The kernel is taking security.apparmor into account when validating EVM, so evmctl should be doing the same. Signed-off-by: Matthew Garrett <mjg59@xxxxxxxxxx> --- src/evmctl.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/evmctl.c b/src/evmctl.c index 43d261f..e350f69 100644 --- a/src/evmctl.c +++ b/src/evmctl.c @@ -69,6 +69,7 @@ static char *evm_default_xattrs[] = { XATTR_NAME_SELINUX, XATTR_NAME_SMACK, + XATTR_NAME_APPARMOR, XATTR_NAME_IMA, XATTR_NAME_CAPS, NULL @@ -80,6 +81,7 @@ static char *evm_extra_smack_xattrs[] = { XATTR_NAME_SMACKEXEC, XATTR_NAME_SMACKTRANSMUTE, XATTR_NAME_SMACKMMAP, + XATTR_NAME_APPARMOR, XATTR_NAME_IMA, XATTR_NAME_CAPS, NULL -- 2.17.0.484.g0c8726318c-goog