* [PATCH]Introduce generalized hooks for getting and setting inode secctx.
@ 2008-04-23 16:57 David P. Quigley
[not found] ` <1208969836-8129-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
` (3 more replies)
0 siblings, 4 replies; 8+ messages in thread
From: David P. Quigley @ 2008-04-23 16:57 UTC (permalink / raw)
To: casey-iSGtlc1asvQWG2LlvL+J4A, chrisw-69jw2NvuJkxg9hUCZPvPmw,
sds-+05T5uksL2qpZYMLLGbcSA, jmorris-gx6/JNMH7DfYtjvyW6yDsg,
hch-jcswGhMUV9g, viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn
Cc: selinux-+05T5uksL2qpZYMLLGbcSA,
linux-security-module-u79uwXL29TY76Z2rM5mHXA,
linux-fsdevel-u79uwXL29TY76Z2rM5mHXA,
nfsv4-6DNke4IJHB0gsBAKwltoeQ
This patch set does two things. First it factors the section of vfs_setxattr
that does the real work into a helper function. This allows LSMs the ability
to set the xattrs they need without hitting the permission check inside
vfs_setxattr each time. Second it introduces three new hooks
inode_{get,set}secctx, and inode_notifysecctx.
The first hook retreives all security information the LSM feels is relavent in
the form of a security context. The second hook given this context can sets
both the in-core and on-disk store for the particular inode. The third hook is
used to notify the in-core inode of a change to it's security state.
This is the fourth revision of this patch set which takes into account
concerns by Casey Schaufler, and Christop Hellwig.
fs/xattr.c | 57 ++++++++++++++++++++++++++++++++++-----------
include/linux/security.h | 50 ++++++++++++++++++++++++++++++++++++++++
include/linux/xattr.h | 1 +
security/dummy.c | 17 +++++++++++++
security/security.c | 18 ++++++++++++++
security/selinux/hooks.c | 28 ++++++++++++++++++++++
6 files changed, 157 insertions(+), 14 deletions(-)
^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx.
[not found] ` <1208969836-8129-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
@ 2008-04-23 16:57 ` David P. Quigley
0 siblings, 0 replies; 8+ messages in thread
From: David P. Quigley @ 2008-04-23 16:57 UTC (permalink / raw)
To: casey-iSGtlc1asvQWG2LlvL+J4A, chrisw-69jw2NvuJkxg9hUCZPvPmw,
sds-+05T5uksL2qpZYMLLGbcSA, jmorris-gx6/JNMH7DfYtjvyW6yDsg,
hch-jcswGhMUV9g, viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn
Cc: selinux-+05T5uksL2qpZYMLLGbcSA,
linux-security-module-u79uwXL29TY76Z2rM5mHXA,
linux-fsdevel-u79uwXL29TY76Z2rM5mHXA,
nfsv4-6DNke4IJHB0gsBAKwltoeQ, David P. Quigley
This factors out the part of the vfs_setxattr function that performs the
setting of the xattr and its notification. This is needed so the SELinux
implementation of inode_setsecctx can handle the setting of it's xattr while
maintaining the proper separation of layers.
Signed-off-by: David P. Quigley <dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
---
fs/xattr.c | 57 +++++++++++++++++++++++++++++++++++++------------
include/linux/xattr.h | 1 +
2 files changed, 44 insertions(+), 14 deletions(-)
diff --git a/fs/xattr.c b/fs/xattr.c
index f7062da..dd349ea 100644
--- a/fs/xattr.c
+++ b/fs/xattr.c
@@ -66,22 +66,28 @@ xattr_permission(struct inode *inode, const char *name, int mask)
return permission(inode, mask, NULL);
}
-int
-vfs_setxattr(struct dentry *dentry, char *name, void *value,
- size_t size, int flags)
+/**
+ * __vfs_setxattr_noperm - perform setxattr operation without performing
+ * permission checks.
+ *
+ * @dentry - object to perform setxattr on
+ * @name - xattr name to set
+ * @value - value to set @name to
+ * @size - size of @value
+ * @flags - flags to pass into filesystem operations
+ *
+ * returns the result of the internal setxattr or setsecurity operations.
+ *
+ * This function requires the caller to lock the inode's i_mutex before it
+ * is executed. It also assumes that the caller will make the appropriate
+ * permission checks.
+ */
+int __vfs_setxattr_noperm(struct dentry *dentry, const char *name,
+ const void *value, size_t size, int flags)
{
struct inode *inode = dentry->d_inode;
- int error;
-
- error = xattr_permission(inode, name, MAY_WRITE);
- if (error)
- return error;
-
- mutex_lock(&inode->i_mutex);
- error = security_inode_setxattr(dentry, name, value, size, flags);
- if (error)
- goto out;
- error = -EOPNOTSUPP;
+ int error = -EOPNOTSUPP;
+
if (inode->i_op->setxattr) {
error = inode->i_op->setxattr(dentry, name, value, size, flags);
if (!error) {
@@ -97,6 +103,29 @@ vfs_setxattr(struct dentry *dentry, char *name, void *value,
if (!error)
fsnotify_xattr(dentry);
}
+
+ return error;
+}
+
+
+int
+vfs_setxattr(struct dentry *dentry, char *name, void *value,
+ size_t size, int flags)
+{
+ struct inode *inode = dentry->d_inode;
+ int error;
+
+ error = xattr_permission(inode, name, MAY_WRITE);
+ if (error)
+ return error;
+
+ mutex_lock(&inode->i_mutex);
+ error = security_inode_setxattr(dentry, name, value, size, flags);
+ if (error)
+ goto out;
+
+ error = __vfs_setxattr_noperm(dentry, name, value, size, flags);
+
out:
mutex_unlock(&inode->i_mutex);
return error;
diff --git a/include/linux/xattr.h b/include/linux/xattr.h
index df6b95d..b23d6a8 100644
--- a/include/linux/xattr.h
+++ b/include/linux/xattr.h
@@ -49,6 +49,7 @@ struct xattr_handler {
ssize_t xattr_getsecurity(struct inode *, const char *, void *, size_t);
ssize_t vfs_getxattr(struct dentry *, char *, void *, size_t);
ssize_t vfs_listxattr(struct dentry *d, char *list, size_t size);
+int __vfs_setxattr_noperm(struct dentry *, const char *, const void *, size_t, int);
int vfs_setxattr(struct dentry *, char *, void *, size_t, int);
int vfs_removexattr(struct dentry *, char *);
--
1.5.4.1
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH 2/2] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
2008-04-23 16:57 [PATCH]Introduce generalized hooks for getting and setting inode secctx David P. Quigley
[not found] ` <1208969836-8129-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
@ 2008-04-23 16:57 ` David P. Quigley
2008-04-27 23:33 ` [PATCH]Introduce generalized hooks for getting and setting inode secctx James Morris
2008-04-28 15:02 ` Casey Schaufler
3 siblings, 0 replies; 8+ messages in thread
From: David P. Quigley @ 2008-04-23 16:57 UTC (permalink / raw)
To: casey, chrisw, sds, jmorris, hch, viro
Cc: selinux, linux-security-module, linux-fsdevel, nfsv4,
David P. Quigley
This patch introduces three new hooks. The inode_getsecctx hook is used to get
all relevant information from an LSM about an inode. The inode_setsecctx is
used to set both the in-core and on-disk state for the inode based on a context
derived from inode_getsecctx.The final hook inode_notifysecctx will notify the
LSM of a change for the in-core state of the inode in question. These hooks are
for use in the labeled NFS code and addresses concerns of how to set security
on an inode in a multi-xattr LSM. For historical reasons Stephen Smalley's
explination of the reason for these hooks is pasted below.
Quote Stephen Smalley
inode_setsecctx: Change the security context of an inode. Updates the
incore security context managed by the security module and invokes the
fs code as needed (via __vfs_setxattr_noperm) to update any backing
xattrs that represent the context. Example usage: NFS server invokes
this hook to change the security context in its incore inode and on the
backing filesystem to a value provided by the client on a SETATTR
operation.
inode_notifysecctx: Notify the security module of what the security
context of an inode should be. Initializes the incore security context
managed by the security module for this inode. Example usage: NFS
client invokes this hook to initialize the security context in its
incore inode to the value provided by the server for the file when the
server returned the file's attributes to the client.
Signed-off-by: David P. Quigley <dpquigl@tycho.nsa.gov>
---
include/linux/security.h | 50 ++++++++++++++++++++++++++++++++++++++++++++++
security/dummy.c | 17 +++++++++++++++
security/security.c | 18 ++++++++++++++++
security/selinux/hooks.c | 28 +++++++++++++++++++++++++
4 files changed, 113 insertions(+), 0 deletions(-)
diff --git a/include/linux/security.h b/include/linux/security.h
index fea1f4a..0b1ae00 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -1276,6 +1276,36 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
* audit_rule_init.
* @rule contains the allocated rule
*
+ * @inode_notifysecctx:
+ * Notify the security module of what the security context of an inode
+ * should be. Initializes the incore security context managed by the
+ * security module for this inode. Example usage: NFS client invokes
+ * this hook to initialize the security context in its incore inode to the
+ * value provided by the server for the file when the server returned the
+ * file's attributes to the client.
+ *
+ * @inode we wish to set the security context of.
+ * @ctx contains the string which we wish to set in the inode.
+ * @ctxlen contains the length of @ctx.
+ *
+ * @inode_setsecctx:
+ * Change the security context of an inode. Updates the
+ * incore security context managed by the security module and invokes the
+ * fs code as needed (via __vfs_setxattr_noperm) to update any backing
+ * xattrs that represent the context. Example usage: NFS server invokes
+ * this hook to change the security context in its incore inode and on the
+ * backing filesystem to a value provided by the client on a SETATTR
+ * operation.
+ *
+ * @dentry contains the inode we wish to set the security context of.
+ * @ctx contains the string which we wish to set in the inode.
+ * @ctxlen contains the length of @ctx.
+ *
+ * @inode_getsecctx:
+ * Returns a string containing all relavent security context information
+ * @dentry contains the inode we wish to set the security context of.
+ * @ctx is a pointer to place the allocated security context should be placed.
+ * @ctxlen points to the place to put the length of @ctx.
* This is the main security structure.
*/
struct security_operations {
@@ -1470,6 +1500,10 @@ struct security_operations {
int (*secctx_to_secid)(char *secdata, u32 seclen, u32 *secid);
void (*release_secctx)(char *secdata, u32 seclen);
+ int (*inode_notifysecctx)(struct inode *inode, void *ctx, u32 ctxlen);
+ int (*inode_setsecctx)(struct dentry *dentry, void *ctx, u32 ctxlen);
+ int (*inode_getsecctx)(struct dentry *dentry, void **ctx, u32 *ctxlen);
+
#ifdef CONFIG_SECURITY_NETWORK
int (*unix_stream_connect) (struct socket * sock,
struct socket * other, struct sock * newsk);
@@ -1719,6 +1753,9 @@ int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid);
void security_release_secctx(char *secdata, u32 seclen);
+int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen);
+int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen);
+int security_inode_getsecctx(struct dentry *dentry, void **ctx, u32 *ctxlen);
#else /* CONFIG_SECURITY */
struct security_mnt_opts {
};
@@ -2443,6 +2480,19 @@ static inline int security_secctx_to_secid(char *secdata,
static inline void security_release_secctx(char *secdata, u32 seclen)
{
}
+
+static inline int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen)
+{
+ return -EOPNOTSUPP;
+}
+static inline int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
+{
+ return -EOPNOTSUPP;
+}
+static inline int security_inode_getsecctx(struct dentry *dentry, void **ctx, u32 *ctxlen)
+{
+ return -EOPNOTSUPP;
+}
#endif /* CONFIG_SECURITY */
#ifdef CONFIG_SECURITY_NETWORK
diff --git a/security/dummy.c b/security/dummy.c
index 98d5f96..15d21c8 100644
--- a/security/dummy.c
+++ b/security/dummy.c
@@ -976,6 +976,20 @@ static void dummy_release_secctx(char *secdata, u32 seclen)
{
}
+static int dummy_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen)
+{
+ return -EOPNOTSUPP;
+}
+static int dummy_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
+{
+ return -EOPNOTSUPP;
+}
+
+static int dummy_inode_getsecctx(struct dentry *dentry, void **ctx, u32 *ctxlen)
+{
+ return -EOPNOTSUPP;
+}
+
#ifdef CONFIG_KEYS
static inline int dummy_key_alloc(struct key *key, struct task_struct *ctx,
unsigned long flags)
@@ -1163,6 +1177,9 @@ void security_fixup_ops (struct security_operations *ops)
set_to_dummy_if_null(ops, secid_to_secctx);
set_to_dummy_if_null(ops, secctx_to_secid);
set_to_dummy_if_null(ops, release_secctx);
+ set_to_dummy_if_null(ops, inode_notifysecctx);
+ set_to_dummy_if_null(ops, inode_setsecctx);
+ set_to_dummy_if_null(ops, inode_getsecctx);
#ifdef CONFIG_SECURITY_NETWORK
set_to_dummy_if_null(ops, unix_stream_connect);
set_to_dummy_if_null(ops, unix_may_send);
diff --git a/security/security.c b/security/security.c
index 2e250c7..3accb45 100644
--- a/security/security.c
+++ b/security/security.c
@@ -898,6 +898,24 @@ void security_release_secctx(char *secdata, u32 seclen)
}
EXPORT_SYMBOL(security_release_secctx);
+int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen)
+{
+ return security_ops->inode_notifysecctx(inode, ctx, ctxlen);
+}
+EXPORT_SYMBOL(security_inode_notifysecctx);
+
+int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
+{
+ return security_ops->inode_setsecctx(dentry, ctx, ctxlen);
+}
+EXPORT_SYMBOL(security_inode_setsecctx);
+
+int security_inode_getsecctx(struct dentry *dentry, void **ctx, u32 *ctxlen)
+{
+ return security_ops->inode_getsecctx(dentry, ctx, ctxlen);
+}
+EXPORT_SYMBOL(security_inode_getsecctx);
+
#ifdef CONFIG_SECURITY_NETWORK
int security_unix_stream_connect(struct socket *sock, struct socket *other,
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 1bf2543..58f4bd8 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -75,6 +75,7 @@
#include <linux/string.h>
#include <linux/selinux.h>
#include <linux/mutex.h>
+#include <linux/fsnotify.h>
#include "avc.h"
#include "objsec.h"
@@ -5236,6 +5237,30 @@ static void selinux_release_secctx(char *secdata, u32 seclen)
kfree(secdata);
}
+/*
+ * This hook requires that the inode i_mutex be locked
+ */
+static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen)
+{
+ return selinux_inode_setsecurity(inode, XATTR_SELINUX_SUFFIX, ctx, ctxlen, 0);
+}
+
+/*
+ * This hook requires that the inode i_mutex be locked
+ */
+static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
+{
+ return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0);
+}
+
+static int selinux_inode_getsecctx(struct dentry *dentry, void **ctx, u32 *ctxlen)
+{
+ struct inode *inode = dentry->d_inode;
+
+ *ctxlen = selinux_inode_getsecurity(inode, XATTR_SELINUX_SUFFIX,
+ ctx, true);
+ return *ctxlen;
+}
#ifdef CONFIG_KEYS
static int selinux_key_alloc(struct key *k, struct task_struct *tsk,
@@ -5429,6 +5454,9 @@ static struct security_operations selinux_ops = {
.secid_to_secctx = selinux_secid_to_secctx,
.secctx_to_secid = selinux_secctx_to_secid,
.release_secctx = selinux_release_secctx,
+ .inode_notifysecctx = selinux_inode_notifysecctx,
+ .inode_setsecctx = selinux_inode_setsecctx,
+ .inode_getsecctx = selinux_inode_getsecctx,
.unix_stream_connect = selinux_socket_unix_stream_connect,
.unix_may_send = selinux_socket_unix_may_send,
--
1.5.4.1
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
2008-04-23 16:57 [PATCH]Introduce generalized hooks for getting and setting inode secctx David P. Quigley
[not found] ` <1208969836-8129-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
2008-04-23 16:57 ` [PATCH 2/2] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information David P. Quigley
@ 2008-04-27 23:33 ` James Morris
2008-04-28 6:06 ` Christoph Hellwig
2008-04-28 15:02 ` Casey Schaufler
3 siblings, 1 reply; 8+ messages in thread
From: James Morris @ 2008-04-27 23:33 UTC (permalink / raw)
To: David P. Quigley
Cc: Casey Schaufler, Chris Wright, Stephen Smalley, hch, viro,
selinux, linux-security-module, linux-fsdevel, nfsv4
On Wed, 23 Apr 2008, David P. Quigley wrote:
>
> This patch set does two things. First it factors the section of vfs_setxattr
> that does the real work into a helper function. This allows LSMs the ability
> to set the xattrs they need without hitting the permission check inside
> vfs_setxattr each time. Second it introduces three new hooks
> inode_{get,set}secctx, and inode_notifysecctx.
>
> The first hook retreives all security information the LSM feels is relavent in
> the form of a security context. The second hook given this context can sets
> both the in-core and on-disk store for the particular inode. The third hook is
> used to notify the in-core inode of a change to it's security state.
>
> This is the fourth revision of this patch set which takes into account
> concerns by Casey Schaufler, and Christop Hellwig.
Cristoph, Casey -- any chance of getting ack or nack on this before the
merge window closes?
Thanks.
>
> fs/xattr.c | 57 ++++++++++++++++++++++++++++++++++-----------
> include/linux/security.h | 50 ++++++++++++++++++++++++++++++++++++++++
> include/linux/xattr.h | 1 +
> security/dummy.c | 17 +++++++++++++
> security/security.c | 18 ++++++++++++++
> security/selinux/hooks.c | 28 ++++++++++++++++++++++
> 6 files changed, 157 insertions(+), 14 deletions(-)
>
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
> the words "unsubscribe selinux" without quotes as the message.
>
--
James Morris
<jmorris@namei.org>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
2008-04-27 23:33 ` [PATCH]Introduce generalized hooks for getting and setting inode secctx James Morris
@ 2008-04-28 6:06 ` Christoph Hellwig
2008-04-28 15:04 ` James Morris
0 siblings, 1 reply; 8+ messages in thread
From: Christoph Hellwig @ 2008-04-28 6:06 UTC (permalink / raw)
To: James Morris
Cc: David P. Quigley, Casey Schaufler, Chris Wright, Stephen Smalley,
hch, viro, selinux, linux-security-module, linux-fsdevel, nfsv4
On Mon, Apr 28, 2008 at 09:33:22AM +1000, James Morris wrote:
> Cristoph, Casey -- any chance of getting ack or nack on this before the
> merge window closes?
No concernes about this patch, but as usual strong objections against
introducing it without the actual user.
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
2008-04-23 16:57 [PATCH]Introduce generalized hooks for getting and setting inode secctx David P. Quigley
` (2 preceding siblings ...)
2008-04-27 23:33 ` [PATCH]Introduce generalized hooks for getting and setting inode secctx James Morris
@ 2008-04-28 15:02 ` Casey Schaufler
3 siblings, 0 replies; 8+ messages in thread
From: Casey Schaufler @ 2008-04-28 15:02 UTC (permalink / raw)
To: David P. Quigley, casey, chrisw, sds, jmorris, hch, viro
Cc: selinux, linux-security-module, linux-fsdevel, nfsv4
--- "David P. Quigley" <dpquigl@tycho.nsa.gov> wrote:
>
> This patch set does two things. First it factors the section of vfs_setxattr
> that does the real work into a helper function. This allows LSMs the ability
> to set the xattrs they need without hitting the permission check inside
> vfs_setxattr each time. Second it introduces three new hooks
> inode_{get,set}secctx, and inode_notifysecctx.
>
> The first hook retreives all security information the LSM feels is relavent
> in
> the form of a security context. The second hook given this context can sets
> both the in-core and on-disk store for the particular inode. The third hook
> is
> used to notify the in-core inode of a change to it's security state.
>
> This is the fourth revision of this patch set which takes into account
> concerns by Casey Schaufler, and Christop Hellwig.
>
> fs/xattr.c | 57 ++++++++++++++++++++++++++++++++++-----------
> include/linux/security.h | 50 ++++++++++++++++++++++++++++++++++++++++
> include/linux/xattr.h | 1 +
> security/dummy.c | 17 +++++++++++++
> security/security.c | 18 ++++++++++++++
> security/selinux/hooks.c | 28 ++++++++++++++++++++++
> 6 files changed, 157 insertions(+), 14 deletions(-)
These patches don't appear to cause any harm, but I remain
unconvinced regarding the approach you're taking.
Casey Schaufler
casey@schaufler-ca.com
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
2008-04-28 6:06 ` Christoph Hellwig
@ 2008-04-28 15:04 ` James Morris
2008-04-28 15:10 ` Dave Quigley
0 siblings, 1 reply; 8+ messages in thread
From: James Morris @ 2008-04-28 15:04 UTC (permalink / raw)
To: Christoph Hellwig
Cc: nfsv4, Chris Wright, linux-fsdevel, linux-security-module, viro,
selinux, Casey Schaufler, Stephen Smalley
On Mon, 28 Apr 2008, Christoph Hellwig wrote:
> On Mon, Apr 28, 2008 at 09:33:22AM +1000, James Morris wrote:
> > Cristoph, Casey -- any chance of getting ack or nack on this before the
> > merge window closes?
>
> No concernes about this patch, but as usual strong objections against
> introducing it without the actual user.
Ok, we might put them into a labeled-nfs tree rather than pushing them to
mainline at this stage.
--
James Morris
<jmorris@namei.org>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH]Introduce generalized hooks for getting and setting inode secctx.
2008-04-28 15:04 ` James Morris
@ 2008-04-28 15:10 ` Dave Quigley
0 siblings, 0 replies; 8+ messages in thread
From: Dave Quigley @ 2008-04-28 15:10 UTC (permalink / raw)
To: James Morris
Cc: Christoph Hellwig, Casey Schaufler, Chris Wright, Stephen Smalley,
viro, selinux, linux-security-module, linux-fsdevel, nfsv4
My main goal here is to get labeled-nfs in to mainline in chunks instead
of throwing massive 25+ patch sets at you later on. People are far less
likely to review patch sets when they are massive so I figured a series
of smaller chunks would attract more attention. I have no problem
working off of a labeled-nfs tree with this patches applied to it but
I'd like to avoid getting stuff reacked every time I post it.
Dave
On Tue, 2008-04-29 at 01:04 +1000, James Morris wrote:
> On Mon, 28 Apr 2008, Christoph Hellwig wrote:
>
> > On Mon, Apr 28, 2008 at 09:33:22AM +1000, James Morris wrote:
> > > Cristoph, Casey -- any chance of getting ack or nack on this before the
> > > merge window closes?
> >
> > No concernes about this patch, but as usual strong objections against
> > introducing it without the actual user.
>
> Ok, we might put them into a labeled-nfs tree rather than pushing them to
> mainline at this stage.
>
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2008-04-28 15:13 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-04-23 16:57 [PATCH]Introduce generalized hooks for getting and setting inode secctx David P. Quigley
[not found] ` <1208969836-8129-1-git-send-email-dpquigl-+05T5uksL2qpZYMLLGbcSA@public.gmane.org>
2008-04-23 16:57 ` [PATCH 1/2] VFS: Factor out part of vfs_setxattr so it can be called from the SELinux hook for inode_setsecctx David P. Quigley
2008-04-23 16:57 ` [PATCH 2/2] LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information David P. Quigley
2008-04-27 23:33 ` [PATCH]Introduce generalized hooks for getting and setting inode secctx James Morris
2008-04-28 6:06 ` Christoph Hellwig
2008-04-28 15:04 ` James Morris
2008-04-28 15:10 ` Dave Quigley
2008-04-28 15:02 ` Casey Schaufler
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).