[RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Paul Menzel
pmenzel at molgen.mpg.de
Mon Jul 1 13:53:44 UTC 2024
Dear Romain,
Thank you for your patch.
Am 01.07.24 um 15:38 schrieb Romain Naour:
> From: Romain Naour <romain.naour at skf.com>
>
> It has been reported that on some plateforms the ima and evm
platforms
> initialization were performed too early during initcall initialization
> process and misses TPM chip detection [1] [2].
>
> Indeed, ima may uses a TPM chip but requires to wait for bus
> interface (spi or i2c) and TPM driver initialization.
>
> [ 0.166261] ima: No TPM chip found, activating TPM-bypass!
> ...
> [ 0.166322] evm: Initialising EVM extended attributes:
> ...
> [ 0.182571] ti-sci 44083000.system-controller: ABI: 3.1 (firmware rev 0x0009 '9.2.4--v09.02.04 (Kool Koala)')
> [ 0.281540] omap_i2c 42120000.i2c: bus 0 rev0.12 at 400 kHz
> [ 0.282314] omap_i2c 2000000.i2c: bus 4 rev0.12 at 400 kHz
> [ 0.282972] omap_i2c 2010000.i2c: bus 5 rev0.12 at 400 kHz
> [ 0.335177] tpm_tis_i2c 2-002e: 2.0 TPM (device-id 0x1C, rev-id 22)
> [ 0.471596] omap_i2c 2020000.i2c: bus 2 rev0.12 at 100 kHz
> [ 0.472310] omap_i2c 2030000.i2c: bus 6 rev0.12 at 400 kHz
> [ 0.472951] omap_i2c 2040000.i2c: bus 3 rev0.12 at 100 kHz
> [ 0.473596] omap_i2c 2050000.i2c: bus 7 rev0.12 at 400 kHz
> [ 0.474274] omap_i2c 2060000.i2c: bus 1 rev0.12 at 100 kHz
>
> The ima stack was expecting to start after the TPM device (hence the
> comment) using late_initcall() but fail to do so on such plateforms:
platforms
>
> late_initcall(init_ima); /* Start IMA after the TPM is available */
>
> Using late_initcall_sync() variant allows to really wait for i2c
> initialization completion.
>
> [ 0.285986] omap_i2c 42120000.i2c: bus 0 rev0.12 at 400 kHz
> [ 0.286706] omap_i2c 2000000.i2c: bus 4 rev0.12 at 400 kHz
> [ 0.287382] omap_i2c 2010000.i2c: bus 5 rev0.12 at 400 kHz
> [ 0.331503] tpm_tis_i2c 2-002e: 2.0 TPM (device-id 0x1C, rev-id 22)
> [ 0.677185] omap_i2c 2020000.i2c: bus 2 rev0.12 at 100 kHz
> [ 0.677904] omap_i2c 2030000.i2c: bus 6 rev0.12 at 400 kHz
> [ 0.678557] omap_i2c 2040000.i2c: bus 3 rev0.12 at 100 kHz
> [ 0.679167] omap_i2c 2050000.i2c: bus 7 rev0.12 at 400 kHz
> [ 0.679792] omap_i2c 2060000.i2c: bus 1 rev0.12 at 100 kHz
> ...
> [ 3.062788] ima: Allocated hash algorithm: sha256
> ...
> [ 3.318975] ima: No architecture policies found
> [ 3.323536] evm: Initialising EVM extended attributes:
> [ 3.328662] evm: security.selinux (disabled)
> [ 3.332919] evm: security.SMACK64 (disabled)
> [ 3.337177] evm: security.SMACK64EXEC (disabled)
> [ 3.341781] evm: security.SMACK64TRANSMUTE (disabled)
> [ 3.346819] evm: security.SMACK64MMAP (disabled)
> [ 3.351422] evm: security.apparmor (disabled)
> [ 3.355764] evm: security.ima
> [ 3.358721] evm: security.capability
> [ 3.362285] evm: HMAC attrs: 0x1
>
> [1] https://lore.kernel.org/linux-integrity/9b98d912-ba78-402c-a5c8-154bef8794f7@smile.fr/
> [2] https://e2e.ti.com/support/processors-group/processors/f/processors-forum/1375425/tda4vm-ima-vs-tpm-builtin-driver-boot-order
>
> Signed-off-by: Romain Naour <romain.naour at skf.com>
Should this get a Fixes: tag and be also applied to the stable series?
> ---
> security/integrity/evm/evm_main.c | 2 +-
> security/integrity/ima/ima_main.c | 2 +-
> 2 files changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/security/integrity/evm/evm_main.c b/security/integrity/evm/evm_main.c
> index 62fe66dd53ce..316f8d140825 100644
> --- a/security/integrity/evm/evm_main.c
> +++ b/security/integrity/evm/evm_main.c
> @@ -1180,4 +1180,4 @@ DEFINE_LSM(evm) = {
> .blobs = &evm_blob_sizes,
> };
>
> -late_initcall(init_evm);
> +late_initcall_sync(init_evm); /* Start EVM after IMA */
> diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
> index f04f43af651c..0aa7cd9aabfa 100644
> --- a/security/integrity/ima/ima_main.c
> +++ b/security/integrity/ima/ima_main.c
> @@ -1220,4 +1220,4 @@ DEFINE_LSM(ima) = {
> .blobs = &ima_blob_sizes,
> };
>
> -late_initcall(init_ima); /* Start IMA after the TPM is available */
> +late_initcall_sync(init_ima); /* Start IMA after the TPM is available */
Looks good to me.
Kind regards,
Paul
More information about the Linux-security-module-archive
mailing list