Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1372558pxb; Sun, 17 Jan 2021 06:36:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJxfpTouw+8EB+LfJ5TUXqXyBZvtQrQir16EQt8ItEnbU1IAe1QfwOv3sAVz3SAj7dRdFhu+ X-Received: by 2002:a17:906:1c17:: with SMTP id k23mr12047350ejg.255.1610894213124; Sun, 17 Jan 2021 06:36:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610894213; cv=none; d=google.com; s=arc-20160816; b=Ux/nmnRaD5iu2gEvoygjjp58ujheir3vL/nLFeGUXBhPX0As3zOfdZq8YRVMRXDzDs TOlvwiZuPwR9c4aS3obJ7k+U2HaFOlUjn/BlMXUj1wbNxUY8w75h21ncLyR8GaGE2Ij5 CI9TputZE8xKifkrBmQzDpPI7xSEA9Crl9heqO3jKu9Vdrq6GoLOwjCJD4Z0PTsSzO16 pC4BwkPU9kWs+LuEzz1Y7S89Bxtea3RRXWgxlYkLouRa9PpMq3FDerbqAr9y9fnTylh4 TNHC8PUpfW7zwJrkMOafx0ePhbkNIiTm0svRNrLZRs18y9lg+f73SgmHqvltbOzvRTAs p8nQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=aSRzJXvRnoceVDpJc0V2EkfyGl6pPSx5UaSJDybPP8o=; b=lUazO8xJiSO2uqltrSRnDyqNMz6vzP3LIGyOEk0a06NNU5Fsugrb9/uWK8eVRFMHUH gyHlpV2ineeABclhe+hcWufsavCtBDGLFSBDhogBKtth5/llxduaQePihwQBRdFAwyXM xZ1ev7E2Z8EMibhacbrfRBHA7DzzjmNUUDTW62yXKQLKEQk7K/EulTYR7k7BkWvfgUwB /aEL3ItZwQQjDTsKSuFs1rZKSF9uVuS3qeYw6CCmz3TykdhXMYuEqtzDkDWc9xazA42N xfXMeUw+K2hgPV56j8m75jxoVSeUtnjd3BFVKgc1BX17FUlaO2+g3TKkS2fqixViboq5 TO8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fmuP7loA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ce20si6835808edb.138.2021.01.17.06.36.30; Sun, 17 Jan 2021 06:36:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fmuP7loA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728181AbhAQOdD (ORCPT + 99 others); Sun, 17 Jan 2021 09:33:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:52108 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726209AbhAQOdA (ORCPT ); Sun, 17 Jan 2021 09:33:00 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0114320791; Sun, 17 Jan 2021 14:32:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1610893939; bh=fC0xE+/aPbZTMKCRNvqaATbwzFKoHIbiqX9FSPt4u/I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fmuP7loAyQwV1D2OBPwxl3wTMhCZPRoYa/4OYT7GQWfDFkWIZdT2fWzqSFLt/chhS tjc4+LcY8n3iMen51+6MqG0oHNplwibBiLErIkwCu5Ga2U1FroDqPa0JGPPY68Hj1q cw+3v4amhdLZaxDjL6tBXBpqWYTrMlcuz9XfVij4= Date: Sun, 17 Jan 2021 15:32:17 +0100 From: Greg Kroah-Hartman To: Wei Liu Cc: Randy Dunlap , Linux Kernel List , tyhicks@linux.microsoft.com, "Michael S. Tsirkin" , Jason Wang , Thomas Gleixner , Arnd Bergmann , Christian Gromm Subject: Re: [PATCH] fTPM: make sure TEE is initialized before fTPM Message-ID: References: <20210116001301.16861-1-wei.liu@kernel.org> <20210116115529.oq2k2qpgyawngcqn@liuwe-devbox-debian-v2> <20210116121109.xenpxbobni4glecg@liuwe-devbox-debian-v2> <20210117142127.vqgrfzld42sfsylb@liuwe-devbox-debian-v2> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210117142127.vqgrfzld42sfsylb@liuwe-devbox-debian-v2> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jan 17, 2021 at 02:21:27PM +0000, Wei Liu wrote: > On Sun, Jan 17, 2021 at 09:29:42AM +0100, Greg Kroah-Hartman wrote: > > On Sat, Jan 16, 2021 at 12:11:09PM +0000, Wei Liu wrote: > > > On Sat, Jan 16, 2021 at 11:55:29AM +0000, Wei Liu wrote: > > > > On Fri, Jan 15, 2021 at 04:49:57PM -0800, Randy Dunlap wrote: > > > > > Hi, > > > > > > > > > > On 1/15/21 4:12 PM, Wei Liu wrote: > > > > > > For built-in drivers, the order of initialization function invocation is > > > > > > determined by their link order. > > > > > > > > > > > > The original code linked TPM drivers before TEE driver when they were > > > > > > both built in. That caused fTPM's initialization to be deferred to a > > > > > > worker thread instead of running on PID 1. > > > > > > > > > > > > That is problematic because IMA's initialization routine, which runs on > > > > > > PID 1 as a late initcall, needs to have access to the default TPM > > > > > > instance. If fTPM's initialization is deferred, IMA will not be able to > > > > > > get hold of a TPM instance in time. > > > > > > > > > > > > Fix this by modifying Makefile to make sure TEE is initialized before > > > > > > fTPM when they are both built in. > > > > > > > > > > > > Signed-off-by: Wei Liu > > > > > > --- > > > > > > drivers/Makefile | 5 +++++ > > > > > > 1 file changed, 5 insertions(+) > > > > > > > > > > > > diff --git a/drivers/Makefile b/drivers/Makefile > > > > > > index fd11b9ac4cc3..45ea5ec9d0fd 100644 > > > > > > --- a/drivers/Makefile > > > > > > +++ b/drivers/Makefile > > > > > > @@ -180,6 +180,11 @@ obj-$(CONFIG_NVMEM) += nvmem/ > > > > > > obj-$(CONFIG_FPGA) += fpga/ > > > > > > obj-$(CONFIG_FSI) += fsi/ > > > > > > obj-$(CONFIG_TEE) += tee/ > > > > > > + > > > > > > +# TPM drivers must come after TEE, otherwise fTPM initialization will be > > > > > > +# deferred, which causes IMA to not get a TPM device in time > > > > > > +obj-$(CONFIG_TCG_TPM) += char/tpm/ > > > > > > + > > > > > > obj-$(CONFIG_MULTIPLEXER) += mux/ > > > > > > obj-$(CONFIG_UNISYS_VISORBUS) += visorbus/ > > > > > > obj-$(CONFIG_SIOX) += siox/ > > > > > > > > > > > > > > > > As I suspected and then tested, since you did not remove the other build > > > > > of char/tpm/, this ends up with multiple definition linker errors (below). > > > > > > > > Oops, I didn't commit the hunk that removed the line in char/Makefile. > > > > > > > > But I will hold off sending out v2 until the following discussion is > > > > settled. > > > > > > > > > > > > > > I would think that instead of depending on Makefile order you should use different > > > > > initcall levels as needed. Depending on Makefile order is what we did 15 years ago. > > > > > > > > > > > > > No, not really. The same trick was used in 2014 (1bacc894c227). > > > > > > > > Both TEE and TPM are just drivers. I think they belong to the same level > > > > (at the moment device_initcall). Looking at the list of levels, I'm not > > > > sure how I can move TEE to a different level. > > > > > > > > Out of the seven levels, which one would you suggest I use for which > > > > driver? > > > > > > A bit more random thought. > > > > > > Moving one driver to a different level is not the solution either. What > > > if there is a dependency chain in the future in which more than 2 > > > drivers are involved? Do we invent more levels or abuse levels that > > > aren't supposed to be used by device drivers? > > > > > > The proper solution to me is to somehow sort the initcalls with their > > > dependencies in mind. The requires quite a bit of engineering > > > (integrating depmod into kernel build?). Given that there are only a few > > > cases, I don't think effort would be worth it. > > > > Make it an explicit dependancy in the driver, and then things will be > > loaded properly. > > I take it you mean using MODULE_SOFTDEP to do that? That's one way, or just explicitly depend on a symbol in the other module. > > You can always defer your probe if you do not have all > > of the proper resources, which is how these types of things are handled, > > instead of worrying about creating new init levels. > > > fTPM's probe is already deferred in current Linux without this patch. What patch? > It > will eventually show up in Linux but at that point it is too late for > Linux's Integrity Measurement Architecture to use it. How can it be "too late"? > The probe getting deferred is exactly what I tried to avoid here. :-) Then don't start up IMA without it? I really don't know, but this feels like something is broken in your module... thanks, greg k-h