Received: by 10.213.65.68 with SMTP id h4csp93338imn; Thu, 15 Mar 2018 10:31:29 -0700 (PDT) X-Google-Smtp-Source: AG47ELt+O3UteOl8wkdM80CaVuRb38RGqvYIacmBtSbccaVtBQkpHgAymjscLZyPERh/XesHNo18 X-Received: by 2002:a17:902:2f81:: with SMTP id t1-v6mr9010860plb.290.1521135089714; Thu, 15 Mar 2018 10:31:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521135089; cv=none; d=google.com; s=arc-20160816; b=r0G30s2BE/Sa5pNGnNiZCIXRP7pjhdIaJ3vdJbdsMVgQIWi2bqezjGTSTPv48YhaCR Pj5fl5uEc3ODmw9q1Jo1tsmcLAE7E1WI9EzCvdFHjdYdVpDvnwkp3GDd47FmO1BVTReE wNpudMgCXL/aGkSAg8wNBE36/pXfw1SL6tHvH3VxPvqzOh6wXCzkUZ7nsOFRHmYT43sD jz90HhSrcQj9rP93r6zTXjbSfg+UwN+0JamIBCaZ/X1BqlqaTGmdKcntNBBSHOJ/86Il +aP/FRkPaTISUvSKB9gsGY+e7E1ipWAA7uTeuzWpjsTF7Koi1QakwtXCAK+Q7TC/rJ1O eDkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:arc-authentication-results; bh=iGhxzwDpA8pNSEy2ga5jqtuXzTdDdpi34ViUiSQLZVE=; b=za9rbPnsW96jEhEPCKnQrW4h5jzGM7bhsjIT7qUDh3VjZp8dO6MDZFa9GJswiwyp9/ A4n7DLEahaiJPaWe1pW3VrBxb6OzSMqtZQbLMt2vzYSwJFttBDBLkoi/mnTUYIfSKddq K9LnjAuUEiNgr7k4gSEQT+Uv3toxlRz7PTNwRR974DpJC2CeD+8np/R27YM+TtduTYDJ WAwglpTeUnMW4QOceqloohT6HyAOkhYlpcUM+He/QxfQKTDjylMqa1OvymmEo+C5P1AT epOR5AViburIXeQ51ypl8v1cIM2GogUOP+8n6zo8OgYjDFqi/GjtT+uDRUoeEIOWO8H2 egdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=umedZYn6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z19si4092330pfd.397.2018.03.15.10.31.13; Thu, 15 Mar 2018 10:31:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=umedZYn6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752458AbeCOR3p (ORCPT + 99 others); Thu, 15 Mar 2018 13:29:45 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:38894 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751557AbeCOR3n (ORCPT ); Thu, 15 Mar 2018 13:29:43 -0400 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id D6EF88EE139; Thu, 15 Mar 2018 10:29:42 -0700 (PDT) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nTPAmKSsvcHe; Thu, 15 Mar 2018 10:29:42 -0700 (PDT) Received: from [153.66.254.194] (unknown [50.35.65.221]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 2F9D48EE0C7; Thu, 15 Mar 2018 10:29:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1521134982; bh=ykD4c+d0sBpa9kBmglZnFV77lRxNh5BIShz7ITIecQk=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=umedZYn6I6fSkIx1SlmkW4LIL2CIZyMBIZ1E6ut8MLYPFjajx4l2mBCnpvBOLUGra OrDumm554aZIUCBhIQ7A+GZqHMVLaJ5ppuJpx7rwRvgwvQeiUT6S9BcqeUrSTB90yE 3QXyMhcTx0/6oqrjVrRzXK1+Jq/cJzDC5CXzbHow= Message-ID: <1521134981.5348.62.camel@HansenPartnership.com> Subject: Re: [PATCH] security: Fix IMA Kconfig for dependencies on ARM64 From: James Bottomley To: Mimi Zohar , "Safford, David (GE Global Research, US)" , Jiandi An , Jason Gunthorpe Cc: "dmitry.kasatkin@gmail.com" , "jmorris@namei.org" , "serge@hallyn.com" , "linux-integrity@vger.kernel.org" , "linux-security-module@vger.kernel.org" , "linux-kernel@vger.kernel.org" Date: Thu, 15 Mar 2018 10:29:41 -0700 In-Reply-To: <1521134074.3547.629.camel@linux.vnet.ibm.com> References: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> <20180307185132.GA30102@ziepe.ca> <1520448953.10396.565.camel@linux.vnet.ibm.com> <1520449719.5558.28.camel@HansenPartnership.com> <1520450495.10396.587.camel@linux.vnet.ibm.com> <1520451662.24314.5.camel@HansenPartnership.com> <1520461156.10396.654.camel@linux.vnet.ibm.com> <191cfd49-0c66-a5ef-3d2b-b6c4132aa294@codeaurora.org> <1520615461.12216.6.camel@HansenPartnership.com> <1520891598.3547.190.camel@linux.vnet.ibm.com> <1520893847.4522.62.camel@HansenPartnership.com> <1520897400.3547.253.camel@linux.vnet.ibm.com> <1520899605.4522.67.camel@HansenPartnership.com> <1521038471.4508.25.camel@HansenPartnership.com> <1521047286.3547.470.camel@linux.vnet.ibm.com> <1521048306.4508.56.camel@HansenPartnership.com> <1521130749.3547.608.camel@linux.vnet.ibm.com> <1521133728.5348.51.camel@HansenPartnership.com> <1521134074.3547.629.camel@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2018-03-15 at 13:14 -0400, Mimi Zohar wrote: > On Thu, 2018-03-15 at 10:08 -0700, James Bottomley wrote: > > > > On Thu, 2018-03-15 at 12:19 -0400, Mimi Zohar wrote: > > > > > > > > > If EFI is extending the TPM, will the events be added to the TPM > > > event log or to the IMA measurement list? > > > > I'm not proposing any changes to the tpm_pcr_extend API.  At the > > moment it does an extend without logging, so that's what it will do > > in the EFI driver case as well.  That means logging is still the > > responsibility of the caller. > > Does EFI support extending multiple TPM banks? The specs are here: https://trustedcomputinggroup.org/tcg-efi-protocol-specification/ As I said, I'm not planning to change the tpm_pcr_.. API.  At the moment for a TPM2 we extend all banks in the tpm_pcr_extend() API, so that's what we'll continue to do ... including extending the sha256 banks with the sha1 hash, which seems to be our current practice. James