xcOn Wed 2011-05-18 17:25:52, Andrew Morton wrote: > On Mon, 16 May 2011 10:44:54 -0400 > Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx> wrote: > > > Extended Verification Module(EVM) detects offline tampering of the security > > extended attributes (e.g. security.selinux, security.SMACK64, security.ima), > > which is the basis for LSM permission decisions and, with the IMA-appraisal ... > Thirdly, I'm not seeing a description of the user interface anywhere. > Please fully describe it in a manner which can be efficiently reviewed. > For example, if there are any user-provided inputs, describe them. If Fourthly, is it likely to find its way to the next cellphone I buy, and will it prevent me from rooting it? Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html