Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3243570imj; Mon, 11 Feb 2019 16:59:42 -0800 (PST) X-Google-Smtp-Source: AHgI3IYDsAHZnvLmZS/ZMDthHVUVWa7B7oHZL83ztB2RyymC6Mm1IZndXRCtjY0CIzztrS3cP4Ye X-Received: by 2002:a17:902:850a:: with SMTP id bj10mr1241154plb.100.1549933182155; Mon, 11 Feb 2019 16:59:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549933182; cv=none; d=google.com; s=arc-20160816; b=D9u3ln3UsL0zPOb1iVFo+xzMWOFKbI9aI3I2CeGjJ1KfrEv7Ed7XzouM2iQNBBDwwz DGo8iupIKVzF2niVoCAYuFQqub0yPtXxpQ5695lN+YIV8a2D7FEdv28t35FHMexz2pP5 Z/C7I0Sk3fOLryU7GrnvrvB16K7rxVw1JIaAxsVrNeqlJvHSirLZooUOJb0p0GUXg182 mcjsfspbaMzq4/IigXbw01q4RLw9YZ/9fuLJKNz7IVqEV9VBNrAqZbBXfrOyYZj+oSq+ RUPf3BUgn2zYOwZ9PcwJ8kQagtyYVdJLbMVRgMcUzlzT2jDvaTvoS6v1qsnbKbFZeEJq F9aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :references:date:mime-version:cc:to:from:subject:message-id; bh=BHmEg2rxYHLdSfUp8O0IQAITgRL6yIApA9pkD9rqKG0=; b=00fgL4FEw2/nvdVGVUNzq9ujBJfLR3cx5RkEAoTnYgziclNTQaprpJg00zgacUG27S +rL7leS0gZx+VEpToQMnx8UXO3isKrr//u0cw7uu6JZkDFf2OnKe2DG1zJprkudsm4rq yFNJuOBcsKEnrmWD0jwkAtOIJAgQZGh7FKT6JbjAuzrxVsSUOICZiu/D2c0dEZUr+vhK 4qISJ1H6+I3PYDKMHpUV2mPv+/UpljvZVT0wu6UwiQmZ+NsFLxNRim+1B09sFpVOM1zH 3Pa7wadYxWSksjl16EYSWWzk8s65B8053ToHqCoRZQUM60FVHqCi8qwHDJiG2VJRZiuq Zh4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 187si11978099pfb.41.2019.02.11.16.59.26; Mon, 11 Feb 2019 16:59:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727920AbfBLA7V (ORCPT + 99 others); Mon, 11 Feb 2019 19:59:21 -0500 Received: from www262.sakura.ne.jp ([202.181.97.72]:57582 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727630AbfBLA7U (ORCPT ); Mon, 11 Feb 2019 19:59:20 -0500 Received: from fsav304.sakura.ne.jp (fsav304.sakura.ne.jp [153.120.85.135]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id x1C0xFNk071749; Tue, 12 Feb 2019 09:59:15 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav304.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav304.sakura.ne.jp); Tue, 12 Feb 2019 09:59:15 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav304.sakura.ne.jp) Received: from www262.sakura.ne.jp (localhost [127.0.0.1]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id x1C0xE24071745; Tue, 12 Feb 2019 09:59:14 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: (from i-love@localhost) by www262.sakura.ne.jp (8.15.2/8.15.2/Submit) id x1C0xEbp071744; Tue, 12 Feb 2019 09:59:14 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Message-Id: <201902120059.x1C0xEbp071744@www262.sakura.ne.jp> X-Authentication-Warning: www262.sakura.ne.jp: i-love set sender to penguin-kernel@i-love.sakura.ne.jp using -f Subject: Re: [PATCH] LSM: Ignore =?ISO-2022-JP?B?InNlY3VyaXR5PSIgd2hlbiAibHNtPSIg?= =?ISO-2022-JP?B?aXMgc3BlY2lmaWVk?= From: Tetsuo Handa To: Kees Cook Cc: James Morris , linux-security-module , LKML MIME-Version: 1.0 Date: Tue, 12 Feb 2019 09:59:14 +0900 References: <201902120021.x1C0LeYB051392@www262.sakura.ne.jp> In-Reply-To: Content-Type: text/plain; charset="ISO-2022-JP" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Kees Cook wrote: > On Mon, Feb 11, 2019 at 4:21 PM Tetsuo Handa > wrote: > > > > Kees Cook wrote: > > > To avoid potential confusion, explicitly ignore "security=" when "lsm=" is > > > used on the command line, and report that it is happening. > > > > To maintain the existing behavior of CONFIG_DEFAULT_SECURITY, I also suggest this change. > > This saves e.g. Ubuntu users who are using only AppArmor from explicitly specifying > > security=apparmor when they don't want to enable other LSM_FLAG_LEGACY_MAJOR modules. > > No, this completely disables the purpose of lsm= > > I don't understand the use-case you're concerned about? The purpose of lsm= remains. I worry that distro users who don't explicitly specify security= parameter suddenly find TOMOYO messages because TOMOYO is no longer exclusive. There are two ways for avoiding it. One is to explicitly specify security= parameter. The other is to remove tomoyo from CONFIG_LSM. This change adds the third way; preserve current security= behavior until they start explicitly specifying lsm= parameter.