[GIT PULL] security: general updates for v4.21

James Morris jmorris at namei.org
Mon Jan 7 21:45:22 UTC 2019


On Sat, 29 Dec 2018, Mimi Zohar wrote:

> On Sat, 2018-12-29 at 10:34 -0800, Casey Schaufler wrote:
> > On 12/28/2018 8:15 PM, Linus Torvalds wrote:
> > > On Fri, Dec 28, 2018 at 8:09 PM James Morris <jmorris at namei.org> wrote:
> > >> Yep, I understand what you mean. I can't find the discussion from several
> > >> years ago, but developers asked to be able to work with more current
> > >> kernels, and I recall you saying that if you want to do this, merge to a
> > >> specific -rc tag at least.
> > > If people really want it, maybe the merge can state that explicit
> > > thing, as it is I'm trying to push back on empty merges that don't
> > > explain why they even exist.
> > >
> > >                   Linus
> > 
> > The security tree tends to get changed from multiple directions,
> > most of which aren't based out of the security sub-system. The mount
> > rework from David is an excellent example. It gets hit just about
> > any time there's a significant VFS or networking change. Keeping
> > it current has helped find issues much earlier in the process.
> 
> Agreed, the security subsystem is different than other subsystems.  In
> addition to VFS changes, are key changes.  Changes in other subsystems
> do affect the LSMs/integrity.

Yep, I agree that if we get too far behind Linus then changes in things 
like overlayfs (a recent example) may subtly break LSM and we don't see 
this in the actual security development trees.  In theory these things 
will be picked up in next testing, although not everything spends long 
enough in next.


And it's not necessarily changes to security code, it can be apparently 
unrelated changes in the VFS or other subsystems which impact security 
semantics.

> Included in this open window are a number of LSM changes, which were
> not posted on the LSM mailing list and are not being upstreamed via
> the LSMs.

If you see changes doing this, please call them out. Any changes to LSM 
need to be cc'd at least to the LSM mailing list.


-- 
James Morris
<jmorris at namei.org>


More information about the Linux-security-module-archive mailing list