linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* evm_inode_init_security and module stacking
@ 2019-01-18  0:47 Casey Schaufler
  2019-01-18  2:31 ` Mimi Zohar
  0 siblings, 1 reply; 5+ messages in thread
From: Casey Schaufler @ 2019-01-18  0:47 UTC (permalink / raw)
  To: linux-integrity, Mimi Zohar; +Cc: LSM, Casey Schaufler

security_inode_init_security() currently calls at most one
of selinux_inode_init_security() and smack_inode_init_security().
It then sends the result to evm_inode_init_security to create
the security.evm attribute. This isn't going to work on a system
that has both SELinux and Smack.

I see two options:
	- create security.evm with the information from all
	  security modules that provide inode_init_security hooks
	- create a separate attribute for each module,
	  security.evm-selinux and security.evm-smack in the
	  current case.

How would you like to have it work? I am agnostic, although the
separate attributes would be easier for the infrastructure.


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-01-20 18:56 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-01-18  0:47 evm_inode_init_security and module stacking Casey Schaufler
2019-01-18  2:31 ` Mimi Zohar
2019-01-18 18:49   ` Casey Schaufler
2019-01-20 16:42     ` Mimi Zohar
2019-01-20 18:54       ` Casey Schaufler

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).