From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-qv1-f51.google.com (mail-qv1-f51.google.com [209.85.219.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D69A210A14 for ; Fri, 16 Feb 2024 04:43:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.51 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708058620; cv=none; b=LweRAdiwWd3y2QEDA/GB+U3dqZ5CAL6CKHCx2p7WcTrIxGqxuzrrI22ZLIdhvymwMs4/xTa58/G9y1TPzwdGt4D6Ru0/WPT8MTUUMrQz2Rct0t6m4FQGu8IXNK3LpKs/MzxyceZkL1FEW2GVXl54nFOUjmWKt/prynOMXNw/yTQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708058620; c=relaxed/simple; bh=waeuX8RtjIW86KprZNCOqRp/iiUFgtT5YVoezffu7hk=; h=Date:Message-ID:MIME-Version:Content-Type:Content-Disposition: From:To:Cc:Subject:References:In-Reply-To; b=MtkhLd6iZ374okYUBp9zk0y2wRUJcqeST+3Ny03KU3pxpu34UCOpdilT6qEAqKS2dZT1zI6YFv5nvi/Lm1H+scPlpN+HAz48zL44r99jSg6258EwQo+XJfNfh2T6ibwsqQrXausz2N+QHGzu/+LjPWIVVM4o1vkhSX1yJZHKAzM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=paul-moore.com; spf=pass smtp.mailfrom=paul-moore.com; dkim=pass (2048-bit key) header.d=paul-moore.com header.i=@paul-moore.com header.b=QBYbynhN; arc=none smtp.client-ip=209.85.219.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=paul-moore.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=paul-moore.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=paul-moore.com header.i=@paul-moore.com header.b="QBYbynhN" Received: by mail-qv1-f51.google.com with SMTP id 6a1803df08f44-68f2a6fdeffso4893436d6.1 for ; Thu, 15 Feb 2024 20:43:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore.com; s=google; t=1708058617; x=1708663417; darn=vger.kernel.org; h=in-reply-to:references:subject:cc:to:from:content-transfer-encoding :content-disposition:mime-version:message-id:date:from:to:cc:subject :date:message-id:reply-to; bh=hzH2XjdwcrudKK0By8Y9Nwkfc0y204g7SCh9Xtz36uI=; b=QBYbynhNm8tm4vtdLyIvMt4Z2Zw06EGImgeGy0UxZw8I8v3PH1UoZU15fXXsza7pr3 0DiSaO4AgoLH864p9y6EK/IUAzWOkbDxO1zpB0L6ZlRLiTFvRe3/ZAGMR4NT3r2KSvUT DuUYIK3JZ6eYl3E6XGDdycU8Mvi8ClRnqREG/QRHmW/PtTw91XI3RmZPnajFuGUcTFlZ /Z9ogEJgRdSq8/YY1IA/W+QhWM890BLLr1IUSou+ADEvV+tq4Cc8fW600rXRkiRlhQv4 uDXs6dgWvdheOELMLWtwzXTmzysYMq5aQT9or6Aq/Ap74n22SX8wBxDlI5DpsM8/4Faq b5Xg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708058617; x=1708663417; h=in-reply-to:references:subject:cc:to:from:content-transfer-encoding :content-disposition:mime-version:message-id:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=hzH2XjdwcrudKK0By8Y9Nwkfc0y204g7SCh9Xtz36uI=; b=UgQE+7rUM8z3R6OxCoUpL2721CAvdMN4dmdV0QM/MW9m+DpGo55Z4+aNQ5o/5LWizW E1Ge8IbSKv7Hr4KmB32Fv07aGmzcL+PlHDAJiPxPFkDbC05m9kT+gy2wgfn8VaHqL+GV cW3zQi+oxj368pq9n1yWnVpwA+8lVKTJgSw4yhbP4W5Kt3ow693TRjuSSM22CfKKWTnK zQ3g3A2W28+a5h5ynRdYXqhsVfTaLbIo2q1gnaYdAQtMmK9YX/zEIbpZ1oW5Xo+2SgwG d4CUFmfjhC/MZIXKzm+swU92g8hEEVsMGicP1WM4xONBCpTbp2/R7ATyU9EKLWXI/B0J 38tw== X-Forwarded-Encrypted: i=1; AJvYcCXLUUdZQ7UvaNnFy0v+Gztsb4aZUkbmEnuBww0xrkZ5HCtimNtHFBKhE8ESHoJheHAtKp72U8dooNT2cioHTJfdBTOu9McA0eBvQM5crA== X-Gm-Message-State: AOJu0YznTVjUGO8P5+Cbdr+aCOy2U+IcpYBrhnBZh/MSdAy25D+egiQR yQqjuxAYBAqmvW1chwBmY4fyoWsoFclrJTFswVSVdbTG1qariQjOB+jWHz9OJA== X-Google-Smtp-Source: AGHT+IH4Re2re96Bj4x8lZKg32bzmDSpm8k6SPGJJSdEF1RKaSe7UJnZBT4cDAJ/C8/g+lnnFGrBLg== X-Received: by 2002:a05:6214:23ce:b0:68d:129e:f5c1 with SMTP id hr14-20020a05621423ce00b0068d129ef5c1mr4407697qvb.45.1708058617658; Thu, 15 Feb 2024 20:43:37 -0800 (PST) Received: from localhost ([70.22.175.108]) by smtp.gmail.com with ESMTPSA id og8-20020a056214428800b0068c4b445991sm1367791qvb.67.2024.02.15.20.43.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 Feb 2024 20:43:37 -0800 (PST) Date: Thu, 15 Feb 2024 23:43:36 -0500 Message-ID: <2cdfefc8661d0a82c28250fc22a93a47@paul-moore.com> Precedence: bulk X-Mailing-List: linux-fsdevel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit From: Paul Moore To: Roberto Sassu , viro@zeniv.linux.org.uk, brauner@kernel.org, jack@suse.cz, chuck.lever@oracle.com, jlayton@kernel.org, neilb@suse.de, kolga@netapp.com, Dai.Ngo@oracle.com, tom@talpey.com, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, dmitry.kasatkin@gmail.com, eric.snowberg@oracle.com, dhowells@redhat.com, jarkko@kernel.org, stephen.smalley.work@gmail.com, omosnace@redhat.com, casey@schaufler-ca.com, shuah@kernel.org, mic@digikod.net Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, selinux@vger.kernel.org, linux-kselftest@vger.kernel.org, Roberto Sassu Subject: Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure References: <20240215103113.2369171-1-roberto.sassu@huaweicloud.com> In-Reply-To: <20240215103113.2369171-1-roberto.sassu@huaweicloud.com> On Feb 15, 2024 Roberto Sassu wrote: > > IMA and EVM are not effectively LSMs, especially due to the fact that in > the past they could not provide a security blob while there is another LSM > active. > > That changed in the recent years, the LSM stacking feature now makes it > possible to stack together multiple LSMs, and allows them to provide a > security blob for most kernel objects. While the LSM stacking feature has > some limitations being worked out, it is already suitable to make IMA and > EVM as LSMs. > > The main purpose of this patch set is to remove IMA and EVM function calls, > hardcoded in the LSM infrastructure and other places in the kernel, and to > register them as LSM hook implementations, so that those functions are > called by the LSM infrastructure like other regular LSMs. As discussed earlier, I've just merged this into the lsm/dev tree; a big thank you to Roberto for working on this and to all helped along the way with reviews, testing, etc. I've wanted to see IMA/EVM integrated as proper LSMs for a while and I'm very happy to finally see it happening. Mimi, Roberto, I'm going to hold off on merging anything into the lsm/dev tree for a few days in case you decide you would prefer to take these patches yourselves. If I don't hear anything from the two of you, I'll plan to send these to Linus during the next merge window. -- paul-moore.com