Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp870508pxb; Sun, 21 Feb 2021 03:15:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJwQx5V7SHYW78PJW3eF+ffjZ3dXXRJ6Xy3C2Ue84M9Tua1KlPuRYI04qEKU7ha+3ZFLImSd X-Received: by 2002:a17:906:6b1b:: with SMTP id q27mr15931069ejr.508.1613906123267; Sun, 21 Feb 2021 03:15:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613906123; cv=none; d=google.com; s=arc-20160816; b=xKX49aI/NEo9vPVzC797oHqYPDVSBV/x+R0pDtD0VaZmaAjI8epnBPABXJrYQflYWC mUu1zTgdMCvkzlDjPFERKewJ+XGFGEABzRWFIewq3aK5FAvxPNNCkhj5fV+U+gpto6LE xSFDkZEkfvbQZ9C8OgTQWrDAYPqhzsUnD6s/kAX9inWRtda1eDJfqtwYxwRWY2gpg24B c4x8Z0MRCG7TSKPEZVm7EUtJW1RlsGyQIObvOC+s3xgHJEcF78SGw73ccwrjl0rvolgz UAdGUHp9SDnsSi3k8shTxsJd0ZvUAif5k5pW2CogaZ4drFZoqFGVR4+x/p7G0YcogRuf GTbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=Lrge85WwXVl3QVKXiiQyb/lO1te/TrS39UYpUTUy9no=; b=bE9efDNMJaUH4Mm2yJdfG9bz7WiyA4Cbpb+Nf5y2wVkPjWnwrSIv959iIa1N7eHJ0S P1g1Sijeu48Op17s7y1OO9UN8WT+xpRjSbhvGQnc2JFf+jCvRnrIdHL7+0Z/Uz/lRNed xM1QugJrLKaCwzEpfukXrCukpG5VSX6kSrDn5XVIFXmKNS0WzJBS0fbIZhh9R0IUGKQe Fj3OQnBvvcpCW87S2iV8JmF73wafNn6BXYwONt/rzKf0yik8vqSqc1HGMhKRkAuLGN8g KcS7OO5wAOcfAPB9tOYo2/S0zVRPickLNURFKcJeAL/RvraXRGaGcF4UX3qvppa+9f0R eJBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b10si8468445edx.575.2021.02.21.03.15.00; Sun, 21 Feb 2021 03:15:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229932AbhBULMV (ORCPT + 99 others); Sun, 21 Feb 2021 06:12:21 -0500 Received: from smtp-bc08.mail.infomaniak.ch ([45.157.188.8]:44099 "EHLO smtp-bc08.mail.infomaniak.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229903AbhBULMU (ORCPT ); Sun, 21 Feb 2021 06:12:20 -0500 Received: from smtp-3-0000.mail.infomaniak.ch (unknown [10.4.36.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4Dk2gn0S83zMq6CJ; Sun, 21 Feb 2021 12:11:33 +0100 (CET) Received: from ns3096276.ip-94-23-54.eu (unknown [23.97.221.149]) by smtp-3-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4Dk2gl6mnVzlh8TG; Sun, 21 Feb 2021 12:11:31 +0100 (CET) Subject: Re: [PATCH v2 3/3] security: Add LSMs dependencies to CONFIG_LSM To: Masahiro Yamada , Ondrej Mosnacek Cc: James Morris , "Serge E . Hallyn" , Casey Schaufler , Nicolas Iooss , Linux Kbuild mailing list , Linux kernel mailing list , Linux Security Module list , =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= References: <20210215181511.2840674-1-mic@digikod.net> <20210215181511.2840674-4-mic@digikod.net> From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= Message-ID: <8809a929-980a-95d1-42dc-576ff54e2923@digikod.net> Date: Sun, 21 Feb 2021 12:12:44 +0100 User-Agent: MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21/02/2021 09:50, Masahiro Yamada wrote: > On Tue, Feb 16, 2021 at 4:03 AM Ondrej Mosnacek wrote: >> >> On Mon, Feb 15, 2021 at 7:17 PM Mickaël Salaün wrote: >>> From: Mickaël Salaün >>> >>> Thanks to the previous commit, this gives the opportunity to users, when >>> running make oldconfig, to update the list of enabled LSMs at boot time >>> if an LSM has just been enabled or disabled in the build. Moreover, >>> this list only makes sense if at least one LSM is enabled. >>> >>> Cc: Casey Schaufler >>> Cc: James Morris >>> Cc: Masahiro Yamada >>> Cc: Serge E. Hallyn >>> Signed-off-by: Mickaël Salaün >>> Link: https://lore.kernel.org/r/20210215181511.2840674-4-mic@digikod.net >>> --- >>> >>> Changes since v1: >>> * Add CONFIG_SECURITY as a dependency of CONFIG_LSM. This prevent an >>> error when building without any LSMs. >>> --- >>> security/Kconfig | 4 ++++ >>> 1 file changed, 4 insertions(+) >>> >>> diff --git a/security/Kconfig b/security/Kconfig >>> index 7561f6f99f1d..addcc1c04701 100644 >>> --- a/security/Kconfig >>> +++ b/security/Kconfig >>> @@ -277,6 +277,10 @@ endchoice >>> >>> config LSM >>> string "Ordered list of enabled LSMs" >>> + depends on SECURITY || SECURITY_LOCKDOWN_LSM || SECURITY_YAMA || \ >>> + SECURITY_LOADPIN || SECURITY_SAFESETID || INTEGRITY || \ >>> + SECURITY_SELINUX || SECURITY_SMACK || SECURITY_TOMOYO || \ >>> + SECURITY_APPARMOR || BPF_LSM >> >> This looks really awkward, since all of these already depend on >> SECURITY (if not, it's a bug)... I guarantee you that after some time >> someone will come, see that the weird boolean expression is equivalent >> to just SECURITY, and simplify it. > > > Currently, LSM does not depend on SECURITY. > So you can always define LSM irrespective of SECURITY, > which seems a bug. > > So, I agree with adding 'depends on SECURITY'. > > What he is trying to achieve in this series > seems wrong, of course. This may be wrong in the general case, but not for CONFIG_LSM. > > >> I assume the new mechanism wouldn't work as intended if there is just >> SECURITY? If not, then maybe you should rather specify this value >> dependency via some new field rather than abusing "depends on" (say, >> "value depends on"?). The fact that a seemingly innocent change to the >> config definition breaks your mechanism suggests that the design is >> flawed. Masahiro, what do you think about this suggested "value depends on"? >> >> I do think this would be a useful feature, but IMHO shouldn't be >> implemented like this. >> >>> default "lockdown,yama,loadpin,safesetid,integrity,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_SECURITY_SMACK >>> default "lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_SECURITY_APPARMOR >>> default "lockdown,yama,loadpin,safesetid,integrity,tomoyo,bpf" if DEFAULT_SECURITY_TOMOYO >>> -- >>> 2.30.0 >>> >> >> -- >> Ondrej Mosnacek >> Software Engineer, Linux Security - SELinux kernel >> Red Hat, Inc. >> > >