[RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Romain Naour
romain.naour at smile.fr
Mon Jul 1 13:38:14 UTC 2024
From: Romain Naour <romain.naour at skf.com>
It has been reported that on some plateforms the ima and evm
initialization were performed too early during initcall initialization
process and misses TPM chip detection [1] [2].
Indeed, ima may uses a TPM chip but requires to wait for bus
interface (spi or i2c) and TPM driver initialization.
[ 0.166261] ima: No TPM chip found, activating TPM-bypass!
...
[ 0.166322] evm: Initialising EVM extended attributes:
...
[ 0.182571] ti-sci 44083000.system-controller: ABI: 3.1 (firmware rev 0x0009 '9.2.4--v09.02.04 (Kool Koala)')
[ 0.281540] omap_i2c 42120000.i2c: bus 0 rev0.12 at 400 kHz
[ 0.282314] omap_i2c 2000000.i2c: bus 4 rev0.12 at 400 kHz
[ 0.282972] omap_i2c 2010000.i2c: bus 5 rev0.12 at 400 kHz
[ 0.335177] tpm_tis_i2c 2-002e: 2.0 TPM (device-id 0x1C, rev-id 22)
[ 0.471596] omap_i2c 2020000.i2c: bus 2 rev0.12 at 100 kHz
[ 0.472310] omap_i2c 2030000.i2c: bus 6 rev0.12 at 400 kHz
[ 0.472951] omap_i2c 2040000.i2c: bus 3 rev0.12 at 100 kHz
[ 0.473596] omap_i2c 2050000.i2c: bus 7 rev0.12 at 400 kHz
[ 0.474274] omap_i2c 2060000.i2c: bus 1 rev0.12 at 100 kHz
The ima stack was expecting to start after the TPM device (hence the
comment) using late_initcall() but fail to do so on such plateforms:
late_initcall(init_ima); /* Start IMA after the TPM is available */
Using late_initcall_sync() variant allows to really wait for i2c
initialization completion.
[ 0.285986] omap_i2c 42120000.i2c: bus 0 rev0.12 at 400 kHz
[ 0.286706] omap_i2c 2000000.i2c: bus 4 rev0.12 at 400 kHz
[ 0.287382] omap_i2c 2010000.i2c: bus 5 rev0.12 at 400 kHz
[ 0.331503] tpm_tis_i2c 2-002e: 2.0 TPM (device-id 0x1C, rev-id 22)
[ 0.677185] omap_i2c 2020000.i2c: bus 2 rev0.12 at 100 kHz
[ 0.677904] omap_i2c 2030000.i2c: bus 6 rev0.12 at 400 kHz
[ 0.678557] omap_i2c 2040000.i2c: bus 3 rev0.12 at 100 kHz
[ 0.679167] omap_i2c 2050000.i2c: bus 7 rev0.12 at 400 kHz
[ 0.679792] omap_i2c 2060000.i2c: bus 1 rev0.12 at 100 kHz
...
[ 3.062788] ima: Allocated hash algorithm: sha256
...
[ 3.318975] ima: No architecture policies found
[ 3.323536] evm: Initialising EVM extended attributes:
[ 3.328662] evm: security.selinux (disabled)
[ 3.332919] evm: security.SMACK64 (disabled)
[ 3.337177] evm: security.SMACK64EXEC (disabled)
[ 3.341781] evm: security.SMACK64TRANSMUTE (disabled)
[ 3.346819] evm: security.SMACK64MMAP (disabled)
[ 3.351422] evm: security.apparmor (disabled)
[ 3.355764] evm: security.ima
[ 3.358721] evm: security.capability
[ 3.362285] evm: HMAC attrs: 0x1
[1] https://lore.kernel.org/linux-integrity/9b98d912-ba78-402c-a5c8-154bef8794f7@smile.fr/
[2] https://e2e.ti.com/support/processors-group/processors/f/processors-forum/1375425/tda4vm-ima-vs-tpm-builtin-driver-boot-order
Signed-off-by: Romain Naour <romain.naour at skf.com>
---
security/integrity/evm/evm_main.c | 2 +-
security/integrity/ima/ima_main.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/security/integrity/evm/evm_main.c b/security/integrity/evm/evm_main.c
index 62fe66dd53ce..316f8d140825 100644
--- a/security/integrity/evm/evm_main.c
+++ b/security/integrity/evm/evm_main.c
@@ -1180,4 +1180,4 @@ DEFINE_LSM(evm) = {
.blobs = &evm_blob_sizes,
};
-late_initcall(init_evm);
+late_initcall_sync(init_evm); /* Start EVM after IMA */
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index f04f43af651c..0aa7cd9aabfa 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -1220,4 +1220,4 @@ DEFINE_LSM(ima) = {
.blobs = &ima_blob_sizes,
};
-late_initcall(init_ima); /* Start IMA after the TPM is available */
+late_initcall_sync(init_ima); /* Start IMA after the TPM is available */
--
2.45.0
More information about the Linux-security-module-archive
mailing list