> > > @@ -404,16 +398,24 @@ static int __init 
> > > create_securityfs_measurement_lists(void)
> > >           char file_name[NAME_MAX + 1];
> > >           struct dentry *dentry;
> > >  
> > > -         sprintf(file_name, "ascii_runtime_measurements_%s",
> > > -                 hash_algo_name[algo]);
> > > +         if (algo == HASH_ALGO__LAST)
> > > +                 sprintf(file_name, 
> > > "ascii_runtime_measurements_tpm_alg_%x",
> > > +                         ima_tpm_chip->allocated_banks[i].alg_id);
> > > +         else
> > > +                 sprintf(file_name, "ascii_runtime_measurements_%s",
> > > +                         hash_algo_name[algo]);
> > >           dentry = securityfs_create_file(file_name, S_IRUSR | S_IRGRP,
> > >                                           ima_dir, (void *)(uintptr_t)i,
> > >                                           &ima_ascii_measurements_ops);
> > >           if (IS_ERR(dentry))
> > >                   return PTR_ERR(dentry);
> > >  
> > > -         sprintf(file_name, "binary_runtime_measurements_%s",
> > > -                 hash_algo_name[algo]);
> > > +         if (algo == HASH_ALGO__LAST)
> > > +                 sprintf(file_name, 
> > > "binary_runtime_measurements_tpm_alg_%x",
> > > +                         ima_tpm_chip->allocated_banks[i].alg_id);
> > 
> > There's no point in creating either of the securityfs files if the kernel
> > doesn't support the hash algorithm.
> 
> It is not useful per se, but since it is an information that it is
> produced and maintained by IMA, we can print it. And second, it will
> expose the fact that there is an unsupported algorithm (in the case of
> SHA3-256, the fix is add to the TPM - crypto subsystem mapping in tpm2-
> cmd.c).

Yes, agreed.

Dmitry, the Subject line implies the measurement lists aren't being created, yet
you're actually creating them.  Please update the patch description before re-
posting.

thanks,

Mimi

Reply via email to