Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp93939imm; Mon, 2 Jul 2018 08:13:09 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcXjcRCpN40gpMLs7yqyGXxm3bu2KWSAFesH+1eIDFBoBpUQmdC5Cw83A2j8XCBIhDn2weB X-Received: by 2002:a17:902:5481:: with SMTP id e1-v6mr19760466pli.7.1530544389237; Mon, 02 Jul 2018 08:13:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530544389; cv=none; d=google.com; s=arc-20160816; b=THcLQCYbJzB2BjsBmYR5k6YGki72ssqhgIF/I4lxYWitLKBVMBs3jTQBeNq/IGkhN7 OpjU4g3YBT9DD7Fc9C0vMIMWBA2IwZhgZ1K8a+GUrkfR3RdKyEExAq+TBjSqlqSKi5Rg aybMrPXuim6DzYAIZ9xe0eSGwfDpPXKmWfD/y5cRNeV2pO8rfeXK7fXnayy6Ruoxyp7g +Ogr3YWDXhRLiJdwcG3EULKVLYnZ3HSJmTEzyEjfSlaLawB/glgoW8Ctq8madFk2bMqN W4HEyTCuFX/bHHLo2h87NbhSBcEh4cvVwLCjh06tv6fcKNzFI/C/6I7auApnZBm11Jel PmKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=o2z7eheBAy+g8gx7WDfnOm1po1XRDBarHCl5hPmul1o=; b=qkN6poWzykiAQH1Fm/VK0+JGnBEnG6bReAB2TERfqN4bE817qXfEmZm4kXJcu+AgkN u6lJ5kaLXQZBiHuVj605UeGwx26GdYDU0neL7hSlVNlwXFQfH6fX0NzPWvOZ4kB8UpVw zdPr+MfAL3+ernAXRhPP02SNiy7yhziwPYx+dcP+lgToYnthtE9Ra2DcnBnxx+vGOdpg ZL9QUycJFM5YmtsROATTqaptd3zScgaPHgD1KvhNb06Wcya/8+6O9Ts5dVcnTxPtbVcl mA38hqMQBL/TmOGoty+cKw24Kx5qumm128VPgUTIn/RhnwcU/srrg7e/TCXEOZxYGbYf X23w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o16-v6si15234971pll.449.2018.07.02.08.12.53; Mon, 02 Jul 2018 08:13:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752312AbeGBPMD (ORCPT + 99 others); Mon, 2 Jul 2018 11:12:03 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:49358 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752223AbeGBPMC (ORCPT ); Mon, 2 Jul 2018 11:12:02 -0400 Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w62F9IVJ126997 for ; Mon, 2 Jul 2018 11:12:01 -0400 Received: from e06smtp05.uk.ibm.com (e06smtp05.uk.ibm.com [195.75.94.101]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jykxbf0j2-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 02 Jul 2018 11:12:01 -0400 Received: from localhost by e06smtp05.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 2 Jul 2018 16:11:59 +0100 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp05.uk.ibm.com (192.168.101.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 2 Jul 2018 16:11:57 +0100 Received: from d06av24.portsmouth.uk.ibm.com (d06av24.portsmouth.uk.ibm.com [9.149.105.60]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w62FBuEG12845210 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 2 Jul 2018 15:11:56 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BF3FD4204F; Mon, 2 Jul 2018 16:11:39 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2927D42045; Mon, 2 Jul 2018 16:11:39 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.97.108]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 2 Jul 2018 16:11:39 +0100 (BST) Subject: Re: [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead From: Mimi Zohar To: Stefan Berger , linux-integrity@vger.kernel.org, jarkko.sakkinen@linux.intel.com Cc: linux-kernel@vger.kernel.org Date: Mon, 02 Jul 2018 11:11:44 -0400 In-Reply-To: <20180626190933.2508821-6-stefanb@linux.vnet.ibm.com> References: <20180626190933.2508821-1-stefanb@linux.vnet.ibm.com> <20180626190933.2508821-6-stefanb@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18070215-0020-0000-0000-000002A23C94 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18070215-0021-0000-0000-000020EE4E8D Message-Id: <1530544304.3709.40.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-02_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807020173 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Stefan, On Tue, 2018-06-26 at 15:09 -0400, Stefan Berger wrote: > Get rid of ima_used_chip and use ima_tpm_chip variable instead for > determining whether to use the TPM chip. I don't see a need for separating this change from the previous patch. Could you squash this patch with the previous one? As Jarkko has already queued the TPM patches, there's no need for posting them.  Posting just this one IMA patch is fine. thanks! Mimi > Signed-off-by: Stefan Berger > Acked-by: Jarkko Sakkinen > --- > security/integrity/ima/ima.h | 1 - > security/integrity/ima/ima_crypto.c | 2 +- > security/integrity/ima/ima_init.c | 7 ++----- > security/integrity/ima/ima_queue.c | 2 +- > 4 files changed, 4 insertions(+), 8 deletions(-) > > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > index 35409461a3f2..2ab1affffa36 100644 > --- a/security/integrity/ima/ima.h > +++ b/security/integrity/ima/ima.h > @@ -53,7 +53,6 @@ enum tpm_pcrs { TPM_PCR0 = 0, TPM_PCR8 = 8 }; > extern int ima_policy_flag; > > /* set during initialization */ > -extern int ima_used_chip; > extern int ima_hash_algo; > extern int ima_appraise; > extern struct tpm_chip *ima_tpm_chip; > diff --git a/security/integrity/ima/ima_crypto.c b/security/integrity/ima/ima_crypto.c > index 88082f35adb2..7e7e7e7c250a 100644 > --- a/security/integrity/ima/ima_crypto.c > +++ b/security/integrity/ima/ima_crypto.c > @@ -631,7 +631,7 @@ int ima_calc_buffer_hash(const void *buf, loff_t len, > > static void __init ima_pcrread(int idx, u8 *pcr) > { > - if (!ima_used_chip) > + if (!ima_tpm_chip) > return; > > if (tpm_pcr_read(ima_tpm_chip, idx, pcr) != 0) > diff --git a/security/integrity/ima/ima_init.c b/security/integrity/ima/ima_init.c > index 1437ed3dbccc..faac9ecaa0ae 100644 > --- a/security/integrity/ima/ima_init.c > +++ b/security/integrity/ima/ima_init.c > @@ -26,7 +26,6 @@ > > /* name for boot aggregate entry */ > static const char *boot_aggregate_name = "boot_aggregate"; > -int ima_used_chip; > struct tpm_chip *ima_tpm_chip; > > /* Add the boot aggregate to the IMA measurement list and extend > @@ -65,7 +64,7 @@ static int __init ima_add_boot_aggregate(void) > iint->ima_hash->algo = HASH_ALGO_SHA1; > iint->ima_hash->length = SHA1_DIGEST_SIZE; > > - if (ima_used_chip) { > + if (ima_tpm_chip) { > result = ima_calc_boot_aggregate(&hash.hdr); > if (result < 0) { > audit_cause = "hashing_error"; > @@ -110,9 +109,7 @@ int __init ima_init(void) > int rc; > > ima_tpm_chip = tpm_default_chip(); > - > - ima_used_chip = ima_tpm_chip != NULL; > - if (!ima_used_chip) > + if (!ima_tpm_chip) > pr_info("No TPM chip found, activating TPM-bypass!\n"); > > rc = integrity_init_keyring(INTEGRITY_KEYRING_IMA); > diff --git a/security/integrity/ima/ima_queue.c b/security/integrity/ima/ima_queue.c > index c6303fa19a49..b186819bd5aa 100644 > --- a/security/integrity/ima/ima_queue.c > +++ b/security/integrity/ima/ima_queue.c > @@ -142,7 +142,7 @@ static int ima_pcr_extend(const u8 *hash, int pcr) > { > int result = 0; > > - if (!ima_used_chip) > + if (!ima_tpm_chip) > return result; > > result = tpm_pcr_extend(ima_tpm_chip, pcr, hash);