From mboxrd@z Thu Jan 1 00:00:00 1970 Delivery-date: Mon, 16 Mar 2026 12:37:12 +0100 Received: from metis.whiteo.stw.pengutronix.de ([2a0a:edc0:2:b01:1d::104]) by lore.white.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1w26G0-001PzW-19 for lore@lore.pengutronix.de; Mon, 16 Mar 2026 12:37:12 +0100 Received: from bombadil.infradead.org ([2607:7c80:54:3::133]) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1w26Fz-0006ld-PW for lore@pengutronix.de; Mon, 16 Mar 2026 12:37:12 +0100 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Cc:To:In-Reply-To:References :Message-Id:Content-Transfer-Encoding:Content-Type:MIME-Version:Subject:Date: From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=rTraDuj3r4TjGhbUuIdBFOJiesX+KfSVfCykemb+T4M=; b=wNm14S4mwA4RCEyVNcymJmbgXX pLfBOVo8eEjJp23K2wK3zeK0wECdjgtHgeJNQg7W7Eu9GqR1nSaxF+fSmPqxg97GwM9Jrw5guOZ3r J5rfbUKLe82sPLBP/+OOpTdKx50m90WAHK03msIZJKFx1jpxw2/ncv0bLdIM1xenWjNGWgth3gumH uNKlkHIGqZzjmUtqWB+c3R5XvkKOMD+fu71avR//quvsWyHPDMdjc0ivYXC6O05lnt/D70p/4n0ix pHJAntjkuBYMmG4vVg9YE3ChBXypQWbKJ+AfUB6Gf2HTD81HE7HQ6gZR6YQt3ynJ4ufIH33zUefYk Iys4Fe9A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1w26FU-00000003qA0-3VHq; Mon, 16 Mar 2026 11:36:40 +0000 Received: from metis.whiteo.stw.pengutronix.de ([2a0a:edc0:2:b01:1d::104]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1w26FQ-00000003q86-47zl for barebox@lists.infradead.org; Mon, 16 Mar 2026 11:36:38 +0000 Received: from dude06.red.stw.pengutronix.de ([2a0a:edc0:0:1101:1d::5c]) by metis.whiteo.stw.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1w26FO-0006QV-Ut; Mon, 16 Mar 2026 12:36:34 +0100 From: Fabian Pflug Date: Mon, 16 Mar 2026 12:36:30 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20260316-v2026-02-0-topic-sconfig_console-v2-3-1eee8c762beb@pengutronix.de> References: <20260316-v2026-02-0-topic-sconfig_console-v2-0-1eee8c762beb@pengutronix.de> In-Reply-To: <20260316-v2026-02-0-topic-sconfig_console-v2-0-1eee8c762beb@pengutronix.de> To: BAREBOX , Sascha Hauer Cc: Fabian Pflug X-Mailer: b4 0.14.3 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260316_043637_035047_CA60CCD8 X-CRM114-Status: GOOD ( 12.32 ) X-BeenThere: barebox@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "barebox" X-SA-Exim-Connect-IP: 2607:7c80:54:3::133 X-SA-Exim-Mail-From: barebox-bounces+lore=pengutronix.de@lists.infradead.org X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on metis.whiteo.stw.pengutronix.de X-Spam-Level: X-Spam-Status: No, score=-2.8 required=4.0 tests=AWL,BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.2 Subject: [PATCH v2 3/5] security: policy: set active policy on boot X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000) X-SA-Exim-Scanned: Yes (on metis.whiteo.stw.pengutronix.de) If init name has been set at compiletime and the policy is available, because it is part of the path, then set the active policy to the policy selected by compiletime. Since this is so early in the bootchain, there is no need to call security_policy_activate, because there should not be any registered callbacks at this moment in time. If no policy could be found, then it will be filled as before by the first call to is_allowed. Signed-off-by: Fabian Pflug --- security/policy.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/security/policy.c b/security/policy.c index 85333d9e6f..e2d1b10a78 100644 --- a/security/policy.c +++ b/security/policy.c @@ -235,6 +235,9 @@ static int security_init(void) if (*CONFIG_SECURITY_POLICY_PATH) security_policy_add(default); + if (*CONFIG_SECURITY_POLICY_INIT) + active_policy = security_policy_get(CONFIG_SECURITY_POLICY_INIT); + return 0; } pure_initcall(security_init); -- 2.47.3