From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from mx1.redhat.com ([209.132.183.28]) by bombadil.infradead.org with esmtps (Exim 4.80.1 #2 (Red Hat Linux)) id 1aMMlD-00020w-BG for kexec@lists.infradead.org; Thu, 21 Jan 2016 21:27:19 +0000 From: Paul Moore Subject: Re: [RFC PATCH v2 08/11] module: replace copy_module_from_fd with kernel version Date: Thu, 21 Jan 2016 16:26:56 -0500 Message-ID: <3085861.bPaQXnMeXx@sifl> In-Reply-To: <1453410902.9549.184.camel@linux.vnet.ibm.com> References: <1453129886-20192-1-git-send-email-zohar@linux.vnet.ibm.com> <5369666.tSqfcRVJfN@sifl> <1453410902.9549.184.camel@linux.vnet.ibm.com> MIME-Version: 1.0 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: Mimi Zohar Cc: John Johansen , Kees Cook , fsdevel@vger.kernel.org, Tetsuo Handa , Dmitry Kasatkin , "Luis R. Rodriguez" , Dmitry Torokhov , kexec@lists.infradead.org, David Howells , linux-security-module@vger.kernel.org, Casey Schaufler , David Woodhouse , linux-modules@vger.kernel.org On Thursday, January 21, 2016 04:15:02 PM Mimi Zohar wrote: > On Thu, 2016-01-21 at 10:45 -0500, Paul Moore wrote: > > On Thursday, January 21, 2016 08:12:12 AM Mimi Zohar wrote: > > > Paul, Casey, Kees, Jon, Tetsuo does it make sense to consolidate the > > > module, firmware, and kexec pre and post security hooks and have just > > > one set of pre and post security kernel_read_file hook instead? Does > > > it make sense for this patch set to define the new hooks to allow the > > > LSMs to migrate to it independently of each other? > > > > Well, as usual, the easiest way to both get solid feedback and actually > > get a change accepted is to post patches to the affected LSMs. Probably > > not what you wanted to hear, but at least I'm honest :) > > Unless I'm misreading the code, it might be a lot simpler than I > thought. Of the three LSM hooks kernel_module_request, > kernel_module_from_file, and kernel_fw_from_file, the only upstreamed > LSM on any of these hooks is SELinux, which is only on the > kernel_module_request hook. > > After converting the SELinux kernel_module_request hook to use the new > kernel_read_file(), do I then remove the three hooks? Are we > concerned about "minor" LSMs that have not been upstreamed that might be > using these hooks? You can't worry about code that isn't upstream; if this change breaks something that hasn't been merged, then the burden lies on the out-of-tree developers to change their code. -- paul moore security @ redhat _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec