Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4041097imu; Mon, 7 Jan 2019 14:26:37 -0800 (PST) X-Google-Smtp-Source: ALg8bN5hQ3pxbZXjurn+qgHaU1PVtZ/6EJ7PpuAPVkaW4tOM2U0O4FgL3teymRhSYD7ZXA+zOZ6B X-Received: by 2002:a63:9d05:: with SMTP id i5mr11496924pgd.98.1546899997554; Mon, 07 Jan 2019 14:26:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546899997; cv=none; d=google.com; s=arc-20160816; b=smF/A6Uvb5e9qIQo5Ug6DVDhsJulSUvYwZcVTI+HTesV4Yve2NnYJvgdHrMq9Myfld Ivt36xFblPZ9jvrf9kGC07nk57TXJf2jbPJLFjHZz0ZyV6gEMVtSLsu5+QpNr51rWWD6 vjBvM3MmHSaMDBLQANdllppojTgqVubSA82PHP7eXYtRQxv9C/aOpEz4iwf/+9U8ppjD sN8ai0kM9zYrW/9tx6+ILDeQQ3CS45rbdyjdNIMiYE6YwzH0OzEt6ra8gtjeDfphW9gq yqruVKFxZCS205Mp7w3NhTjoQNSdC0pxQgGkBO4BEsW75mzLz9i9t+WqYV8XH/oa6AWe poFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=UM2Rs8lpLf5Dh0rME06Tgx6QYnErrO4gMMil/sW5uDw=; b=toNjRjiiiTJdtT9u5e4l6ROsC0JXWLvrV2COjLl3EHLZVy40nh9nC71XPvUwXaaOAb 3Zf3aDKPkTvmF81FZ/HgEaCzdqfsS8R5ydXPPpmUAoTzoZNtmfPiCIQrxSHJ7ZtuWNCh FXB0KJNLzJ85bLe2kBeIkkp8BA8JMIIe4PWOKAOHKpP5cCxOXuWZvOPtpDYLdK90FZe7 XDPI5Vjs1L1jEA7sxbThBiG8WFTXSe9ZVpqHeETtafWn39pLU9v+WBu6Jd79VB8Hoyp9 30mc9GngRbrsIlaKMiCVycl0uu6YqTW84uxPzsi2uVckdHHkr49x0ovXm9iMoQvls2/V qPog== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si1534090plx.33.2019.01.07.14.26.22; Mon, 07 Jan 2019 14:26:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726946AbfAGVpd (ORCPT + 99 others); Mon, 7 Jan 2019 16:45:33 -0500 Received: from namei.org ([65.99.196.166]:54908 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726535AbfAGVpd (ORCPT ); Mon, 7 Jan 2019 16:45:33 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id x07LjMY9016724; Mon, 7 Jan 2019 21:45:22 GMT Date: Tue, 8 Jan 2019 08:45:22 +1100 (AEDT) From: James Morris To: Mimi Zohar cc: Casey Schaufler , Linus Torvalds , Linux List Kernel Mailing , linux-security-module@vger.kernel.org, Mimi Zohar , Jarkko Sakkinen Subject: Re: [GIT PULL] security: general updates for v4.21 In-Reply-To: <1546137859.4069.59.camel@linux.ibm.com> Message-ID: References: <45d180c5-a174-7eef-9e23-83b819f8abd6@schaufler-ca.com> <1546137859.4069.59.camel@linux.ibm.com> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="1665246916-1077201687-1546897523=:2451" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-1077201687-1546897523=:2451 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT On Sat, 29 Dec 2018, Mimi Zohar wrote: > On Sat, 2018-12-29 at 10:34 -0800, Casey Schaufler wrote: > > On 12/28/2018 8:15 PM, Linus Torvalds wrote: > > > On Fri, Dec 28, 2018 at 8:09 PM James Morris wrote: > > >> Yep, I understand what you mean. I can't find the discussion from several > > >> years ago, but developers asked to be able to work with more current > > >> kernels, and I recall you saying that if you want to do this, merge to a > > >> specific -rc tag at least. > > > If people really want it, maybe the merge can state that explicit > > > thing, as it is I'm trying to push back on empty merges that don't > > > explain why they even exist. > > > > > > Linus > > > > The security tree tends to get changed from multiple directions, > > most of which aren't based out of the security sub-system. The mount > > rework from David is an excellent example. It gets hit just about > > any time there's a significant VFS or networking change. Keeping > > it current has helped find issues much earlier in the process. > > Agreed, the security subsystem is different than other subsystems.  In > addition to VFS changes, are key changes.  Changes in other subsystems > do affect the LSMs/integrity. Yep, I agree that if we get too far behind Linus then changes in things like overlayfs (a recent example) may subtly break LSM and we don't see this in the actual security development trees. In theory these things will be picked up in next testing, although not everything spends long enough in next. And it's not necessarily changes to security code, it can be apparently unrelated changes in the VFS or other subsystems which impact security semantics. > Included in this open window are a number of LSM changes, which were > not posted on the LSM mailing list and are not being upstreamed via > the LSMs. If you see changes doing this, please call them out. Any changes to LSM need to be cc'd at least to the LSM mailing list. -- James Morris --1665246916-1077201687-1546897523=:2451--