On Tue, 2020-09-29 at 14:17 +0200, Petr Vorel wrote: > Hi, > > > test1() > > { > > tst_res TINFO "verify boot aggregate" > > > - local zero="0000000000000000000000000000000000000000" > > local tpm_bios="$SECURITYFS/tpm0/binary_bios_measurements" > > - local ima_measurements="$ASCII_MEASUREMENTS" > > - local boot_aggregate boot_hash line > > + local cmd="evmctl ima_boot_aggregate" > > + local boot_aggregate cmd zero > > > - # IMA boot aggregate > > - read line < $ima_measurements > > - boot_hash=$(echo $line | awk '{print $(NF-1)}' | cut -d':' -f2) > > + if [ "$MISSING_EVMCTL" = 1 ]; then > > + if [ -f "$tpm_bios" ]; then > I leaved this error during rebase: > if [ ! -f "$tpm_bios" ]; then > > I'm still investigating corner case issue when > /sys/kernel/security/tpm0/binary_bios_measurements > is not presented (mostly when no TPM device, thus IMA "TPM-bypass" code being > used, but sometimes also for TPM 2.0 which does not export event log). There's another case as well. On one of my test systems with a TPM 2.0 chip, but without secure boot enabled, the binary_bios_measurements exists, but it can't be accessed. dmesg contains a secure boot status line. Mimi > > I'll send shortly v3. > > Kind regards, > Petr > > > + tst_res TCONF "missing $tpm_bios, $ERRMSG_EVMCTL" > > + return > > + fi > > + tst_check_cmds ima_boot_aggregate || return > > + cmd="ima_boot_aggregate -f $tpm_bios" > > + fi > > + tst_res TINFO "using command: $cmd"