From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_2 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 30D1FC432C0 for ; Tue, 26 Nov 2019 22:16:07 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 099692064B for ; Tue, 26 Nov 2019 22:16:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726050AbfKZWQG (ORCPT ); Tue, 26 Nov 2019 17:16:06 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:48150 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725970AbfKZWQG (ORCPT ); Tue, 26 Nov 2019 17:16:06 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAQMCUwQ010409 for ; Tue, 26 Nov 2019 17:16:05 -0500 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 2wh3y3nu06-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 26 Nov 2019 17:16:05 -0500 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 26 Nov 2019 22:16:03 -0000 Received: from b06avi18878370.portsmouth.uk.ibm.com (9.149.26.194) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Tue, 26 Nov 2019 22:16:00 -0000 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06avi18878370.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id xAQMG0jT43385332 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 26 Nov 2019 22:16:00 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E698BA4057; Tue, 26 Nov 2019 22:15:59 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 76355A404D; Tue, 26 Nov 2019 22:15:59 +0000 (GMT) Received: from dhcp-9-31-103-87.watson.ibm.com (unknown [9.31.103.87]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Tue, 26 Nov 2019 22:15:59 +0000 (GMT) Subject: Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor From: Mimi Zohar To: Casey Schaufler , linux-integrity@vger.kernel.org Date: Tue, 26 Nov 2019 17:15:58 -0500 In-Reply-To: <1a7e9e00-afb5-9164-912c-84f2cde7a2e1@schaufler-ca.com> References: <20191024205228.6922-1-casey@schaufler-ca.com> <1a7e9e00-afb5-9164-912c-84f2cde7a2e1@schaufler-ca.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 19112622-0012-0000-0000-0000036CAB4C X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19112622-0013-0000-0000-000021A85205 Message-Id: <1574806558.4793.265.camel@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-26_07:2019-11-26,2019-11-26 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 mlxlogscore=999 suspectscore=0 phishscore=0 spamscore=0 clxscore=1015 priorityscore=1501 lowpriorityscore=0 mlxscore=0 impostorscore=0 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1911260187 Sender: linux-integrity-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-integrity@vger.kernel.org Hi Casey, On Mon, 2019-11-25 at 12:42 -0800, Casey Schaufler wrote: > Has anyone from the integrity development team been watching > the stack patch effort? There are changes that could be of > concern. Thanks for the heads up!  Sorry for the delay in reviewing the patches. FYI, the IMA changes for Linux 5.5 are being upstreamed via the PowerPC subsystem.  With these changes, patches 9/25 and 12/25 do not apply cleanly.  Michael has an IMA topic branch which can be "merged", until -rc1 is released.[1] Mimi [1] topic/ima branch https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/