From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754442AbdDLNbp (ORCPT ); Wed, 12 Apr 2017 09:31:45 -0400 Received: from mail-qt0-f195.google.com ([209.85.216.195]:36504 "EHLO mail-qt0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754395AbdDLNbj (ORCPT ); Wed, 12 Apr 2017 09:31:39 -0400 MIME-Version: 1.0 In-Reply-To: References: <1491988018-4120-1-git-send-email-sbuisson@ddn.com> From: Sebastien Buisson Date: Wed, 12 Apr 2017 15:30:58 +0200 Message-ID: Subject: Re: [PATCH] selinux: add selinux_is_enforced() function To: Paul Moore , sds@tycho.nsa.gov Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, selinux@tycho.nsa.gov, william.c.roberts@intel.com, serge@hallyn.com, james.l.morris@oracle.com, Eric Paris , Paul Moore , Sebastien Buisson Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2017-04-12 13:55 GMT+02:00 Paul Moore : > As currently written this code isn't something we would want to merge > upstream for two important reasons: > > * No clear user of this functionality. There needs to be a well > defined user of this functionality in the kernel. The use case for this new functionality (and the other one) is getting SELinux information from the Lustre client code in kernel space. Latest patch can be accessed at: https://review.whamcloud.com/24421 Actual user is sptlrpc_get_sepol() function in lustre/lustre/ptlrpc/sec.c file. This code will be pushed to the upstream kernel as soon as it is landed into Lustre master branch.