[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fc60313a-67b3-4889-b1a6-ba2673b1a67d@schaufler-ca.com>
Date: Tue, 17 Dec 2024 13:29:15 -0800
From: Casey Schaufler <casey@...aufler-ca.com>
To: Song Liu <song@...nel.org>, linux-fsdevel@...r.kernel.org,
linux-integrity@...r.kernel.org, linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org
Cc: roberto.sassu@...wei.com, dmitry.kasatkin@...il.com,
eric.snowberg@...cle.com, paul@...l-moore.com, jmorris@...ei.org,
serge@...lyn.com, kernel-team@...a.com, brauner@...nel.org, jack@...e.cz,
viro@...iv.linux.org.uk, Casey Schaufler <casey@...aufler-ca.com>
Subject: Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
On 12/17/2024 12:25 PM, Song Liu wrote:
> While reading and testing LSM code, I found IMA/EVM consume per inode
> storage even when they are not in use. Add options to diable them in
> kernel command line. The logic and syntax is mostly borrowed from an
> old serious [1].
Why not omit ima and evm from the lsm= parameter?
>
> [1] https://lore.kernel.org/lkml/cover.1398259638.git.d.kasatkin@samsung.com/
>
> Song Liu (2):
> ima: Add kernel parameter to disable IMA
> evm: Add kernel parameter to disable EVM
>
> security/integrity/evm/evm.h | 6 ++++++
> security/integrity/evm/evm_main.c | 22 ++++++++++++++--------
> security/integrity/evm/evm_secfs.c | 3 ++-
> security/integrity/ima/ima_main.c | 13 +++++++++++++
> 4 files changed, 35 insertions(+), 9 deletions(-)
>
> --
> 2.43.5
>
Powered by blists - more mailing lists