there is TPM chip on the system: > > ima: No TPM chip found, activating TPM-bypass! (rc=-19) > > Fix IMA Kconfig to select TPM_CRB so TPM_CRB driver is > built in kernel and initializes before IMA driver. > > Signed-off-by: Jiandi An > security/integrity/ima/Kconfig | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kconfig > index 35ef693..6a8f677 100644 > +++ b/security/integrity/ima/Kconfig > @@ -10,6 +10,7 @@ config IMA > select CRYPTO_HASH_INFO > select TCG_TPM if HAS_IOMEM && !UML > select TCG_TIS if TCG_TPM && X86 > + select TCG_CRB if TCG_TPM && ACPI > select TCG_IBMVTPM if TCG_TPM && PPC_PSERIES > help > The Trusted Computing Group(TCG) runtime Integrity This seems really weird, why are any specific TPM drivers linked to IMA config, we have lots of drivers.. I don't think I've ever seen this pattern in Kconfig before? Jason