Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2403182rwb; Thu, 17 Nov 2022 10:13:58 -0800 (PST) X-Google-Smtp-Source: AA0mqf77wjjgCqpDRDeXRPobiZfNn3cidCqVjd8BVZH5pC+AkVt/psGev/XoWmdhZAAUdehx8eKO X-Received: by 2002:a17:903:3282:b0:17e:587:6bb6 with SMTP id jh2-20020a170903328200b0017e05876bb6mr3917724plb.114.1668708837997; Thu, 17 Nov 2022 10:13:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668708837; cv=none; d=google.com; s=arc-20160816; b=XwiTNvZ+hTyG/rNqFPVVmq8Fxgk/+8UsRSQwUBNoCnN1e4VJF5xr4NMPmwEbhOgEp7 7GBpBRdoi45TAGNGiYZl4Uu+aWAUm0/+RY0TdkXfySlmymRdIMsNXOfwcwz60jGX+f1D XFg9UO/+Bf6zZWzy/MEymIiEjl9wTmegqZ9TzZmz3kFsRqVTY5G7aU2x2AHJ/YceIVGV jbYKzInV1ffgSVw8jELqh369iy4opCERvcOyDFe5G9hAHC4IB+Hg2XxqazoJNWsM5AR8 WRP3BCZhN0kQKTC6liwEh6c4fGcX2TKws6dUTGh33hUvJL/2h7bzYolhXU+BNC4yIvz1 Kv/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=DJWVbLBThfA4r5Xc8cljs2uNQs/ONt++ArGyQv7sJFw=; b=Vh6XZSiHQCGoFYPJnyTtUkDavN/oqrcTWPnnZfSBxNjDHaRzE5r93VveBBx8pUDNkX Z4QLWEXY6uwJ2LYIlMQFMMSxhLZLXa6+dRIwdfh/9Ho9/B6OTZLQMBQ6x/89lNTSBji6 LqPmT9T703iwb4gyUhpbAUhQF930quKau+NbljyfUK3d3RjzJcRFwRe1Hjg6Bz3hb96e 7HEdAR7J85ZfUwqUeXm5K6GTgmhpwRD72VZWH6UZ4jesoGGFL0I869F8YPpQKWf8/oVX cCI+fS6Sngonar1ot5kNw4k/WjshWq8necmlfy7QPa9BfqFaQZkcp8VMYZO23cFXztxD oWwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=hgJNePoo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l2-20020a17090a660200b0020d5dfb9d69si1242899pjj.187.2022.11.17.10.13.44; Thu, 17 Nov 2022 10:13:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=hgJNePoo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239679AbiKQSII (ORCPT + 92 others); Thu, 17 Nov 2022 13:08:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47136 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239785AbiKQSID (ORCPT ); Thu, 17 Nov 2022 13:08:03 -0500 Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD90C6D48C; Thu, 17 Nov 2022 10:08:02 -0800 (PST) Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2AHGQna1028348; Thu, 17 Nov 2022 18:07:43 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : subject : from : to : cc : date : in-reply-to : references : content-type : mime-version : content-transfer-encoding; s=pp1; bh=DJWVbLBThfA4r5Xc8cljs2uNQs/ONt++ArGyQv7sJFw=; b=hgJNePoo0ERFfc7qezYZNPQsZGdxi/W430q6D8xfUhpQyKmRN00HwsfVOY3jq06eTysT Vyu3wXV8i7MdI1ba1BkH4o7BhEG59/HCB/jUhT03rCacX7Hm+xQlmz0oYFLA5O9CHUjs Muw3JYbdeKkgD8mjZ62Eb9/IXXsX69XBCVD2I+ZSFtfiIQ/VFg+EgRC9kTBic5jWBIfH wF2xrldJuoV056nfe4FAs49nU8+VI4vC5NYCNPOiygmf5ISq+MpxwH9rJJIS0TrLAhUM a+jwmFXrS7Lx4RTjoTRFyyCx1bdyp7ZcVsD4Ctj8Let14D6NdMSkbfXMh8QK+a5hqEmt 1w== Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-001b2d01.pphosted.com (PPS) with ESMTPS id 3kwrg1jk0k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Nov 2022 18:07:42 +0000 Received: from m0098419.ppops.net (m0098419.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 2AHHgIk8020406; Thu, 17 Nov 2022 18:07:42 GMT Received: from ppma03wdc.us.ibm.com (ba.79.3fa9.ip4.static.sl-reverse.com [169.63.121.186]) by mx0b-001b2d01.pphosted.com (PPS) with ESMTPS id 3kwrg1jk00-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Nov 2022 18:07:42 +0000 Received: from pps.filterd (ppma03wdc.us.ibm.com [127.0.0.1]) by ppma03wdc.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 2AHI4s3I016666; Thu, 17 Nov 2022 18:07:40 GMT Received: from b01cxnp22033.gho.pok.ibm.com (b01cxnp22033.gho.pok.ibm.com [9.57.198.23]) by ppma03wdc.us.ibm.com with ESMTP id 3kt34ajnqr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 17 Nov 2022 18:07:40 +0000 Received: from smtpav04.wdc07v.mail.ibm.com ([9.208.128.116]) by b01cxnp22033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 2AHI7drE2687488 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 17 Nov 2022 18:07:40 GMT Received: from smtpav04.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B8C9858056; Thu, 17 Nov 2022 18:07:39 +0000 (GMT) Received: from smtpav04.wdc07v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3A20A58045; Thu, 17 Nov 2022 18:07:38 +0000 (GMT) Received: from li-f45666cc-3089-11b2-a85c-c57d1a57929f.ibm.com (unknown [9.160.98.240]) by smtpav04.wdc07v.mail.ibm.com (Postfix) with ESMTP; Thu, 17 Nov 2022 18:07:38 +0000 (GMT) Message-ID: <5ef79a7ab559f46313f767d90b50662e003d62be.camel@linux.ibm.com> Subject: Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook From: Mimi Zohar To: Casey Schaufler , Roberto Sassu , dmitry.kasatkin@gmail.com, paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com, stephen.smalley.work@gmail.com, eparis@parisplace.org Cc: linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, reiserfs-devel@vger.kernel.org, linux-kernel@vger.kernel.org, keescook@chromium.org, nicolas.bouchinet@clip-os.org, Roberto Sassu Date: Thu, 17 Nov 2022 13:07:37 -0500 In-Reply-To: <66df8ebe-1ed2-c839-8a5f-cc0a26bad6c3@schaufler-ca.com> References: <20221110094639.3086409-1-roberto.sassu@huaweicloud.com> <20221110094639.3086409-4-roberto.sassu@huaweicloud.com> <4c1349f670dc3c23214a5a5036e43ddaa0a7bc89.camel@linux.ibm.com> <026075fa-0b58-9041-0727-b75e19499356@schaufler-ca.com> <6b4d47765a4ddcfdf07158f3ad0737fa3aa5823e.camel@linux.ibm.com> <66df8ebe-1ed2-c839-8a5f-cc0a26bad6c3@schaufler-ca.com> Content-Type: text/plain; charset="ISO-8859-15" X-Mailer: Evolution 3.28.5 (3.28.5-18.el8) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: LuQseI_Vizjm-5HuCgvISdTcmcc66MfQ X-Proofpoint-GUID: TkHqQek4ect9eW5Fm4q3OEbG9UVsM1BT X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-17_06,2022-11-17_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 malwarescore=0 phishscore=0 spamscore=0 bulkscore=0 clxscore=1015 adultscore=0 priorityscore=1501 impostorscore=0 lowpriorityscore=0 suspectscore=0 mlxlogscore=935 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211170131 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2022-11-17 at 09:40 -0800, Casey Schaufler wrote: > On 11/17/2022 9:24 AM, Mimi Zohar wrote: > > On Thu, 2022-11-17 at 09:18 -0800, Casey Schaufler wrote: > >> On 11/17/2022 8:05 AM, Mimi Zohar wrote: > >>> hOn Thu, 2022-11-10 at 10:46 +0100, Roberto Sassu wrote: > >>>> From: Roberto Sassu > >>>> > >>>> Currently, security_inode_init_security() supports only one LSM providing > >>>> an xattr and EVM calculating the HMAC on that xattr, plus other inode > >>>> metadata. > >>>> > >>>> Allow all LSMs to provide one or multiple xattrs, by extending the security > >>>> blob reservation mechanism. Introduce the new lbs_xattr field of the > >>>> lsm_blob_sizes structure, so that each LSM can specify how many xattrs it > >>>> needs, and the LSM infrastructure knows how many xattr slots it should > >>>> allocate. > >>> Perhaps supporting per LSM multiple xattrs is a nice idea, but EVM > >>> doesn't currently support it. The LSM xattrs are hard coded in > >>> evm_config_default_xattrnames[], based on whether the LSM is > >>> configured. Additional security xattrs may be included in the > >>> security.evm calculation, by extending the list via > >>> security/integrity/evm/evm_xattrs. > >> Smack uses multiple xattrs. All file system objects have a SMACK64 > >> attribute, which is used for access control. A program file may have > >> a SMACK64EXEC attribute, which is the label the program will run with. > >> A library may have a SMACK64MMAP attribute to restrict loading. A > >> directory may have a SMACK64TRANSMUTE attribute, which modifies the > >> new object creation behavior. > >> > >> The point being that it may be more than a "nice idea" to support > >> multiple xattrs. It's not a hypothetical situation. > > And each of these addiitonal Smack xattrs are already defined in > > evm_config_default_xattrnames[]. > > Then I'm confused by the statement that "EVM doesn't currently support it". My mistake. As you pointed out, Smack is defining multiple security xattrs. Mimi