Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5989240imm; Wed, 12 Sep 2018 14:30:24 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbeyXLD4kAkrIC6Ty0fnDb0amG/VoJbLd6KTpUURrgjikAOETYfrC7BeQjG2t7ZRezuqYvR X-Received: by 2002:a63:7d48:: with SMTP id m8-v6mr4286116pgn.0.1536787824051; Wed, 12 Sep 2018 14:30:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536787824; cv=none; d=google.com; s=arc-20160816; b=cy1QCUiaXCDmQAxXwMz3RagXq69SD6uuhM4+qYtWioIO847zG3/X3Q18sKM/QXF7Zl /kyXvg6obuoKX/fGcFJIYNXhe/69UjzuT7RbJdfjpyruEE6pVGdLagAopmjX6WLPSJG9 zQwuqZIB4u/5IvsYYBO5trvXY08h48zE2VW4Up/KCMEA397A7HhNNsbfWW21W98SuB7F gCFhEOKrLOVBS1eKZY/HpJLGVzI1OoTNfD19pVHVgHM2m89r5nfl9HXER/jUoWoeyFG1 QMNBQHnq/fGkrkz2+mfJKYwzSt/eRtmYc0gB1aBWBqn2trq/0siuTpT/dERZgGvkaDDA 09hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=luW2sat1xMymEcKYJ2RRIzY8vAWifDsHvE50FHqUU+Y=; b=c+bkJS6fUM1JLuCGQzefq0MVcXvdkEYu2cGcAicOUAhLh+0cOBTmp0cVCSQKO60RFc sKayu6Od0I6PX2ejW/pVqtUSdz7tuy3Bv3w7pVtEBKc82SddGG4+hO+IrlCtQM9OLEfn DNln7y4T1Lt+v0I0wDPdGpWdBuJItkKGCRl4tnZ+pnK1WjGVi4R7CChmonxOYB6Jq6Ls PDIbi3w8KW3k8nDGyon5TZTdp0xlVnRoekDtZVLEySHzQkw7f/4gXFGj1QGvEHAOXJXl ECs+1ngg+Vnko3b1GEDB9LZYq54GLqyiJExJWDIaVjYCloFmrw2eteJCC5Q04Bv11mZ+ hreQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a24-v6si2265793pgh.357.2018.09.12.14.30.08; Wed, 12 Sep 2018 14:30:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728338AbeIMCgS (ORCPT + 99 others); Wed, 12 Sep 2018 22:36:18 -0400 Received: from namei.org ([65.99.196.166]:58810 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728232AbeIMCgS (ORCPT ); Wed, 12 Sep 2018 22:36:18 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w8CLTW7p020235; Wed, 12 Sep 2018 21:29:33 GMT Date: Thu, 13 Sep 2018 07:29:32 +1000 (AEST) From: James Morris To: Casey Schaufler , Salvatore Mesoraca , mic@digikod.net cc: LSM , LKLM , SE Linux , John Johansen , Kees Cook , Tetsuo Handa , Paul Moore , Stephen Smalley , "linux-fsdevel@vger.kernel.org" , Alexey Dobriyan , "Schaufler, Casey" Subject: Re: [PATCH v2 00/10] LSM: Module stacking in support of S.A.R.A and Landlock In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="1665246916-734686802-1536787774=:19741" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-734686802-1536787774=:19741 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT Adding the SARA and LandLock authors for review & comment. Salvatore & Mickaƫl: does this patchset meet your needs for merging to mainline? On Tue, 11 Sep 2018, Casey Schaufler wrote: > LSM: Module stacking in support of S.A.R.A and Landlock > > v2: Reduce the patchset to what is required to support > the proposed S.A.R.A. and LandLock security modules > > The S.A.R.A. security module is intended to be used > in conjunction with other security modules. It requires > state to be maintained for the credential, which > in turn requires a mechanism for sharing the credential > security blob. The module also requires mechanism for > user space manipulation of the credential information, > hence an additional subdirectory in /proc/.../attr. > > The LandLock security module provides user configurable > policy in the secmark mechanism. It requires data in > the credential, file and inode security blobs. For this > to be used along side the existing "major" security > modules mechanism for sharing these blobs is provided. > > A side effect of providing sharing of the crendential > security blob is that the TOMOYO module can be used at > the same time as the other "major" modules. > > The mechanism for configuring which security modules are > enabled has to change when stacking in enabled. Any > module that uses just the security blobs that are shared > can be selected. Additionally, one other "major" module > can be selected. > > The security module stacking issues around networking and > IPC are not addressed here as they are beyond what is > required for TOMOYO, S.A.R.A and LandLock. > > git://github.com/cschaufler/lsm-stacking.git#stacking-4.19-rc2-saralock > > Signed-off-by: Casey Schaufler > --- > Documentation/admin-guide/LSM/index.rst | 23 ++- > fs/proc/base.c | 64 ++++++- > fs/proc/internal.h | 1 + > include/linux/lsm_hooks.h | 20 ++- > include/linux/security.h | 15 +- > kernel/cred.c | 13 -- > security/Kconfig | 92 ++++++++++ > security/apparmor/domain.c | 2 +- > security/apparmor/include/cred.h | 24 ++- > security/apparmor/include/file.h | 9 +- > security/apparmor/include/lib.h | 4 + > security/apparmor/lsm.c | 53 ++++-- > security/apparmor/task.c | 6 +- > security/security.c | 293 ++++++++++++++++++++++++++++++-- > security/selinux/hooks.c | 215 ++++++++--------------- > security/selinux/include/objsec.h | 37 +++- > security/selinux/selinuxfs.c | 5 +- > security/selinux/xfrm.c | 4 +- > security/smack/smack.h | 42 ++++- > security/smack/smack_access.c | 4 +- > security/smack/smack_lsm.c | 283 +++++++++++------------------- > security/smack/smackfs.c | 18 +- > security/tomoyo/common.h | 31 +++- > security/tomoyo/domain.c | 4 +- > security/tomoyo/securityfs_if.c | 15 +- > security/tomoyo/tomoyo.c | 57 +++++-- > 26 files changed, 899 insertions(+), 435 deletions(-) > -- James Morris --1665246916-734686802-1536787774=:19741--