On Fri, Jan 13, 2012 at 11:39 AM, Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote: > > Is the current exec_no_trans check enough for you? With my patch, > selinux can already block the execve if it wants. If this feature has "selinux can do xyz if it wants", it is broken. The *whole* point is to get the f*^%ing crazy "security managers can do xyz" things away from it. The flag - when set - should give a 100% guarantee that security context doesn't change, and an operation that would change it would error out. Not a "selinux can block it if it wants". None of that "wants" crap. None of the "you can configure security rules to do xyz" crap. One simple rule: no security changes from the context that set the flag. Any other rule will inevitably cause random gray areas where some random security manager does something stupid. We have enough of those already. No more. Linus -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html