Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp9406818imu; Sat, 29 Dec 2018 18:47:22 -0800 (PST) X-Google-Smtp-Source: ALg8bN4br8saQK39DsuFDsAIYaBTxY7b8VE668s7koCm1yQqHXc+/jeS4f1M4bOqPDXgONrWFMjv X-Received: by 2002:a62:34c6:: with SMTP id b189mr34419546pfa.229.1546138042889; Sat, 29 Dec 2018 18:47:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546138042; cv=none; d=google.com; s=arc-20160816; b=qv3GemfVXaUap8tlYm6QSQ+m3j427MEE5R7pXIgyebC5xOjYyUmkm3fsur5VgG3+nk wG4ZpdYTBpdBwVT7NF/skftreElT08cu6P8HZJX1Z4BF7iVA9AazSSyA25HI7cX5z15/ IXcLuwtA1gLz+gsarNYmUpIx+Nd2Ncxiyj04Huezd6AoxqGF9KXSOTgmFiWd2004Phtr tAUyQPAHwc78mCWPcu1QyplfmWtXnkcK0F1QwT+EI25MUJNvT59uGwk3k9Ie9KI6EN7v 0PpYXUz4SJ256TekVjHQaTCtr7FzGA2EY167a/O/MinAqbm2koo4jiu1ealP23X86Idm JkoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject; bh=71yuyyXZ5huW75oRDrVsKNVofXva0enouIyWtDyjXkI=; b=rPSjTpUGG3O3iYxH/+YGYIH+C5on6L4qIrB7eqiDO0/g4VoYn26qjZQ1Ap0N4eQKef 6ghdsIvoUgnxh+HHVN+InEcPfKE2wOKGeGlC3f0zGIJeg5eGAhW3/sul0gEPO7waKu9b T5mdtkpLVWiw8jPI/mVlP5Hwb6KvmgyT6SVCrXXSr+Ede16ubwX5G95oeL09oU080LyH iPdv0DYhe2bsSEA1oCpFDh0Vx79O2noUn2aw8kKGntf859Aelran3Ldc5Z35OqivnQBF ZfNQ8BbahLwBn8FdAwtPoiD0bWykj437R2uOuhWmz2GdmHuRCA/TyeN2kO0Hcy6HK5VH YTsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f61si43399159plb.51.2018.12.29.18.46.42; Sat, 29 Dec 2018 18:47:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725909AbeL3Cok (ORCPT + 99 others); Sat, 29 Dec 2018 21:44:40 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:38432 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725874AbeL3Cok (ORCPT ); Sat, 29 Dec 2018 21:44:40 -0500 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wBU2i6Vl013863 for ; Sat, 29 Dec 2018 21:44:38 -0500 Received: from e06smtp01.uk.ibm.com (e06smtp01.uk.ibm.com [195.75.94.97]) by mx0a-001b2d01.pphosted.com with ESMTP id 2pp5t8fc6j-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Sat, 29 Dec 2018 21:44:38 -0500 Received: from localhost by e06smtp01.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sun, 30 Dec 2018 02:44:36 -0000 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp01.uk.ibm.com (192.168.101.131) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Sun, 30 Dec 2018 02:44:33 -0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id wBU2iWxL52297974 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Sun, 30 Dec 2018 02:44:32 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 44EA852051; Sun, 30 Dec 2018 02:44:32 +0000 (GMT) Received: from unknown4C3488A63DDA (unknown [9.80.105.198]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 5E8A45204E; Sun, 30 Dec 2018 02:44:30 +0000 (GMT) Subject: Re: [GIT PULL] security: general updates for v4.21 From: Mimi Zohar To: Casey Schaufler , Linus Torvalds , James Morris Cc: Linux List Kernel Mailing , linux-security-module@vger.kernel.org, Mimi Zohar , Jarkko Sakkinen Date: Sat, 29 Dec 2018 21:44:19 -0500 In-Reply-To: <45d180c5-a174-7eef-9e23-83b819f8abd6@schaufler-ca.com> References: <45d180c5-a174-7eef-9e23-83b819f8abd6@schaufler-ca.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18123002-4275-0000-0000-000002F6EA29 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18123002-4276-0000-0000-000038050EAE Message-Id: <1546137859.4069.59.camel@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-12-29_14:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812300024 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2018-12-29 at 10:34 -0800, Casey Schaufler wrote: > On 12/28/2018 8:15 PM, Linus Torvalds wrote: > > On Fri, Dec 28, 2018 at 8:09 PM James Morris wrote: > >> Yep, I understand what you mean. I can't find the discussion from several > >> years ago, but developers asked to be able to work with more current > >> kernels, and I recall you saying that if you want to do this, merge to a > >> specific -rc tag at least. > > If people really want it, maybe the merge can state that explicit > > thing, as it is I'm trying to push back on empty merges that don't > > explain why they even exist. > > > > Linus > > The security tree tends to get changed from multiple directions, > most of which aren't based out of the security sub-system. The mount > rework from David is an excellent example. It gets hit just about > any time there's a significant VFS or networking change. Keeping > it current has helped find issues much earlier in the process. Agreed, the security subsystem is different than other subsystems.  In addition to VFS changes, are key changes.  Changes in other subsystems do affect the LSMs/integrity. Included in this open window are a number of LSM changes, which were not posted on the LSM mailing list and are not being upstreamed via the LSMs. Mimi