From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 71F60D4694A for ; Wed, 21 Jan 2026 15:41:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:MIME-Version:Date: Content-Transfer-Encoding:Content-Type:References:In-Reply-To:Cc:To:From: Subject:Message-ID:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=bJMVsqMsM4TnBCGz+qOUq+rSyO+NcLPnv+SRm0UJHUk=; b=HMWp5kh9FYFJtjPmL81nkNWf17 iQE4O/goJOWk6RrUsf9LzpLaG9+fPOI27blU9hgzztbX0P+uCzL3fAKT44X1G/+W14nkVvxXgJNKH A818G2oO3D7fy4QPyEYjA+mcQ25vGc2qGiWt5TiHAzqEVebeAH+dOfE+m1rdNGipqxwJsbubY+dvn YoI3/TMtBU70lG8udEyzAXdFfWkHTDfqruqweDqiWcKW1yQ24mgIyTqHcceHHu7zjVXu6Dxc1BJIM PAFsAtuiGkQSJOf6ARYtyZJelce4KY12jwDQdy++sUwihErRoIBF09hYDJfSseyhVU78IynFVHGH1 jjHlAbBA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1viaKd-00000005jWQ-0A6a; Wed, 21 Jan 2026 15:41:19 +0000 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1viaKZ-00000005jW5-3cZ7 for linux-arm-kernel@lists.infradead.org; Wed, 21 Jan 2026 15:41:17 +0000 Received: from pps.filterd (m0353725.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 60LDFWum022363; Wed, 21 Jan 2026 15:40:32 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=pp1; bh=bJMVsq MsM4TnBCGz+qOUq+rSyO+NcLPnv+SRm0UJHUk=; b=Fz46yFRn/4wweJ9HwSyn0M O3wMo3wca7aVIRwbN9CVhisZqENfMc3HFhMI1R1Hx3KlGjqlCbZu8AwagKRLPCSE KtbG9M1zbOrU6CS/8hQ7+xY8nLu6NZBIPG3FqbU2NILd7Kr+x97ij2PEFDIvdotI oWWgB/SNLr12otmb1cQa5ke23HCD3AhJkN1Ur2fRH8sIgYjdrg+0kXlfxxvYZaeh XDi9IeeWEL8Gwxf+ieJlCDTdY+XCpQfVaWFMSPNvevLd6Fj10LKPVjInhi2ZhFAk lR7Iwg87QYukvsa1i02OLJ2S1y8vKtGPgs58751UIWYcUvh+c0nYDXPgWuhL/RZQ == Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4br0ufkuhp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:32 +0000 (GMT) Received: from m0353725.ppops.net (m0353725.ppops.net [127.0.0.1]) by pps.reinject (8.18.1.12/8.18.0.8) with ESMTP id 60LFeVHZ006354; Wed, 21 Jan 2026 15:40:31 GMT Received: from ppma21.wdc07v.mail.ibm.com (5b.69.3da9.ip4.static.sl-reverse.com [169.61.105.91]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4br0ufkuhk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:31 +0000 (GMT) Received: from pps.filterd (ppma21.wdc07v.mail.ibm.com [127.0.0.1]) by ppma21.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id 60LDDsf5027334; Wed, 21 Jan 2026 15:40:30 GMT Received: from smtprelay06.dal12v.mail.ibm.com ([172.16.1.8]) by ppma21.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4brnrn4u84-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:30 +0000 Received: from smtpav01.wdc07v.mail.ibm.com (smtpav01.wdc07v.mail.ibm.com [10.39.53.228]) by smtprelay06.dal12v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 60LFeSVo29426232 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 21 Jan 2026 15:40:28 GMT Received: from smtpav01.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 559AA5804B; Wed, 21 Jan 2026 15:40:28 +0000 (GMT) Received: from smtpav01.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2938158065; Wed, 21 Jan 2026 15:40:25 +0000 (GMT) Received: from li-43857255-d5e6-4659-90f1-fc5cee4750ad.ibm.com (unknown [9.61.58.59]) by smtpav01.wdc07v.mail.ibm.com (Postfix) with ESMTP; Wed, 21 Jan 2026 15:40:25 +0000 (GMT) Message-ID: <1a0b6e5601a673a81f8823de0815f92b7afbeb60.camel@linux.ibm.com> Subject: Re: [PATCH 1/3] integrity: Make arch_ima_get_secureboot integrity-wide From: Mimi Zohar To: Coiby Xu , Ard Biesheuvel , Dave Hansen Cc: linux-integrity@vger.kernel.org, Heiko Carstens , Roberto Sassu , Catalin Marinas , Will Deacon , Madhavan Srinivasan , Michael Ellerman , Nicholas Piggin , "Christophe Leroy (CS GROUP)" , Vasily Gorbik , Alexander Gordeev , Christian Borntraeger , Sven Schnelle , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Paul Moore , James Morris , "Serge E. Hallyn" , Jarkko Sakkinen , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , open list , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:S390 ARCHITECTURE" , "open list:EXTENSIBLE FIRMWARE INTERFACE (EFI)" , "open list:SECURITY SUBSYSTEM" , "open list:KEYS/KEYRINGS_INTEGRITY" In-Reply-To: References: <20260115004328.194142-1-coxu@redhat.com> <20260115004328.194142-2-coxu@redhat.com> <8bfa859ed3a4f1cf0db0ab64d8c1c3b24684582a.camel@linux.ibm.com> <97b69bc79a5d9246f7a399510908c7b95b2e95e7.camel@linux.ibm.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Date: Wed, 21 Jan 2026 10:40:24 -0500 MIME-Version: 1.0 User-Agent: Evolution 3.56.2 (3.56.2-2.fc42) X-TM-AS-GCONF: 00 X-Proofpoint-GUID: WAqyQc7iYAb6bBztJEBir9hqT_fDY33W X-Proofpoint-ORIG-GUID: cSwAFNrvWB6VDbqJDgghQDN6Ynh6VVyS X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTIxMDEyOSBTYWx0ZWRfX3pjDpN110rfB f6LDluWAghYKhOYecWjxKqd1c4jRq0EL8adCIUMRJ1yCj9fhFWCTR8NlKTqMvOdjFnDezXfHyR7 CRP+BNm9lrFrQrrUKiI9/q77mePoKraN92J2qBc1dRLRgRKb2rIpAL/MAru7pVfnrRhoBcXV5y5 EVA9mCACOo0XE9en1N7SIg85RSjzUV59UIQBHeGztZoRKcuBrbh8cSsbnucRZMzSPSoRVhOx9ka wTaxrZmi1RmhiaBK0ahLVEuKzQi/GbfItGcq/AQqhGwiRRmIu+u6Aft6ydCxGG82EWnM/jdYsNE uqofPbC7m7ooe2l5GXr4FgTo1pvIYS1Kudl7tRh1P0c93Avu3UprXRB6JXXms7V/+I3K2wmMYek 85uYlsmRGCksYBiXA9wQ58l+B+huOfRUe8zxiNqoAq9NlKw4z2E66a/6W4lRi3ioTJAz5IEM6hE Tu8ERwmmxKjDi9qIu/w== X-Authority-Analysis: v=2.4 cv=bopBxUai c=1 sm=1 tr=0 ts=6970f370 cx=c_pps a=GFwsV6G8L6GxiO2Y/PsHdQ==:117 a=GFwsV6G8L6GxiO2Y/PsHdQ==:17 a=IkcTkHD0fZMA:10 a=vUbySO9Y5rIA:10 a=VkNPw1HP01LnGYTKEx00:22 a=iN3FFbS9Bkn7VKFBHvUA:9 a=QEXdDO2ut3YA:10 a=ZXulRonScM0A:10 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.20,FMLib:17.12.100.49 definitions=2026-01-21_02,2026-01-20_01,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 bulkscore=0 adultscore=0 suspectscore=0 impostorscore=0 phishscore=0 malwarescore=0 lowpriorityscore=0 priorityscore=1501 clxscore=1015 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2601150000 definitions=main-2601210129 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260121_074116_022573_60055651 X-CRM114-Status: GOOD ( 16.55 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Mon, 2026-01-19 at 12:04 +0800, Coiby Xu wrote: > diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kcon= fig > index 976e75f9b9ba..5dce572192d6 100644 > --- a/security/integrity/ima/Kconfig > +++ b/security/integrity/ima/Kconfig > @@ -311,6 +311,7 @@ config IMA_QUEUE_EARLY_BOOT_KEYS > config IMA_SECURE_AND_OR_TRUSTED_BOOT > bool > depends on IMA_ARCH_POLICY > + depends on INTEGRITY_SECURE_BOOT >=20 >=20 > Another idea is make a tree-wide arch_get_secureboot i.e. to move > current arch_ima_get_secureboot code to arch-specific secure boot > implementation. By this way, there will no need for a new Kconfig option > INTEGRITY_SECURE_BOOT. But I'm not sure if there is any unforeseen > concern. Originally basing IMA policy on the secure boot mode was an exception. As = long as making it public isn't an issue any longer, this sounds to me. Ard, Dav= e, do you have any issues with replacing arch_ima_get_secureboot() with arch_get_secureboot()?