On 6/15/2020 9:45 AM, Lakshmi Ramasubramanian wrote: > On 6/15/20 4:57 AM, Stephen Smalley wrote: > > Hi Stephen, > > Thanks for reviewing the patches. > >>> +void security_state_change(char *lsm_name, void *state, int state_len) >>> +{ >>> + ima_lsm_state(lsm_name, state, state_len); >>> +} >>> + >> >> What's the benefit of this trivial function instead of just calling >> ima_lsm_state() directly? > > One of the feedback Casey Schaufler had given earlier was that calling an IMA function directly from SELinux (or, any of the Security Modules) would be a layering violation. Hiding the ima_lsm_state() call doesn't address the layering. The point is that SELinux code being called from IMA (or the other way around) breaks the subsystem isolation. Unfortunately, it isn't obvious to me how you would go about what you're doing without integrating the subsystems. > > LSM framework (security/security.c) already calls IMA functions now (for example, ima_bprm_check() is called from security_bprm_check()). I followed the same pattern for measuring LSM data as well. > > Please let me know if I misunderstood Casey's comment. >