Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2262675pxj; Sat, 5 Jun 2021 19:17:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxRkx0v7ikJVm6F5IEBaGs7b3uzQgJnvmW5BhKl5UtM0eFEyAKnXDNq/a2/UceOoYTvUGm8 X-Received: by 2002:a50:9b42:: with SMTP id a2mr12759383edj.215.1622945853595; Sat, 05 Jun 2021 19:17:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622945853; cv=none; d=google.com; s=arc-20160816; b=b4S635SdKzogorDevzdaV55FNFro3QLcaE/fwCHxKSl5r8X5zR54ej0P/BNqIVvUQh ro8vNB8pnX6ffEq9XfWTOgFkCUQCkbNZQODRLPE9vo+1xITQziveeXvbiQgJ/PFTMDnB 7BCfJr77uK0GTU1ESWMm91VKSZQ3LeJUqHNWQrfYRyMzGV1tNghtbs4nGKtBH12OHZnW uz76yByYwL2v7uG6fX61E1BshFP7YilM+l/DqN2jJEWW2LtRVHUT/cAejU1I+cBb1oEh grkvlE59588ERMWTCvUM6APuuCei2pqKJfxLJiaVgBDE3t5ZdIQnoNwzmneocoIM7FOH pkjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=nOTcniWTVc9slYXWLxXSv1uRyKmcmZRO+63M/pSzE/U=; b=exdJl2Am3w0ObXpejJjIIKJy43sV747B+78Ok9fGCivaQeIaUivt8+knYRPBpxjhvI n4Xl0dcfWYEIisYkkVJzQ+lt6iHGkClWRQnaF0oMJxNUTFJ7VhTdJqrJp6pASBmIChcb fwpg5qEbkoNyn4vAtKCiqxXQbdtV40EZGTgqeCe0dR3pyDCnFg/hkNDwoP8USAkgCnaU cc/b0zg7C+JQQtCrxDalhvKAFxmYQz+GCOAAKne233g2MbCNkuHsvUdyy9RaT+l4rDKJ KTfYnElUnRANy/snnv2Y9yGSA0kkLb148nHjzSropBDu6F19uoY8pdPJBFAyLgSHdjQ/ DOTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=cwZ2lIKK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t22si626961edq.545.2021.06.05.19.17.11; Sat, 05 Jun 2021 19:17:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=cwZ2lIKK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230161AbhFFCNK (ORCPT + 99 others); Sat, 5 Jun 2021 22:13:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60630 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230111AbhFFCNK (ORCPT ); Sat, 5 Jun 2021 22:13:10 -0400 Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 12872C061767 for ; Sat, 5 Jun 2021 19:11:15 -0700 (PDT) Received: by mail-ed1-x536.google.com with SMTP id cb9so15860713edb.1 for ; Sat, 05 Jun 2021 19:11:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nOTcniWTVc9slYXWLxXSv1uRyKmcmZRO+63M/pSzE/U=; b=cwZ2lIKKIQuoesuejMOtqIBw38LWmdJQRco7DTpm+On7hiyFzSIynCDa52d+sLCIqB 2zP8pj4E3rGCuqfhnJ5MRag1NFm53lXVMwQKVQbdijwfbaxWRtV4bmYjHioSZXD6kkwg Dlj3L7D4QLBXl9X//0lK2mPz5kWslHUxKRvcBa2juD05DpNuxQp//Z0f+OYjTO6stdwc EZHN0Y1DxgOncdZ7gzfETOgtK9k4bhYfZebdAtgUMPDxU3VJkT9f7Tfuk6EcJw0zLdbF FqFv+pxxBNtA2aX39hOynje/H5TcETj5t1HDzA84k39g9uwCsZz2riUv/7IvQm3jw6Tq ydjg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nOTcniWTVc9slYXWLxXSv1uRyKmcmZRO+63M/pSzE/U=; b=MVwF01qbYVMEI3lA/J8BeDgf+9uYI4n6YBJArmrsLDh5F5Rh9MHz6mCtf1UzSl75nS hykvjas9JwK/RFz6EEQYiNr7ZUpY4KUJyeV1YDmlyIX2zqR7UazeTpZitzChRy0GhwVa nHHXUyFdm94Je2iv3BK24527pBETUf1vA/ou7DpJg4hnHMTDNPUli2r6m5qapU+6P6sr +dpKSw2mF39YefsPcOAckR29di4hL7OjawG0MnjNhizEP56F6PoRjImNV6Bcb21vWGiR 6y4XjnfIX4JHn7aEfoFR/0bkJ1CAPnkhngLiI5isMQsiuVLxDOtdq7yVYZGOvcwUsBS/ 4I/g== X-Gm-Message-State: AOAM532/+oOlNrJ2hBWFvRfIoSIqEDdEZz94+Mf8shdKyVbSj8Gg9pYL CBC3R32ivWggmgrROG3Lt84zQHoFzi0595C73z0cQ+pr0Q== X-Received: by 2002:a05:6402:348f:: with SMTP id v15mr1175334edc.135.1622945471846; Sat, 05 Jun 2021 19:11:11 -0700 (PDT) MIME-Version: 1.0 References: <20210517092006.803332-1-omosnace@redhat.com> <01135120-8bf7-df2e-cff0-1d73f1f841c3@iogearbox.net> <2e541bdc-ae21-9a07-7ac7-6c6a4dda09e8@iogearbox.net> <3ca181e3-df32-9ae0-12c6-efb899b7ce7a@iogearbox.net> <64552a82-d878-b6e6-e650-52423153b624@schaufler-ca.com> In-Reply-To: From: Paul Moore Date: Sat, 5 Jun 2021 22:11:00 -0400 Message-ID: Subject: Re: [PATCH v2] lockdown,selinux: avoid bogus SELinux lockdown permission checks To: Linus Torvalds Cc: Casey Schaufler , Alexei Starovoitov , Daniel Borkmann , Ondrej Mosnacek , LSM List , James Morris , Steven Rostedt , Ingo Molnar , Stephen Smalley , SElinux list , ppc-dev , Linux-Fsdevel , bpf , Network Development , LKML , Jiri Olsa , Alexei Starovoitov , Andrii Nakryiko , "David S. Miller" , Jakub Kicinski Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 5, 2021 at 2:17 PM Linus Torvalds wrote: > On Sat, Jun 5, 2021 at 11:11 AM Casey Schaufler wrote: > > > > You have fallen into a common fallacy. The fact that the "code runs" > > does not assure that the "system works right". In the security world > > we face this all the time, often with performance expectations. In this > > case the BPF design has failed [..] > > I think it's the lockdown patches that have failed. They did the wrong > thing, they didn't work, > > The report in question is for a regression. > > THERE ARE NO VALID ARGUMENTS FOR REGRESSIONS. To think I was worried we might end this thread without a bit of CAPS LOCK, whew! :) I don't think anyone in this discussion, even Casey's last comment, was denying that there was a problem. The discussion and the disagreements were about what a "proper" fix would be, and how one might implement that fix; of course there were different ideas of "proper" and implementations vary even when people agree, so things were a bit of a mess. If you want to get upset and shouty, I think there are a few things spread across the subsystems involved that would be worthy targets, but to say that Casey, myself, or anyone else who plays under security/ denied the problem in this thread is not fair, or correct, in my opinion. > Honestly, security people need to understand that "not working" is not > a success case of security. It's a failure case. I can't pretend to know what all of the "security people" are thinking, but I can say with a good degree of certainty that my goal is not to crash, panic, kill, or otherwise disable a user's system. When it comes to things like the LSM hooks, my goal is to try and make sure we have the right hooks in the right places so that admins and users have the tools they need to control access to their data and systems in the way that they choose. Sometimes this puts us at odds with other subsystems in the kernel, we saw that in this thread, but that's to be expected anytime you have competing priorities. The important part is that eventually we figure out some way to move forward, and the fact that we are still all making progress and putting out new kernel releases is proof that we are finding a way. That's what matters to me, and if I was forced to guess, I would imagine that matters quite a lot to most of us here. -- paul moore www.paul-moore.com