Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 51FCFC43381 for ; Fri, 22 Mar 2019 22:45:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1EC5C2075E for ; Fri, 22 Mar 2019 22:45:26 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="mDVknPG/" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728377AbfCVWpZ (ORCPT ); Fri, 22 Mar 2019 18:45:25 -0400 Received: from mail-ua1-f68.google.com ([209.85.222.68]:35008 "EHLO mail-ua1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728330AbfCVWpU (ORCPT ); Fri, 22 Mar 2019 18:45:20 -0400 Received: by mail-ua1-f68.google.com with SMTP id f88so1279188uaf.2 for ; Fri, 22 Mar 2019 15:45:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XIWF5r+FeAyzFbB/tkDZ1Cwr2CHIZ4gIs+pbAdf62jk=; b=mDVknPG/ZmQ9thZGsga0cOASQO6ss/HgUzvEnM228t8RAHZw3hWN8WerQSRw/M9Afm roKYwxtmePMDQjQOFiG9eDPcbxc5qIXQ7j3PQuRoY0gRF/zV6uqJU5O6ZmaTOayzTu0v AMvnzZz7mA8KuTsxqEOUEc743wS0ObEQ1FXDI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XIWF5r+FeAyzFbB/tkDZ1Cwr2CHIZ4gIs+pbAdf62jk=; b=NzFvEm4FsT0t26wc2DwGt4YzBJTkPLg+ZjXsiix87E8mzbaTzxC+QrXt7QGatA120K clFjYgj7jDT135njF94CF2Bhw+l3VDSlrPlEBcslacrthT9xQUM78QM2dxN1ICoulX3I Qt2P1Nj9cWs1p8hnR1p6iE/luWBXa9CiYhCOgoGGYJTZ0XPT6TC9gXbYZMYPWwlFQif4 Ny9NHkuxQkA5/G2y+85mYE4WatKYsbF/X8yJhsekBw4oWLdDHPFFefT5tzhf0dN2Zu8W xIYfFGWjNFksl90HqKqMclyn7ooqLuIwpoLBIlOmfPaR9gMAYysnk0lzhbyiMVgpZooJ yUBQ== X-Gm-Message-State: APjAAAWfJuflU5VEBJCkmpIhOceMQHUcLb9HEE0heD5QVNx9lJTsfbAN Jesp8eYdJGNub5OsSdLByvw6tAZiLKE= X-Google-Smtp-Source: APXvYqwO7FPrwR1YklyAiCtuonX5/B8VsRCsz8vEET0G9Cyn2FrViZhPTJoGaUSYyrrtktqMyhg/HQ== X-Received: by 2002:ab0:14ce:: with SMTP id f14mr5931844uae.50.1553294718469; Fri, 22 Mar 2019 15:45:18 -0700 (PDT) Received: from mail-vk1-f180.google.com (mail-vk1-f180.google.com. [209.85.221.180]) by smtp.gmail.com with ESMTPSA id t4sm4203964uaq.0.2019.03.22.15.45.16 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 22 Mar 2019 15:45:16 -0700 (PDT) Received: by mail-vk1-f180.google.com with SMTP id d15so819020vka.8 for ; Fri, 22 Mar 2019 15:45:16 -0700 (PDT) X-Received: by 2002:a1f:a4d:: with SMTP id 74mr3298849vkk.13.1553294715883; Fri, 22 Mar 2019 15:45:15 -0700 (PDT) MIME-Version: 1.0 References: <20190315110555.0807d015@cakuba.netronome.com> <20190315120105.5541ad46@cakuba.netronome.com> <20190315165440.53b9db3c@cakuba.netronome.com> <2bf23acd-22c4-a260-7648-845887a409d5@i-love.sakura.ne.jp> In-Reply-To: From: Kees Cook Date: Fri, 22 Mar 2019 15:45:04 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: mount.nfs: Protocol error after upgrade to linux/master To: Tetsuo Handa Cc: Casey Schaufler , Jakub Kicinski , linux-security-module , Trond Myklebust , "open list:NFS, SUNRPC, AND..." , Anna Schumaker , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, Mar 21, 2019 at 2:10 PM Tetsuo Handa wrote: > > On 2019/03/22 1:38, Kees Cook wrote: > > This is mostly good. I'd like to keep the other LSMs listed though > > (similar to what I had originally) so that if a legacy-major doesn't > > initialize, later ones will be. I want to remove the concept of > > "major" LSMs. The only thing that should matter is init order... > > Excuse me? Are you saying that > > if a legacy-major (which is defined as the "Default security module") > doesn't initialize, later ones (any of selinux,smack,tomoyo,apparmor > except the one which is defined as "Default security module") will be > initialized > > ? That sounds strange to me. Any of selinux,smack,tomoyo,apparmor can be > initialized when specified by lsm= kernel command line option (or security= > kernel command line option if lsm= kernel command line option is not > specified), won't it? It breaks the backward-compat for the "security=" line. If a system is booted with CONFIG_LSM="minors...,apparmor" and "security=selinux", neither apparmor nor selinux will be initialized. The logic on "security=..." depends on the other LSMs being present in the list. -Kees -- Kees Cook