From: "Dr. Greg" <greg@enjellic.com>
To: linux-security-module@vger.kernel.org
Cc: torvalds@linux-foundation.org, corbet@lwn.net
Subject: A formal request for process clarifications.
Date: Mon, 15 Dec 2025 01:08:38 -0600 [thread overview]
Message-ID: <20251215070838.GA7209@wind.enjellic.com> (raw)
Good morning, I hope the week has started well for everyone.
When Paul Moore took over as the security/LSM sub-system maintainer,
three years ago, he indicated a desire to be very prescriptive with
respect to the practices that should be followed for the sub-system,
particularly for the introduction of new LSM's.
The following URL documents the requirements for the introduction of a
new LSM:
https://github.com/LinuxSecurityModule/kernel/blob/main/README.md#new-lsms
We believe that LWN covered the discussion around this document as well.
The following discussion on whether or not the Linux kernel provides
proper support for modern Event Detection and Response Systems (EDR or
EDRS) suggests the need to clarify these recommendations:
https://lore.kernel.org/linux-security-module/CABZOZnS4im-wNK4jtGKvp3YT9hPobA503rgiptutOF8rZEwt_w@mail.gmail.com
In that thread Timur Chernykh noted a possible desire to port the
Apple security API to the kernel, which would presumably be a large
body of virgin code.
Three years ago our team had submitted for review our TSEM LSM that
provides a framework for generic security modeling, particularly to
support machine learning and direct functional modeling of security
behavior.
We haven't been able to receive any substantive review of TSEM over
that period of time.
Casey Schaufler has been vocal in his criticism of how we introduced
what is a virgin LSM implementation. Most particularly with the fact
that we chose to include, as a single patch, a header file that
contains the structure and enumeration definitions that are referenced
by all of the compilation units that make up TSEM.
He indicates that an LSM submission, should 'tell a story' by bringing
in the structure definitions with the code that uses those structures.
We can offer multiple examples of the challenges we see with doing
this if that would be helpful but will not do so at this time.
We had requested guidance from Paul on how a new submission should be
properly structured, since he is the ultimate judge and jury on a
submission, but he declined to provide guidance.
Given the current security climate, particularly with what is widely
cited as the potential impact of machine learning and AI on security
architectures and practices, there will undoubtedly be new LSM's
coming forward. It would seem in the best interests of everyone
involved, reviewers and submitters, that specific guidance should be
codified in the 'new-lsms' document of how a virgin body of code
should be introduced.
Optimally this should include links to previous submissions that the
security maintainers believe codify the desired method of story
telling.
Given the importance of security in today's environment we are
prepared to pursue this through the TAB if necessary.
We will look forward to comments from the community on this issue.
Have a good week.
As always,
Dr. Greg
The Quixote Project - Flailing at the Travails of Cybersecurity
https://github.com/Quixote-Project
next reply other threads:[~2025-12-15 7:32 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-15 7:08 Dr. Greg [this message]
2025-12-15 7:38 ` A formal request for process clarifications Linus Torvalds
2025-12-15 16:57 ` Dr. Greg
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251215070838.GA7209@wind.enjellic.com \
--to=greg@enjellic.com \
--cc=corbet@lwn.net \
--cc=linux-security-module@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).