From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753445AbeCPQv7 (ORCPT ); Fri, 16 Mar 2018 12:51:59 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:36408 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753026AbeCPQvy (ORCPT ); Fri, 16 Mar 2018 12:51:54 -0400 Subject: Re: [PATCH] security: Fix IMA Kconfig for dependencies on ARM64 From: Mimi Zohar To: James Bottomley , "Safford, David (GE Global Research, US)" , Jiandi An , Jason Gunthorpe Cc: "dmitry.kasatkin@gmail.com" , "jmorris@namei.org" , "serge@hallyn.com" , "linux-integrity@vger.kernel.org" , "linux-security-module@vger.kernel.org" , "linux-kernel@vger.kernel.org" Date: Fri, 16 Mar 2018 12:51:46 -0400 In-Reply-To: <1521134981.5348.62.camel@HansenPartnership.com> References: <1520400386-17674-1-git-send-email-anjiandi@codeaurora.org> <20180307185132.GA30102@ziepe.ca> <1520448953.10396.565.camel@linux.vnet.ibm.com> <1520449719.5558.28.camel@HansenPartnership.com> <1520450495.10396.587.camel@linux.vnet.ibm.com> <1520451662.24314.5.camel@HansenPartnership.com> <1520461156.10396.654.camel@linux.vnet.ibm.com> <191cfd49-0c66-a5ef-3d2b-b6c4132aa294@codeaurora.org> <1520615461.12216.6.camel@HansenPartnership.com> <1520891598.3547.190.camel@linux.vnet.ibm.com> <1520893847.4522.62.camel@HansenPartnership.com> <1520897400.3547.253.camel@linux.vnet.ibm.com> <1520899605.4522.67.camel@HansenPartnership.com> <1521038471.4508.25.camel@HansenPartnership.com> <1521047286.3547.470.camel@linux.vnet.ibm.com> <1521048306.4508.56.camel@HansenPartnership.com> <1521130749.3547.608.camel@linux.vnet.ibm.com> <1521133728.5348.51.camel@HansenPartnership.com> <1521134074.3547.629.camel@linux.vnet.ibm.com> <1521134981.5348.62.camel@HansenPartnership.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18031616-0040-0000-0000-000004220C32 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18031616-0041-0000-0000-000026251A60 Message-Id: <1521219106.3503.54.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-16_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803160205 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2018-03-15 at 10:29 -0700, James Bottomley wrote: > On Thu, 2018-03-15 at 13:14 -0400, Mimi Zohar wrote: > > On Thu, 2018-03-15 at 10:08 -0700, James Bottomley wrote: > > > > > > On Thu, 2018-03-15 at 12:19 -0400, Mimi Zohar wrote: > > > > > > > > > > > > > If EFI is extending the TPM, will the events be added to the TPM > > > > event log or to the IMA measurement list? > > > > > > I'm not proposing any changes to the tpm_pcr_extend API.  At the > > > moment it does an extend without logging, so that's what it will do > > > in the EFI driver case as well.  That means logging is still the > > > responsibility of the caller. > > > > Does EFI support extending multiple TPM banks? > > The specs are here: > > https://trustedcomputinggroup.org/tcg-efi-protocol-specification/ > > As I said, I'm not planning to change the tpm_pcr_.. API.  At the > moment for a TPM2 we extend all banks in the tpm_pcr_extend() API, so > that's what we'll continue to do ... including extending the sha256 > banks with the sha1 hash, which seems to be our current practice. Thanks, what you're planning on doing is a lot clearer now. Mimi