Received: by 10.223.185.116 with SMTP id b49csp5220752wrg; Tue, 27 Feb 2018 09:39:56 -0800 (PST) X-Google-Smtp-Source: AH8x227M2EJYogH2VlHlpebW3CmWFZaINmBf0giD8u6UEUp7sNff/3eODGVLlsHyHfLcp0KoDBQc X-Received: by 10.101.86.1 with SMTP id l1mr12004611pgs.140.1519753195875; Tue, 27 Feb 2018 09:39:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519753195; cv=none; d=google.com; s=arc-20160816; b=gc/+WPNy0VHs5KkMiWV8yL/J3p6d2ZlpjEoH46w2ESNXyXKC87z6IjRG71iqqze6Au PVO5tF58t2KsKoonLGyMeZY7oazRWrLi8Sx1f5nbJhY6w5S/c4aQeozwGfHshFak+YK1 RAYfC7BeEFGvzNtxn8H5bnfVlsFb9Z5xlLWUHdrVlsUHjDLCSe7IIHMY4tGFFNSFRAaM cwaDtI3nRGf6tjK1/mVg41fMrY9d6tXAgA2SfJhB/xfi8tXLxuC6FBhcylNFU+ni6Dh3 8d0n+Pe16wxpJdLA8lahSAzvRDcAAa4Fgf8a2aOoeRHhbxV7/7ItCNu8SwPNDyhqu6Va 620Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:references:in-reply-to:mime-version :dmarc-filter:arc-authentication-results; bh=RO8NJBJdd0VfHCtcS6b5JzIakLMpIMpNyrzbSeLiVBU=; b=HHhsQnIXG5N88Rbp5nBu70/aGgkWrHjt/8i/xU6ysuFNoyzFu8kknV8wl9XfKvfPi/ cfQ98iY9zfoZxauouA7y3onHYsb3wj+NUCmuRXe4y1v9lDkonHI8ZKRzvLqmtY0jtPjC bWf6NwLygEEr5Aa6O9QVLTed/XgdtY6hNNep+ACMUdUqFxG5Lc+PMTN5FbOCp2X0Gu0C hDiZ13En1Exom+rqwY1//q38psReSalcEPFLHIJSRRZn3VI4i5XKkZRtFdjcKz8LfJ60 MMc56c6HN2VWWIk0FkOzYwoqtT8SvtjuXdNuw1x70qprRc7D1pIyLUqrj63bM20MLqB4 Qnkw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z2-v6si8784211plk.240.2018.02.27.09.39.40; Tue, 27 Feb 2018 09:39:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751876AbeB0RhJ convert rfc822-to-8bit (ORCPT + 99 others); Tue, 27 Feb 2018 12:37:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:44990 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751641AbeB0Rg4 (ORCPT ); Tue, 27 Feb 2018 12:36:56 -0500 Received: from mail-it0-f51.google.com (mail-it0-f51.google.com [209.85.214.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D46E1217BF for ; Tue, 27 Feb 2018 17:36:55 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D46E1217BF Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=luto@kernel.org Received: by mail-it0-f51.google.com with SMTP id a75so159965itd.0 for ; Tue, 27 Feb 2018 09:36:55 -0800 (PST) X-Gm-Message-State: AElRT7Fo/VZsT8yIHkXqn38YZ2Glu4JxHPVrBN/xrXlI5Itovy6SgfKM JWrLwSeVmyCV9gxwSsdVrq1tnFW2jYnDIbVW2maqzw== X-Received: by 10.36.78.14 with SMTP id r14mr2121229ita.146.1519753015093; Tue, 27 Feb 2018 09:36:55 -0800 (PST) MIME-Version: 1.0 Received: by 10.2.137.101 with HTTP; Tue, 27 Feb 2018 09:36:34 -0800 (PST) In-Reply-To: References: <20180227004121.3633-1-mic@digikod.net> <20180227004121.3633-6-mic@digikod.net> <20180227020856.teq4hobw3zwussu2@ast-mbp> <20180227045458.wjrbbsxf3po656du@ast-mbp> <20180227053255.a7ua24kjd6tvei2a@ast-mbp> From: Andy Lutomirski Date: Tue, 27 Feb 2018 17:36:34 +0000 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH bpf-next v8 05/11] seccomp,landlock: Enforce Landlock programs per process hierarchy To: Casey Schaufler Cc: Andy Lutomirski , Alexei Starovoitov , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , LKML , Alexei Starovoitov , Arnaldo Carvalho de Melo , Daniel Borkmann , David Drysdale , "David S . Miller" , "Eric W . Biederman" , Jann Horn , Jonathan Corbet , Michael Kerrisk , Kees Cook , Paul Moore , Sargun Dhillon , "Serge E . Hallyn" , Shuah Khan , Tejun Heo , Thomas Graf , Tycho Andersen , Will Drewry , Kernel Hardening , Linux API , LSM List , Network Development , Andrew Morton Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 27, 2018 at 5:30 PM, Casey Schaufler wrote: > On 2/27/2018 8:39 AM, Andy Lutomirski wrote: >> On Tue, Feb 27, 2018 at 5:32 AM, Alexei Starovoitov >> wrote: >>> [ Snip ] >> An earlier version of the patch set used the seccomp filter chain. >> Mickaƫl, what exactly was wrong with that approach other than that the >> seccomp() syscall was awkward for you to use? You could add a >> seccomp_add_landlock_rule() syscall if you needed to. >> >> As a side comment, why is this an LSM at all, let alone a non-stacking >> LSM? It would make a lot more sense to me to make Landlock depend on >> having LSMs configured in but to call the landlock hooks directly from >> the security_xyz() hooks. > > Please, no. It is my serious intention to have at least the > infrastructure blob management in within a release or two, and > I think that's all Landlock needs. The security_xyz() hooks are > sufficiently hackish as it is without unnecessarily adding more > special cases. > > What do you mean by "infrastructure blob management"?