Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp637497pxb; Thu, 14 Jan 2021 14:55:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJzVYuEbY7gGL49aUHuZgG7ZrRo7u7q7eheEtQRf9BBoN7KCkTPz938s4WOcFuPfcuG9oFvU X-Received: by 2002:a17:907:94c8:: with SMTP id dn8mr7017483ejc.512.1610664950974; Thu, 14 Jan 2021 14:55:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610664950; cv=none; d=google.com; s=arc-20160816; b=SWUJIZJcd6768/K1mSCxPWUPMeVK9CjcyrpOZH5pCVtVxVMiZvdFj7wM9Hcc+ce5Uz m+XW1Bmjs61RyXaX4eObFr2L4SHK2zqVNJm8g8vHwm/xSyWcFfp8lPcEwNj0e1WCmHKO DgHzTz+byMSwYGAQ6ls4ibxvoq2vAYKAzefOYGT9f3uZs9nYzvXj+rFWfPsBVn7xl3qO 9JzpQSOMT6PgitufZgkVczjoqqKDEidVme5s09TPDHz58aevN633toYnk0+x/HfASHOL v3YFIBrMnZ/QaFqyKuV6fr6Bkx6d4MhNZnM1WNfeKgVaPhmDyBYNsk1cfwbVyqXtFkKp MfTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=UeoL+rYHRCbasM2MDskzXuaIRoYc6D44ZyyDiGPDO/w=; b=0vdZx0csWZPEfGTNpsbz7HUUVn2oZlgJgULFqvanS+Ywz2V0cPplrX63gayAf4Q7Zs bzBsvKItULCVc6zJ/X6wz7WihVDz9o0EycsI1GAx1cRuLwY6+6lYxqt79fkSEM3cV6AX T74Jvg1e+tHDK60mW2FFnkzWaXsnlH4XZuu6zhBFkONppTeFR6f19rMtaTgaRll3/Y+P sPvrwCt8A0Sj7vAWA9nBz5cWbLrdDDdQPTWIWxtEGnBMblvLHC9oLBfPMg9HcdrCJSRN 6iJKW4XtOV8n6ho5i1ayQ29P/u5bb4XHy0UlcTRrAw/rYjfL6lORASRTB9AKJJcJYYv1 rnQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ClFJZo+B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 92si3223673edp.408.2021.01.14.14.55.27; Thu, 14 Jan 2021 14:55:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ClFJZo+B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730970AbhANWvi (ORCPT + 99 others); Thu, 14 Jan 2021 17:51:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60482 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730834AbhANWvh (ORCPT ); Thu, 14 Jan 2021 17:51:37 -0500 Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D22D6C0613CF for ; Thu, 14 Jan 2021 14:50:56 -0800 (PST) Received: by mail-ed1-x52e.google.com with SMTP id c7so7504714edv.6 for ; Thu, 14 Jan 2021 14:50:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UeoL+rYHRCbasM2MDskzXuaIRoYc6D44ZyyDiGPDO/w=; b=ClFJZo+BJk+87jvAan7WQo9aS+l9tB+E2az4yrz+MpLvi/9fHWesT1nzF0xSXzhZCc RcJoLJz5dACLZmtWv2+nlv3CqzQEDL0hjiupvp2YCB89Xzux0kim1rXAGMcO9ILhR5NF ap+XpTjn6tNdf4OFIkPleEyfTOB7kAxAs/+hXc1CCHpR9/zb0btfVC0YnJjGv6Cy0j8R BEox7tEqvkj32hABqbcIkkSkwpLR2P+u4xrAsFnQKZiANB9aGkPrH/BzcV6aEeZIN+s4 6cUxyKcITIdXdddyv2p5qmqAVaL7wzbAvBtnyiaRfVIbU2O8iNEEAv5xbdySCtn7QmTw lJnQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UeoL+rYHRCbasM2MDskzXuaIRoYc6D44ZyyDiGPDO/w=; b=LJycX6t+e2BXjal7KCUDWjEJjjoLBnqN7R+LAKeMuzKcEMNon7SBlXFnBr1Jxd6+16 cPjVOXQp//62aGI/rb4ZkhP7lLC4DEYVP/EBbXTOZ2j1zXF9EpeE77vwX/nHlTkTjHdn MM6QXc2o/Xrb4X02hhD+vNIYiMpTdHCba20w3es7pBPe/7NCNpHtRfR3/u/9OJTkCHXB f9QESqbZjGlLc1lNOXC5GWR6dEOR7mxknSBMLC42aa8aarSeIfD3eFqF0DuTLI4ptWuM eyO03SIVFlFKmv5Mlh/ThijVqLG6l9GEAQnUH83bjs2waQbc/p/7xLYvJg3JX5EVZZ3L AUBw== X-Gm-Message-State: AOAM530QF8isfJyR5XkW0XeZoceHYrMRP4aQSJjpVNk99E740GXDpjzn JH7Q5c0SyKLlnR8aGmQ2xf6hjZMY+fjxL7Iq8/HswA== X-Received: by 2002:aa7:c0c2:: with SMTP id j2mr7423719edp.343.1610664655156; Thu, 14 Jan 2021 14:50:55 -0800 (PST) MIME-Version: 1.0 References: <20210108222223.952458-1-lokeshgidra@google.com> In-Reply-To: From: Lokesh Gidra Date: Thu, 14 Jan 2021 14:50:44 -0800 Message-ID: Subject: Re: [PATCH v15 0/4] SELinux support for anonymous inodes and UFFD To: Paul Moore Cc: Andrea Arcangeli , Alexander Viro , James Morris , Stephen Smalley , Casey Schaufler , Eric Biggers , "Serge E. Hallyn" , Eric Paris , Daniel Colascione , Kees Cook , "Eric W. Biederman" , KP Singh , David Howells , Anders Roxell , Sami Tolvanen , Matthew Garrett , Randy Dunlap , "Joel Fernandes (Google)" , YueHaibing , Christian Brauner , Alexei Starovoitov , Adrian Reber , Aleksa Sarai , Linux FS Devel , linux-kernel , LSM List , SElinux list , Kalesh Singh , Calin Juravle , Suren Baghdasaryan , Jeffrey Vander Stoep , "Cc: Android Kernel" , "open list:MEMORY MANAGEMENT" , Andrew Morton , Christoph Hellwig , Ondrej Mosnacek Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 14, 2021 at 2:47 PM Paul Moore wrote: > > On Tue, Jan 12, 2021 at 12:15 PM Paul Moore wrote: > > > > On Fri, Jan 8, 2021 at 5:22 PM Lokesh Gidra wrote: > > > > > > Userfaultfd in unprivileged contexts could be potentially very > > > useful. We'd like to harden userfaultfd to make such unprivileged use > > > less risky. This patch series allows SELinux to manage userfaultfd > > > file descriptors and in the future, other kinds of > > > anonymous-inode-based file descriptor. > > > > ... > > > > > Daniel Colascione (3): > > > fs: add LSM-supporting anon-inode interface > > > selinux: teach SELinux about anonymous inodes > > > userfaultfd: use secure anon inodes for userfaultfd > > > > > > Lokesh Gidra (1): > > > security: add inode_init_security_anon() LSM hook > > > > > > fs/anon_inodes.c | 150 ++++++++++++++++++++-------- > > > fs/libfs.c | 5 - > > > fs/userfaultfd.c | 19 ++-- > > > include/linux/anon_inodes.h | 5 + > > > include/linux/lsm_hook_defs.h | 2 + > > > include/linux/lsm_hooks.h | 9 ++ > > > include/linux/security.h | 10 ++ > > > security/security.c | 8 ++ > > > security/selinux/hooks.c | 57 +++++++++++ > > > security/selinux/include/classmap.h | 2 + > > > 10 files changed, 213 insertions(+), 54 deletions(-) > > > > With several rounds of reviews done and the corresponding SELinux test > > suite looking close to being ready I think it makes sense to merge > > this via the SELinux tree. VFS folks, if you have any comments or > > objections please let me know soon. If I don't hear anything within > > the next day or two I'll go ahead and merge this for linux-next. > > With no comments over the last two days I merged the patchset into > selinux/next. Thanks for all your work and patience on this Lokesh. > Thanks so much. > Also, it looks like you are very close to getting the associated > SELinux test suite additions merged, please continue to work with > Ondrej to get those merged soon. > Certainly! I'm waiting for his reviews for the latest patch. > -- > paul moore > www.paul-moore.com