[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1584934.WkKQGAFadF@sifl>
Date: Wed, 14 Jan 2015 14:36:46 -0500
From: Paul Moore <pmoore@...hat.com>
To: Mimi Zohar <zohar@...ux.vnet.ibm.com>
Cc: Rob Landley <rob@...dley.net>,
Josh Boyer <jwboyer@...oraproject.org>,
initramfs <initramfs@...r.kernel.org>,
Al Viro <viro@...iv.linux.org.uk>,
linux-ima-devel@...ts.sourceforge.net,
linux-security-module <linux-security-module@...r.kernel.org>,
linux-kernel <linux-kernel@...r.kernel.org>,
Fionnuala Gunter <fin@...ux.vnet.ibm.com>,
"casey.schaufler" <casey.schaufler@...el.com>,
selinux@...ho.nsa.gov
Subject: Re: [RFC][PATCH 6/9] gen_initramfs_list.sh: include xattrs
On Tuesday, January 13, 2015 10:23:23 PM Mimi Zohar wrote:
> I would assume only 'security.evm' is not portable as it attempts to
> tightly bind the file metadata to the file data. Casey? Paul?
[NOTE: Added the SELinux mailing list to the CC line.]
The SELinux xattr should be portable assuming the security label's semantics
remain constant across the different security policies. If the label is
completely unknown SELinux should handle it correctly, it will be treated as
unlabeled until a module is loaded which defines the label.
Although, this is just for initramfs, yes? If so, I'm not sure this matters
that much from a practical point of view; Stephen or someone else from the
SELinux list may have some thoughts on this.
--
paul moore
security @ redhat
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists