Received: by 10.213.65.16 with SMTP id m16csp57374imf; Sun, 11 Mar 2018 15:08:20 -0700 (PDT) X-Google-Smtp-Source: AG47ELtC8iGmwmzhTVNM97pxoDyC6pVZCbdBhIXlOSDj/ncJ7OaEXWJPXe2og2AwzWpsJexOisjB X-Received: by 2002:a17:902:684a:: with SMTP id f10-v6mr5993547pln.129.1520806100279; Sun, 11 Mar 2018 15:08:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520806100; cv=none; d=google.com; s=arc-20160816; b=uAse8y4NcsW9b9ki42DrhyXJvHfcsVpjE6gFxOFF6zb0veCXZpn8JNoxO/CUszUG6G S+MxXQLlYSkGzcKNuIFww461g/TLWkfw5WHGPcqINrWBp07Jr3oRfcWLRAcIdGiAcssU EW/2ZZs/AoMf6Fnyx49X3Y+cR9tvEwfauG+YluFhdrXSJqU9bHY6XPZm3RmyeTNGRurQ 00qTESq58SIagPjBqda1ACJ9XgFZ9AkwD4zasSx/F2nmXie/abU4SlhnN9n1sMJiOswZ FDvo3Yk0wYnHxFFUgt6wA7bgazb/fPg+MddhZP/mcrOmbccK0dSB2eK9DGtcwMKqoF71 vFZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=a4CfVxfLLXt+sXf0Go8/Hf3X87AYOI0TZY/+V4dRBBU=; b=WSKIi7Kkv+XWr7U+9+ZOtizqmLcqWcJZVWu6l7CKOZgmSPOegkwcsRMJSydVuJmkDZ RIjrY+a5lFw0ndOr4EZ4Cbl/tBtgDm7lI7VzIe6rMoKgZzfC+biLdnQPb7kfpoj77oql tkYOgM3Mb/r0IEJ5a2cjaTPE4+sgCbu3k+A9GgTSxKksOUtrE37lKQrWMTZTxJDHTzCZ Wd8jPeNPAFLUVmLwYGmZ1la6JCOdkvCXG3xKAqFNvjw8stnGKKSaEHGnHaJzyrMgSaRE zV1NKDtOcfld+6pmXmRB4YaeSgr5YkSvGDm7mxy64iq0xPa3ty05gezMcTfXq2wZB2y+ ksog== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 44-v6si4970679plc.428.2018.03.11.15.08.05; Sun, 11 Mar 2018 15:08:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932479AbeCKWGw (ORCPT + 99 others); Sun, 11 Mar 2018 18:06:52 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:41152 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932398AbeCKWGv (ORCPT ); Sun, 11 Mar 2018 18:06:51 -0400 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w2BM4R8h063197 for ; Sun, 11 Mar 2018 18:06:50 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0a-001b2d01.pphosted.com with ESMTP id 2gmwsed57y-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Sun, 11 Mar 2018 18:06:50 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sun, 11 Mar 2018 22:06:47 -0000 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Sun, 11 Mar 2018 22:06:43 -0000 Received: from d06av24.portsmouth.uk.ibm.com (d06av24.portsmouth.uk.ibm.com [9.149.105.60]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w2BM6hTh62980348; Sun, 11 Mar 2018 22:06:43 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1B5F64204C; Sun, 11 Mar 2018 21:59:01 +0000 (GMT) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 0471A4205C; Sun, 11 Mar 2018 21:59:00 +0000 (GMT) Received: from localhost.localdomain (unknown [9.80.82.225]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Sun, 11 Mar 2018 21:58:59 +0000 (GMT) Subject: Re: [PATCH] security: Fix IMA Kconfig for dependencies on ARM64 From: Mimi Zohar To: Jiandi An , dmitry.kasatkin@gmail.com, jmorris@namei.org, serge@hallyn.com Cc: linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity Date: Sun, 11 Mar 2018 18:06:41 -0400 In-Reply-To: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> References: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18031122-0016-0000-0000-000005300BF1 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18031122-0017-0000-0000-0000286D3686 Message-Id: <1520806001.3547.10.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-11_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803110282 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-03-06 at 23:26 -0600, Jiandi An wrote: > TPM_CRB driver is the TPM support for ARM64. If it > is built as module, TPM chip is registered after IMA > init. tpm_pcr_read() in IMA driver would fail and > display the following message even though eventually > there is TPM chip on the system: > > ima: No TPM chip found, activating TPM-bypass! (rc=-19) > > Fix IMA Kconfig to select TPM_CRB so TPM_CRB driver is > built in kernel and initializes before IMA driver. > > Signed-off-by: Jiandi An Thanks, this patch has been applied. Mimi > --- > security/integrity/ima/Kconfig | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kconfig > index 35ef693..6a8f677 100644 > --- a/security/integrity/ima/Kconfig > +++ b/security/integrity/ima/Kconfig > @@ -10,6 +10,7 @@ config IMA > select CRYPTO_HASH_INFO > select TCG_TPM if HAS_IOMEM && !UML > select TCG_TIS if TCG_TPM && X86 > + select TCG_CRB if TCG_TPM && ACPI > select TCG_IBMVTPM if TCG_TPM && PPC_PSERIES > help > The Trusted Computing Group(TCG) runtime Integrity