evm_inode_init_security and module stacking

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



security_inode_init_security() currently calls at most one
of selinux_inode_init_security() and smack_inode_init_security().
It then sends the result to evm_inode_init_security to create
the security.evm attribute. This isn't going to work on a system
that has both SELinux and Smack.

I see two options:
	- create security.evm with the information from all
	  security modules that provide inode_init_security hooks
	- create a separate attribute for each module,
	  security.evm-selinux and security.evm-smack in the
	  current case.

How would you like to have it work? I am agnostic, although the
separate attributes would be easier for the infrastructure.




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux