From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id BCCB0C44536 for ; Wed, 21 Jan 2026 15:41:22 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [127.0.0.1]) by lists.ozlabs.org (Postfix) with ESMTP id 4dx7hd1cx0z2xqD; Thu, 22 Jan 2026 02:41:21 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; arc=none smtp.remote-ip=148.163.158.5 ARC-Seal: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1769010081; cv=none; b=CGbz8/RL7kUZGkyU7OXKwAryhOSngFJpIzCduMnYW1e7bd8KFyGvYUEkhosheanSQ4xMx4l24EOEp6vMWwOCTDWjRudm/0mjnaJ+cB4QIdfS3GKe8+XCOoV3gncN82oiB1D+g9NknfhjBuYRHu3VeWKDXbycYJ17dqc9EvdpZyQvH7UTv39pLpUpqYg0lPMrR4i1YLSKkn+JQjcSr4kghHH7aDGmQMmibAv05TpSBwLz+AVtleXph8yz5vLz/5e8IS/QMHk1wErPz6QLMWYyHfxzsKBGbjm6Br0EXvEwAxtqnQNCm8g/Z7re9e+O/Q+aAlioLsP1VLEQx1kA7R8g6g== ARC-Message-Signature: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1769010081; c=relaxed/relaxed; bh=bJMVsqMsM4TnBCGz+qOUq+rSyO+NcLPnv+SRm0UJHUk=; h=Message-ID:Subject:From:To:Cc:In-Reply-To:References:Content-Type: Date:MIME-Version; b=YdAtDTs52U4Z3wqrQ0R2CiWuJiZ0SmJWo/N0R7P6Oc7Ib1b7g0OLlo+e6LD7KlvqASYjHcQrO3S1T0BmPQQLAy4IfW9v/3ybHJWw9PoKBK01Z9aGJpkaxFxvM19qwZo+BXnYwiu11Omyuyig+U4oDsxuOIbUxJrlXeHZD/qlFV10WC6KMK3crrw0UudDuaxhbXV2XQ5dcCRsbd1KDIQLKWGHkeOtTEMRkbs4y1lfg/85Lv9vYl+cuIJ0ngrsYjLfl0vXwEEN84KetTfL6vQSQEh58SPc1EtJ8AEVSi7yk5mZzx2t2TFFxVACFL3DMwutc69bUSOBV2pwQStbOACA2Q== ARC-Authentication-Results: i=1; lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=linux.ibm.com; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=Fz46yFRn; dkim-atps=neutral; spf=pass (client-ip=148.163.158.5; helo=mx0b-001b2d01.pphosted.com; envelope-from=zohar@linux.ibm.com; receiver=lists.ozlabs.org) smtp.mailfrom=linux.ibm.com Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=linux.ibm.com Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=Fz46yFRn; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com (client-ip=148.163.158.5; helo=mx0b-001b2d01.pphosted.com; envelope-from=zohar@linux.ibm.com; receiver=lists.ozlabs.org) Received: from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4dx7hc1C9Dz2xpk for ; Thu, 22 Jan 2026 02:41:19 +1100 (AEDT) Received: from pps.filterd (m0353725.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 60LDFWum022363; Wed, 21 Jan 2026 15:40:32 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=pp1; bh=bJMVsq MsM4TnBCGz+qOUq+rSyO+NcLPnv+SRm0UJHUk=; b=Fz46yFRn/4wweJ9HwSyn0M O3wMo3wca7aVIRwbN9CVhisZqENfMc3HFhMI1R1Hx3KlGjqlCbZu8AwagKRLPCSE KtbG9M1zbOrU6CS/8hQ7+xY8nLu6NZBIPG3FqbU2NILd7Kr+x97ij2PEFDIvdotI oWWgB/SNLr12otmb1cQa5ke23HCD3AhJkN1Ur2fRH8sIgYjdrg+0kXlfxxvYZaeh XDi9IeeWEL8Gwxf+ieJlCDTdY+XCpQfVaWFMSPNvevLd6Fj10LKPVjInhi2ZhFAk lR7Iwg87QYukvsa1i02OLJ2S1y8vKtGPgs58751UIWYcUvh+c0nYDXPgWuhL/RZQ == Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4br0ufkuhp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:32 +0000 (GMT) Received: from m0353725.ppops.net (m0353725.ppops.net [127.0.0.1]) by pps.reinject (8.18.1.12/8.18.0.8) with ESMTP id 60LFeVHZ006354; Wed, 21 Jan 2026 15:40:31 GMT Received: from ppma21.wdc07v.mail.ibm.com (5b.69.3da9.ip4.static.sl-reverse.com [169.61.105.91]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4br0ufkuhk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:31 +0000 (GMT) Received: from pps.filterd (ppma21.wdc07v.mail.ibm.com [127.0.0.1]) by ppma21.wdc07v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id 60LDDsf5027334; Wed, 21 Jan 2026 15:40:30 GMT Received: from smtprelay06.dal12v.mail.ibm.com ([172.16.1.8]) by ppma21.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4brnrn4u84-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Jan 2026 15:40:30 +0000 Received: from smtpav01.wdc07v.mail.ibm.com (smtpav01.wdc07v.mail.ibm.com [10.39.53.228]) by smtprelay06.dal12v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 60LFeSVo29426232 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 21 Jan 2026 15:40:28 GMT Received: from smtpav01.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 559AA5804B; Wed, 21 Jan 2026 15:40:28 +0000 (GMT) Received: from smtpav01.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2938158065; Wed, 21 Jan 2026 15:40:25 +0000 (GMT) Received: from li-43857255-d5e6-4659-90f1-fc5cee4750ad.ibm.com (unknown [9.61.58.59]) by smtpav01.wdc07v.mail.ibm.com (Postfix) with ESMTP; Wed, 21 Jan 2026 15:40:25 +0000 (GMT) Message-ID: <1a0b6e5601a673a81f8823de0815f92b7afbeb60.camel@linux.ibm.com> Subject: Re: [PATCH 1/3] integrity: Make arch_ima_get_secureboot integrity-wide From: Mimi Zohar To: Coiby Xu , Ard Biesheuvel , Dave Hansen Cc: linux-integrity@vger.kernel.org, Heiko Carstens , Roberto Sassu , Catalin Marinas , Will Deacon , Madhavan Srinivasan , Michael Ellerman , Nicholas Piggin , "Christophe Leroy (CS GROUP)" , Vasily Gorbik , Alexander Gordeev , Christian Borntraeger , Sven Schnelle , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Paul Moore , James Morris , "Serge E. Hallyn" , Jarkko Sakkinen , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , open list , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:S390 ARCHITECTURE" , "open list:EXTENSIBLE FIRMWARE INTERFACE (EFI)" , "open list:SECURITY SUBSYSTEM" , "open list:KEYS/KEYRINGS_INTEGRITY" In-Reply-To: References: <20260115004328.194142-1-coxu@redhat.com> <20260115004328.194142-2-coxu@redhat.com> <8bfa859ed3a4f1cf0db0ab64d8c1c3b24684582a.camel@linux.ibm.com> <97b69bc79a5d9246f7a399510908c7b95b2e95e7.camel@linux.ibm.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Date: Wed, 21 Jan 2026 10:40:24 -0500 X-Mailing-List: linuxppc-dev@lists.ozlabs.org List-Id: List-Help: List-Owner: List-Post: List-Archive: , List-Subscribe: , , List-Unsubscribe: Precedence: list MIME-Version: 1.0 User-Agent: Evolution 3.56.2 (3.56.2-2.fc42) X-TM-AS-GCONF: 00 X-Proofpoint-GUID: WAqyQc7iYAb6bBztJEBir9hqT_fDY33W X-Proofpoint-ORIG-GUID: cSwAFNrvWB6VDbqJDgghQDN6Ynh6VVyS X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMTIxMDEyOSBTYWx0ZWRfX3pjDpN110rfB f6LDluWAghYKhOYecWjxKqd1c4jRq0EL8adCIUMRJ1yCj9fhFWCTR8NlKTqMvOdjFnDezXfHyR7 CRP+BNm9lrFrQrrUKiI9/q77mePoKraN92J2qBc1dRLRgRKb2rIpAL/MAru7pVfnrRhoBcXV5y5 EVA9mCACOo0XE9en1N7SIg85RSjzUV59UIQBHeGztZoRKcuBrbh8cSsbnucRZMzSPSoRVhOx9ka wTaxrZmi1RmhiaBK0ahLVEuKzQi/GbfItGcq/AQqhGwiRRmIu+u6Aft6ydCxGG82EWnM/jdYsNE uqofPbC7m7ooe2l5GXr4FgTo1pvIYS1Kudl7tRh1P0c93Avu3UprXRB6JXXms7V/+I3K2wmMYek 85uYlsmRGCksYBiXA9wQ58l+B+huOfRUe8zxiNqoAq9NlKw4z2E66a/6W4lRi3ioTJAz5IEM6hE Tu8ERwmmxKjDi9qIu/w== X-Authority-Analysis: v=2.4 cv=bopBxUai c=1 sm=1 tr=0 ts=6970f370 cx=c_pps a=GFwsV6G8L6GxiO2Y/PsHdQ==:117 a=GFwsV6G8L6GxiO2Y/PsHdQ==:17 a=IkcTkHD0fZMA:10 a=vUbySO9Y5rIA:10 a=VkNPw1HP01LnGYTKEx00:22 a=iN3FFbS9Bkn7VKFBHvUA:9 a=QEXdDO2ut3YA:10 a=ZXulRonScM0A:10 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.20,FMLib:17.12.100.49 definitions=2026-01-21_02,2026-01-20_01,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 bulkscore=0 adultscore=0 suspectscore=0 impostorscore=0 phishscore=0 malwarescore=0 lowpriorityscore=0 priorityscore=1501 clxscore=1015 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2601150000 definitions=main-2601210129 On Mon, 2026-01-19 at 12:04 +0800, Coiby Xu wrote: > diff --git a/security/integrity/ima/Kconfig b/security/integrity/ima/Kcon= fig > index 976e75f9b9ba..5dce572192d6 100644 > --- a/security/integrity/ima/Kconfig > +++ b/security/integrity/ima/Kconfig > @@ -311,6 +311,7 @@ config IMA_QUEUE_EARLY_BOOT_KEYS > config IMA_SECURE_AND_OR_TRUSTED_BOOT > bool > depends on IMA_ARCH_POLICY > + depends on INTEGRITY_SECURE_BOOT >=20 >=20 > Another idea is make a tree-wide arch_get_secureboot i.e. to move > current arch_ima_get_secureboot code to arch-specific secure boot > implementation. By this way, there will no need for a new Kconfig option > INTEGRITY_SECURE_BOOT. But I'm not sure if there is any unforeseen > concern. Originally basing IMA policy on the secure boot mode was an exception. As = long as making it public isn't an issue any longer, this sounds to me. Ard, Dav= e, do you have any issues with replacing arch_ima_get_secureboot() with arch_get_secureboot()?