Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1395661ybn; Wed, 25 Sep 2019 17:42:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqxBi2/emuC0xmX4fk2kB7kQXzVwuK4B2XpyQhARTKSIKwftzqa/wjbbfVBiLJz+/5DUudVs X-Received: by 2002:a17:906:3108:: with SMTP id 8mr835171ejx.11.1569458570120; Wed, 25 Sep 2019 17:42:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569458570; cv=none; d=google.com; s=arc-20160816; b=pdDgNlfsaK67bD/Mr0jTe9ImcVFOJ40Vn0IjTcevrjpIHy1mFdrbYconX2HD4RbMyt 2sK+yDo3i3XRRItnRW+MlJ/7HnHiApNcIJb2S/GAJoMXeIWigYlnDk1aaTAWJKCcTlY5 TotvwEyVnl0lZOvVV7qnyZuZMt8tBPjn0z6Z/9aumHJwYacFJNMljSGZnCQhNKTr4Jyn BJGCDgXxVBEvKJeFzAPtJQkCzyVFF4kjK+LFQfKhb+S51ruPsGtdK8orcGGJsCwjQS/Y KoavylEILEI24OvWAjez2LvbKmTexELORZS8W4rLQxRu09voa3cjB1OUQyCVnk6LBjlb YL1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=TEueK3CR530Cn8YwvlpswATDviFm42G64mVpbmzRlU0=; b=ul9vNNNP94dJWHbWesa7aL49xeomaWMtzEh6dASYl0eG+/MzsVQmjkJXHZl+dwBcPB qJ5jLuqe02yDp56IWbL4BueeAnsK+OkF8JPRd7llrZs89Kt6XL1ADX1GIvxMKiTahG78 QUpTPy4HiSSiea2PhiVeuM22v7fmrWdC42wZteTVpvah7xLNi75Jt7Qauws2VCHndxuw fD9Guh03krfbYvM2lOJibmCG5Y9eUz8JWCzom77opXrgKN7W9zLhLyXW7+UMhC1zmbhA ecH87WZBR9/FHbNjI5AyHmyR0/aEKcy2bKWEAbXxljP7v+PLvs1Teq/SoOEZw2tnsB+J 3m3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=DvZFu4Ph; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id re13si222992ejb.279.2019.09.25.17.42.26; Wed, 25 Sep 2019 17:42:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=DvZFu4Ph; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2409001AbfIXDbH (ORCPT + 99 others); Mon, 23 Sep 2019 23:31:07 -0400 Received: from mail-io1-f65.google.com ([209.85.166.65]:46890 "EHLO mail-io1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2408868AbfIXDbH (ORCPT ); Mon, 23 Sep 2019 23:31:07 -0400 Received: by mail-io1-f65.google.com with SMTP id c6so832492ioo.13 for ; Mon, 23 Sep 2019 20:31:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=TEueK3CR530Cn8YwvlpswATDviFm42G64mVpbmzRlU0=; b=DvZFu4PhLqNkQifEHPCTm8AzcdIc5wXbzz/cLcFIqSUlaU06CXDVV2lpreOn70UcPc uQAMp1TtvZ/IIQ/M+wyycdhlTmptZ8be3gluSJLsBEB/VPDPoXvAu/LJGyFG31V/9Q/O nQVdJdICfjCmj4ZopxyIiAoE+ObpZRpoS4oJ0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=TEueK3CR530Cn8YwvlpswATDviFm42G64mVpbmzRlU0=; b=O9D4OQntj3lhB8QWriHJ8+ZI13GlUpCVkVodkOxkobpcRWfIPDsY0THmglD7KIk9ek XxE1qUkSuaqCYXgsxLpSIM81inmsKcgE2lWOL1GPDU26pHqq4WvpcdiHz+FzmaxzZGJc xk2tgjRQrlezDahDFVVaH9ExjUBXhF1siQXUUg7dMhf3OfKTafTDzAG0nacctmGJCSBF 1qkyQ24V1lYLmkEOQ9gfjshbGvmwwLiTMVilp238Diue8qzsU2SoKQ4PgNSjoyA9RO3h olVmgHpnyymBKIvR9SGbgnUyflMrFPHV1JTm6S87GlE3/oQMea/6xX96oQW6lk53mtBu FFNQ== X-Gm-Message-State: APjAAAVN/J0EytS+oqhgLzNDh4VJz7d9s7Si1LFRz5VoKtCig/REuM7i nLblpuWtTDC1/6XUP4Zp3wSM+o/Y3yIZSswxjtqO8g== X-Received: by 2002:a5d:9441:: with SMTP id x1mr933357ior.160.1569295866351; Mon, 23 Sep 2019 20:31:06 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Micah Morton Date: Mon, 23 Sep 2019 20:30:54 -0700 Message-ID: Subject: Re: [GIT PULL] SafeSetID LSM changes for 5.4 To: Linus Torvalds Cc: James Morris , Jann Horn , Bart Van Assche , "Paul E. McKenney" , Linux Kernel Mailing List , linux-security-module Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 23, 2019 at 5:45 PM Linus Torvalds wrote: > > On Mon, Sep 23, 2019 at 4:35 PM James Morris wrote: > > > > My understanding is that SafeSetID is shipping in ChromeOS -- this was > > part of the rationale for merging it. > > Well, if even the developer didn't test it for two months, I don't > think "it's in upstream" makes any sense or difference. > > Linus Yes, SafeSetID is shipping on Chrome OS, although I agree having that bug in 5.3 without anyone noticing is bad. When Jann sent the last round of patches for 5.3 he had tested the code and everything looked good, although I unfortunately neglected to test it again after a tweak to one of the patches, which of course broke stuff when the patches ultimately went in. Even though this is enabled in production for Chrome OS, none of the Chrome OS devices are using version 5.3 yet, so it went unnoticed on Chrome OS so far. In general the fact that a kernel feature is shipping on Chrome OS isn't an up-to-date assurance that the feature works in the most recent Linux release, as it would likely be months (at least) from when a change makes it into the kernel until that kernel release is ever run on a Chrome OS device (right now the most recent kernel we ship on Chrome OS is 4.19, so I've had to backport the SafeSetID stuff). We've found this SafeSetID LSM to be pretty useful on Chrome OS, and more use cases have popped up than we had in mind when writing it, which suggests others would potentially find it useful as well. But I understand for it to be useful to others it needs to be stable and functional on every release. The best way I know of ensuring this is for me to personally run the SafeSetID selftest (in tools/testing/selftests/safesetid/) every release, regardless of whether we make any changes to SafeSetID itself. Does this sound sufficient or are there more formal guidelines/processes here that I'm not aware of?