From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.9 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B4D43C4CECD for ; Mon, 16 Sep 2019 20:38:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 8BC2B206C2 for ; Mon, 16 Sep 2019 20:38:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568666320; bh=EY6tme3ahlxbvqIuWhhP/CP4BgEmcGv1d6xzN7Rmy2Y=; h=References:In-Reply-To:From:Date:Subject:To:Cc:List-ID:From; b=jZdAqsvlTcEOF7OEq4CRi7+jb/bq9JBITBVS6gkbaUMzBiv0Hkpqdiiu5MbovnmKq 24wdDlkF5jP1fWUFfzTGUXKN5hgLqwXDQcLNUdhDHne+soS2nTtP/pLVTqLd6is6HF uDoT1NFTjmlQe6/67D0l2PcBYEFvZrVXYgFfZmQc= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387549AbfIPUij (ORCPT ); Mon, 16 Sep 2019 16:38:39 -0400 Received: from mail-lf1-f67.google.com ([209.85.167.67]:43796 "EHLO mail-lf1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733115AbfIPUij (ORCPT ); Mon, 16 Sep 2019 16:38:39 -0400 Received: by mail-lf1-f67.google.com with SMTP id u3so1002620lfl.10 for ; Mon, 16 Sep 2019 13:38:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux-foundation.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=me/tNrvpc38oLBmNgQpuGD2wwLksgIc0n84g04Pq6UM=; b=hFnsr4SQxJjjqereCuTP+xGrGqVFwwB7+2ShWDl5Qp8pLxb4+MV1NinHIOPm4UaO/I 66LHrIpJRtRLDqw3UxiqboGbOYFJm3hraDsxkxsG2zVzCjIxcW00JkhtL3B0fbXwayOw 0lnLYFaWHXA2YaW+8dkcHiVuHzVd/UG+TSCPY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=me/tNrvpc38oLBmNgQpuGD2wwLksgIc0n84g04Pq6UM=; b=goI1UlA4k8499t10I25yAUz05dBXqYehPksBxnzkzuBIW00nHo4wMHm73E4yNVvOn4 I9EpFjWWGOKs2u1uQQEMkX5aH7MlDK6MMvglLBnrzYLrKdL80R7vStOprs0ZyCIF7Jlh cl2hjrZz7kWE+8krh6PTyhSB9bVBGNK63Rv1yRqQxrmEta8dj8c6fjTRFZ2JDlLhD9qK 0rHQI5zAobzi4Rl3aAug+KHx6k4I6nQpSlWJ2Wbp6PIJ+2Nu9Uw7btQbohhPUNOur4S5 Se7hIsctRqGj0niv0qlGNV3wLq5dBYoo3G3pflVkmuw4pVx3V/XtxK4KBbu2laiSXDpz 1QCA== X-Gm-Message-State: APjAAAUL0VaQIYDDv+x/oJHIdBbDPtDF3ar4EOsg8xC7lM7pgVjjUkZo 0imcHRl/tVPj8ZdSKpvGr/bqnfz0TPU= X-Google-Smtp-Source: APXvYqyeDkHyalfPtxpK2dTr7Ud2oO7znZRXVVnTT3TB8YaNcU1hXYshdlR4BbA+il7XiAYPinKhNg== X-Received: by 2002:a19:7413:: with SMTP id v19mr45964lfe.176.1568666317367; Mon, 16 Sep 2019 13:38:37 -0700 (PDT) Received: from mail-lj1-f177.google.com (mail-lj1-f177.google.com. [209.85.208.177]) by smtp.gmail.com with ESMTPSA id c4sm9116130lfm.4.2019.09.16.13.38.36 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 16 Sep 2019 13:38:36 -0700 (PDT) Received: by mail-lj1-f177.google.com with SMTP id m7so570638lji.2 for ; Mon, 16 Sep 2019 13:38:36 -0700 (PDT) X-Received: by 2002:a2e:5b9a:: with SMTP id m26mr801701lje.90.1568666316121; Mon, 16 Sep 2019 13:38:36 -0700 (PDT) MIME-Version: 1.0 References: <1568237365.5783.39.camel@linux.ibm.com> In-Reply-To: <1568237365.5783.39.camel@linux.ibm.com> From: Linus Torvalds Date: Mon, 16 Sep 2019 13:38:20 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [GIT PULL] integrity subsystem updates for v5.4 To: Mimi Zohar Cc: linux-security-module , linux-integrity , linux-kernel Content-Type: text/plain; charset="UTF-8" Sender: linux-integrity-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-integrity@vger.kernel.org On Wed, Sep 11, 2019 at 2:29 PM Mimi Zohar wrote: > > The major feature in this pull request is IMA support for measuring > and appraising appended file signatures. In addition are a couple of > bug fixes and code cleanup to use struct_size(). How is the file signature any different from (and/or better than) the fs-verity support? The fs-verity support got fairly extensively discussed, and is apparently going to actually be widely used by Android, and it an independent feature of any security model. What does the IMA version bring to the table? Linus