linux-security-module.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* evm_inode_init_security and module stacking
@ 2019-01-18  0:47 Casey Schaufler
  2019-01-18  2:31 ` Mimi Zohar
  0 siblings, 1 reply; 6+ messages in thread
From: Casey Schaufler @ 2019-01-18  0:47 UTC (permalink / raw)
  To: linux-integrity, Mimi Zohar; +Cc: LSM, Casey Schaufler

security_inode_init_security() currently calls at most one
of selinux_inode_init_security() and smack_inode_init_security().
It then sends the result to evm_inode_init_security to create
the security.evm attribute. This isn't going to work on a system
that has both SELinux and Smack.

I see two options:
	- create security.evm with the information from all
	  security modules that provide inode_init_security hooks
	- create a separate attribute for each module,
	  security.evm-selinux and security.evm-smack in the
	  current case.

How would you like to have it work? I am agnostic, although the
separate attributes would be easier for the infrastructure.


^ permalink raw reply	[flat|nested] 6+ messages in thread
* evm_inode_init_security and module stacking
@ 2017-08-19  0:14 Casey Schaufler
  0 siblings, 0 replies; 6+ messages in thread
From: Casey Schaufler @ 2017-08-19  0:14 UTC (permalink / raw)
  To: linux-security-module

I'm looking at the code in evm_inode_init_security
and it looks like there's no way it could be taught
to deal with there being more than one security
attribute being controlled. This is because the
EVM data is stored in XATTR_EVM_SUFFIX, for which
there is only one per file. On a system with both
SELinux and Smack, there isn't a place to put the
EVM attribute for whichever module comes second.

Or, as has often been the case, am I missing something?

Thank you.

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-01-20 18:56 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-01-18  0:47 evm_inode_init_security and module stacking Casey Schaufler
2019-01-18  2:31 ` Mimi Zohar
2019-01-18 18:49   ` Casey Schaufler
2019-01-20 16:42     ` Mimi Zohar
2019-01-20 18:54       ` Casey Schaufler
  -- strict thread matches above, loose matches on Subject: below --
2017-08-19  0:14 Casey Schaufler

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).