From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759289Ab2IETr2 (ORCPT ); Wed, 5 Sep 2012 15:47:28 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:39929 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759201Ab2IETr0 (ORCPT ); Wed, 5 Sep 2012 15:47:26 -0400 Message-ID: <5047AC47.8080808@canonical.com> Date: Wed, 05 Sep 2012 12:47:19 -0700 From: John Johansen Organization: Canonical User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:15.0) Gecko/20120827 Thunderbird/15.0 MIME-Version: 1.0 To: Eric Paris CC: Serge Hallyn , Kees Cook , linux-kernel@vger.kernel.org, James Morris , Eric Paris , "Eric W. Biederman" , Jiri Kosina , Al Viro , Dan Carpenter , linux-security-module@vger.kernel.org Subject: Re: [PATCH] security: allow Yama to be unconditionally stacked References: <20120904203213.GA3617@www.outflux.net> <20120905154753.GE14225@amd1> In-Reply-To: X-Enigmail-Version: 1.4.4 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/05/2012 11:32 AM, Eric Paris wrote: > On Wed, Sep 5, 2012 at 11:47 AM, Serge Hallyn > wrote: >> Quoting Kees Cook (keescook@chromium.org): >>> Unconditionally call Yama when CONFIG_SECURITY_YAMA_STACKED is selected, >>> no matter what LSM module is primary. >>> >>> Ubuntu and Chrome OS already carry patches to do this, and Fedora >>> has voiced interest in doing this as well. Instead of having multiple >>> distributions (or LSM authors) carrying these patches, just allow Yama >>> to be called unconditionally when selected by the new CONFIG. >> >> I don't really like having both the STACKED and non-stacked paths. But >> I don't have a good alternative. >> >>> Signed-off-by: Kees Cook >> >> Acked-by: Serge E. Hallyn > > I said basically the same thing to Kees off list. But I don't have an > answer either. > > Acked-by: Eric Paris > Yeah I'm not fond of it either but until some more generic form of LSM stacking arives, I don't see a good alternative either so until then Acked-by: John Johansen