Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp79633rdb; Wed, 14 Feb 2024 13:22:08 -0800 (PST) X-Forwarded-Encrypted: i=2; AJvYcCWf7Ya29CwsMRjd9hhsTAa8F2kWZtu1lE1eDxl+Sh5svsaYxgBSs7Yp6f9aqUtnxMoDL8HD+0WyTUs5InzLdctojrzWH978kJeTMV3lRw== X-Google-Smtp-Source: AGHT+IFYq2uevw0/W63Hu/iH5VYfKsCdiZC3v5g/j7X+8QDmonz94JPzw5e2joqQTt3VvNu9RRhn X-Received: by 2002:ac8:7d11:0:b0:42d:bf9c:52f0 with SMTP id g17-20020ac87d11000000b0042dbf9c52f0mr3976824qtb.18.1707945728756; Wed, 14 Feb 2024 13:22:08 -0800 (PST) X-Forwarded-Encrypted: i=2; AJvYcCWmxs/Jq6kj4qidNjZ8FOz5JegyO1mHeFSZ2BfKfNba15JQu8nH8RJ3qatGAJWfxld1CUSXuRXaAMAxLH9TJNleqCsQDdkY7V1rW2JqSg== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id x8-20020a05622a000800b0042c7c5d8fb7si6690220qtw.494.2024.02.14.13.22.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Feb 2024 13:22:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-65977-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@paul-moore.com header.s=google header.b=bPl+nWhq; arc=fail (body hash mismatch); spf=pass (google.com: domain of linux-kernel+bounces-65977-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-65977-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=paul-moore.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 772411C22043 for ; Wed, 14 Feb 2024 21:22:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1A14E13F001; Wed, 14 Feb 2024 21:22:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=paul-moore.com header.i=@paul-moore.com header.b="bPl+nWhq" Received: from mail-yw1-f179.google.com (mail-yw1-f179.google.com [209.85.128.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3EB6113EFEF for ; Wed, 14 Feb 2024 21:21:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.179 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707945719; cv=none; b=nblm4t3NmPrjaX0NiO7nhrxTfV5VPx4W3lhrqScBnBKKvxh2L0/E7vnlIt5R0Ka/czeUBzWkLyAhyXYXQaByvThRK/a1KgAeQz1aUeDDDKk7/oOKSnOtqLjzKVNdg3RGMzFfJlDyCA3syCzNFxayeEtLz5AvNbFNHXC+HpE2G4M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707945719; c=relaxed/simple; bh=b0xMIcRt9SLSL0Q4PzKXSxEAiCcZcUoeIRlPO4qsUAY=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=VrubVh9b6WzV9wskAaG+N1EuTqcDzTuTM7iBhHCvhOtDybtp6PISxC2zBnGk5wxCxRyDQNQsbkOqHD6+osZv1vxLClqJaPy1M5It6yeRwQ5hhW+ZrnR2gcUm8kNJECNJOjsUYfaMiVrKWbU4hB9Ycj5upomIPcvLGM1spPSmzzE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=paul-moore.com; spf=pass smtp.mailfrom=paul-moore.com; dkim=pass (2048-bit key) header.d=paul-moore.com header.i=@paul-moore.com header.b=bPl+nWhq; arc=none smtp.client-ip=209.85.128.179 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=paul-moore.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=paul-moore.com Received: by mail-yw1-f179.google.com with SMTP id 00721157ae682-607815b5772so2406697b3.0 for ; Wed, 14 Feb 2024 13:21:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore.com; s=google; t=1707945716; x=1708550516; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=ludDExKUqMptEvphl/NE5ulFWudwk9xh8twHjzhcpOg=; b=bPl+nWhq6aBeZ7cbSJ46V+E5Gzs5+Wt/QU83LXFm47Uest2ir9SF6GisGm3KrjiFRw D/VxIEHk0xY7G+MC6kz3Zq2Ffx4j2naZg03wkFHINrhZIvIAud2kHg2CKffL+Jnzr6uo Vsnc9KxYhGX1ThowbdztncNBEkBoVQmIR4Eix3MJ/GteXiiIhYohtfRC81+ITlAuNFUv VaiOE2AYJ8gmwvtgctO9+OhI2e17f3H39B+IVWSGeLDDdOY63tFQ0gZlA7lvg4E+HOA7 N41/f0I/9sQkEquBGt7IAQ+ubz2r3MNGY4xg2usprjiJZlfWc4EyxeFhR9tMpzcTCiOu O2QQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707945716; x=1708550516; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ludDExKUqMptEvphl/NE5ulFWudwk9xh8twHjzhcpOg=; b=GWiugWRfN/oNVVvkbPP+hNM8d7aCLvO/3oHXaFuoe9ikbKRZFDn88Vo7O//w6sicPx q+cDwBRKB0RbTCak04C8yOIyfuIyyq+LyLQ2QWTSHxFzsOUJexWRMm/4JRh4xomHz3Fp 1zt4yphx2wWn3c288bQkfStGf3DAbPeXQ84+SJx8cQWnMhL1XJSOCIK+9WOFxPz13LO+ 0ppK8fYey1s3IWedpWjpv51c22nYmDxmt4e1VVFG0+irAZ/KACIYssOpQDI4Rjkeo8eC nLDqeBhQIYTe9WcHHF7FxHBgMJdPwdXLPIEAlEeHbojQRikydf9wfSaiIlCmJJlJwwZU pfjg== X-Forwarded-Encrypted: i=1; AJvYcCXdg7e1FrJMSS88IW3xy/T/5gRJOVl530qXyLOLm+vieCN20El7kujM9lPA2GqrkoDpBZDyNA2ox9zFdSfZhvwEW9iOaR0rUriCYDHk X-Gm-Message-State: AOJu0YzoteUjirWxXTDp+GCu6tgcqArxLsOrx9zDtj3rLaI3y4AIQNTP JwykXrkqDCHvxP+OxiiqArBtCTPV3BAvxjJbnUgMXHqF4/PxRwlPYcIVyb7kPFmA8S55G5pAill x5ztqoa08ctgEfr4X/4PjfIZBEDH48xNESzqK X-Received: by 2002:a0d:d7c4:0:b0:607:75e7:a66a with SMTP id z187-20020a0dd7c4000000b0060775e7a66amr2644503ywd.22.1707945716175; Wed, 14 Feb 2024 13:21:56 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240115181809.885385-1-roberto.sassu@huaweicloud.com> <20240115181809.885385-13-roberto.sassu@huaweicloud.com> <305cd1291a73d788c497fe8f78b574d771b8ba41.camel@linux.ibm.com> <05ad625b0f5a0e6c095abee5507801da255b36cd.camel@huaweicloud.com> <63afc94126521629bb7656b6e6783d6614ee898a.camel@linux.ibm.com> In-Reply-To: <63afc94126521629bb7656b6e6783d6614ee898a.camel@linux.ibm.com> From: Paul Moore Date: Wed, 14 Feb 2024 16:21:45 -0500 Message-ID: Subject: Re: [PATCH v9 12/25] security: Introduce file_post_open hook To: Mimi Zohar Cc: Roberto Sassu , viro@zeniv.linux.org.uk, brauner@kernel.org, chuck.lever@oracle.com, jlayton@kernel.org, neilb@suse.de, kolga@netapp.com, Dai.Ngo@oracle.com, tom@talpey.com, jmorris@namei.org, serge@hallyn.com, dmitry.kasatkin@gmail.com, eric.snowberg@oracle.com, dhowells@redhat.com, jarkko@kernel.org, stephen.smalley.work@gmail.com, eparis@parisplace.org, casey@schaufler-ca.com, shuah@kernel.org, mic@digikod.net, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, selinux@vger.kernel.org, linux-kselftest@vger.kernel.org, Roberto Sassu , Stefan Berger Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, Feb 14, 2024 at 3:07=E2=80=AFPM Mimi Zohar wr= ote: > On Tue, 2024-02-13 at 10:33 -0500, Paul Moore wrote: > > On Tue, Feb 13, 2024 at 7:59=E2=80=AFAM Roberto Sassu > > wrote: > > > On Mon, 2024-02-12 at 16:16 -0500, Paul Moore wrote: > > > > On Mon, Feb 12, 2024 at 4:06=E2=80=AFPM Mimi Zohar wrote: > > > > > Hi Roberto, > > > > > > > > > > > > > > > > diff --git a/security/security.c b/security/security.c > > > > > > index d9d2636104db..f3d92bffd02f 100644 > > > > > > --- a/security/security.c > > > > > > +++ b/security/security.c > > > > > > @@ -2972,6 +2972,23 @@ int security_file_open(struct file *file= ) > > > > > > return fsnotify_perm(file, MAY_OPEN); <=3D=3D=3D Confli= ct > > > > > > > > > > Replace with "return fsnotify_open_perm(file);" > > > > > > > > > > > } > > > > > > > > > > > > > > > > The patch set doesn't apply cleaning to 6.8-rcX without this > > > > > change. Unless > > > > > there are other issues, I can make the change. > > > > > > > > I take it this means you want to pull this via the IMA/EVM tree? > > > > > > Not sure about that, but I have enough changes to do to make a v10. > > @Roberto: please add my "Reviewed-by" to the remaining patches. > > > > > Sorry, I should have been more clear, the point I was trying to > > resolve was who was going to take this patchset (eventually). There > > are other patches destined for the LSM tree that touch the LSM hooks > > in a way which will cause conflicts with this patchset, and if > > you/Mimi are going to take this via the IMA/EVM tree - which is fine > > with me - I need to take that into account when merging things in the > > LSM tree during this cycle. It's not a big deal either way, it would > > just be nice to get an answer on that within the next week. > > Similarly there are other changes for IMA and EVM. If you're willing to = create > a topic branch for just the v10 patch set that can be merged into your tr= ee and > into my tree, I'm fine with your upstreaming v10. (I'll wait to send my p= ull > request after yours.) Roberto will add my Ack's to the integrity, IMA, a= nd EVM > related patches. However if you're not willing to create a topic branch,= I'll > upstream the v10 patch set. I'm not a big fan of sharing topic branches across different subsystem trees, I'd much rather just agree that one tree or another takes the patchset and the others plan accordingly. Based on our previous discussions I was under the impression that you wanted me to merge this patchset into lsm/dev, but it looks like that is no longer the case - which is okay by me. Assuming Roberto gets a v10 out soon, do you expect to merge the v10 patchset and send it up during the upcoming merge window (for v6.9), or are you expecting to wait until after the upcoming merge window closes and target v6.10? Once again, either is fine, I'm just trying to coordinate this with other patches. --=20 paul-moore.com