Linux Security Modules development
 help / color / mirror / Atom feed
From: Lakshmi Ramasubramanian <nramas@linux.microsoft.com>
To: steven chen <chenste@linux.microsoft.com>,
	Roberto Sassu <roberto.sassu@huaweicloud.com>,
	corbet@lwn.net, skhan@linuxfoundation.org, zohar@linux.ibm.com,
	dmitry.kasatkin@gmail.com, eric.snowberg@oracle.com,
	paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com
Cc: linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org,
	linux-integrity@vger.kernel.org,
	linux-security-module@vger.kernel.org,
	gregorylumen@linux.microsoft.com,
	Roberto Sassu <roberto.sassu@huawei.com>
Subject: Re: [PATCH v5 00/13] ima: Introduce staging mechanism
Date: Mon, 11 May 2026 10:29:23 -0700	[thread overview]
Message-ID: <aaed52cf-26e1-4c40-812d-3788024ce5b5@linux.microsoft.com> (raw)
In-Reply-To: <99c30be6-8b0f-486a-890c-cf74c5930726@linux.microsoft.com>


On 5/7/2026 9:47 AM, steven chen wrote:
>>
>> Usage
>> =====
>>
>> The IMA staging mechanism can be enabled from the kernel configuration
>> with the CONFIG_IMA_STAGING option.
>>
>> If it is enabled, IMA duplicates the current measurements interfaces
>> (both binary and ASCII), by adding the _staged file suffix. Both the
>> original and the staging interfaces gain the write permission for the
>> root user and group, but require the process to have CAP_SYS_ADMIN set.
>>
>> The staging mechanism supports two flavors.
>>
>> Staging with prompt
>> ~~~~~~~~~~~~~~~~~~~
>>
>> The current measurements list is moved to a temporary staging area, and
>> staged measurements are deleted upon confirmation.
>>
>> This staging process is achieved with the following steps.
>>
>>    1.  echo A > <original interface>: the user requests IMA to stage the
>>        entire measurements list;
>>    2.  cat <_staged interface>: the user reads the staged measurements;
>>    3.  echo D > <_staged interface>: the user requests IMA to delete
>>        staged measurements.
>>
>> Staging and deleting
>> ~~~~~~~~~~~~~~~~~~~~
>>
>> N measurements are staged to a temporary staging area, and immediately
>> deleted without further confirmation.
>>
>> This staging process is achieved with the following steps.
>>
>>    1.  cat <original interface>: the user reads the current measurements
>>        list and determines what the value N for staging should be;
>>    2.  echo N > <original interface>: the user requests IMA to delete N
>>        measurements from the current measurements list.
> 
> This submission proposes two ways for log trimming:
> 
> *Flavor 1:* Staging with prompt
> *Flavor 2:* stage and delete N
> 
> Functionally, both approaches address the same problem, but *Favour 2 
> *is the
> stronger design and should be preferred. There is no good reason to keep 
> *Flavor 1.*
> 
>  From a kernel implementation perspective, *Flavor 2 *is more efficient 
> because it
> minimizes the time spent holding the list lock (can’t be shorter). It 
> also substantially
> reduces the amount of kernel-side logic, removing nearly half of the 
> code required
> by the alternative approach.
> 
>  From a user-space perspective, *Flavor 2 *results in a much cleaner 
> model. It avoids
> the need to track and reconcile both old and staged lists in user space 
> as well as
> two lists (cur and staged) in the kernel space, which simplifies log 
> trimming logic
> and reduces maintenance overhead. In addition, it preserves the existing 
> external
> behavior by not exposing any staged list to user space.
> 
> Overall, *Flavor 2 *provides the same functional result with lower 
> kernel complexity,
> shorter kernel list lock hold time, and a simpler user-space interface. 
> For those
> reasons, it is the preferable approach and *Favour 1* does not appear to 
> offer sufficient
> justification to keep both implementations.
> 
> Steven

Roberto, Mimi:

I want to add on to the point Steven has brought up.

With "Stage and Delete N" approach, we have the following sequence of 
tasks for trimming the IMA log:

	1. User mode locks the IMA measurement list through the "write interface".
		a. While this prevents any other user mode process from updating the 
IMA log, kernel can still add new IMA events to the measurement log
	2. User mode reads the TPM Quote and the IMA measurement events and 
sends it to the remote attestation service
	3. Once the remote service has successfully processed the IMA events, 
the user mode determines the number of IMA events "N" to be removed from 
the measurement list maintained in the kernel
	4. User mode provides the value "N" to the kernel
	5. Kernel now determines the point at which to snap the IMA measurement 
list using "N" - without holding a lock
	6. Then, the kernel lock is held and the list is snapped at the point 
determined in the previous step thus keeping the kernel lock time to the 
minimum.
	7. Now, user mode removes the "write" lock on the IMA measurement list

With the above, we believe "Stage and Delete N" alone is sufficient to 
trim IMA log.

  -lakshmi

>>   .../admin-guide/kernel-parameters.txt         |   4 +
>>   Documentation/security/IMA-staging.rst        | 163 +++++++++
>>   Documentation/security/index.rst              |   1 +
>>   MAINTAINERS                                   |   2 +
>>   security/integrity/ima/Kconfig                |  16 +
>>   security/integrity/ima/ima.h                  |  32 +-
>>   security/integrity/ima/ima_api.c              |   2 +-
>>   security/integrity/ima/ima_fs.c               | 315 ++++++++++++++++--
>>   security/integrity/ima/ima_init.c             |   5 +
>>   security/integrity/ima/ima_kexec.c            |  53 ++-
>>   security/integrity/ima/ima_queue.c            | 283 ++++++++++++++--
>>   11 files changed, 803 insertions(+), 73 deletions(-)
>>   create mode 100644 Documentation/security/IMA-staging.rst
>>


      reply	other threads:[~2026-05-11 17:29 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-29 16:03 [PATCH v5 00/13] ima: Introduce staging mechanism Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 01/13] ima: Remove ima_h_table structure Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 02/13] ima: Replace static htable queue with dynamically allocated array Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 03/13] ima: Introduce per binary measurements list type ima_num_entries counter Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 04/13] ima: Introduce per binary measurements list type binary_runtime_size value Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 05/13] ima: Introduce _ima_measurements_start() and _ima_measurements_next() Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 06/13] ima: Mediate open/release method of the measurements list Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 07/13] ima: Use snprintf() in create_securityfs_measurement_lists Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 08/13] ima: Introduce ima_dump_measurement() Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 09/13] ima: Add support for staging measurements with prompt Roberto Sassu
2026-05-04 12:51   ` Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 10/13] ima: Add support for flushing the hash table when staging measurements Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 11/13] ima: Support staging and deleting N measurements entries Roberto Sassu
2026-05-05 18:43   ` steven chen
2026-04-29 16:03 ` [PATCH v5 12/13] ima: Return error on deleting measurements already copied during kexec Roberto Sassu
2026-04-29 16:03 ` [PATCH v5 13/13] doc: security: Add documentation of the IMA staging mechanism Roberto Sassu
2026-05-07 16:47 ` [PATCH v5 00/13] ima: Introduce " steven chen
2026-05-11 17:29   ` Lakshmi Ramasubramanian [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aaed52cf-26e1-4c40-812d-3788024ce5b5@linux.microsoft.com \
    --to=nramas@linux.microsoft.com \
    --cc=chenste@linux.microsoft.com \
    --cc=corbet@lwn.net \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=eric.snowberg@oracle.com \
    --cc=gregorylumen@linux.microsoft.com \
    --cc=jmorris@namei.org \
    --cc=linux-doc@vger.kernel.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=paul@paul-moore.com \
    --cc=roberto.sassu@huawei.com \
    --cc=roberto.sassu@huaweicloud.com \
    --cc=serge@hallyn.com \
    --cc=skhan@linuxfoundation.org \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox