Stephen Smalley wrote: >> It is if I have to maintain a special pieces of code for each possible LSM. >> One piece for SELinux, one piece for AppArmour, one piece for Smack, one piece >> for Casey's security system. That sounds like a pain. >> > All your code has to do is invoke a function provided by libselinux. If > at some later time a liblsm is introduced that provides a common > front-end to a libselinux, libsmack, ..., then you can use that. But it > doesn't exist today. But it all just becomes a simple function call > regardless. > libapparmor exists. It only had one API, and now it has 2, but just 2 versions on the same concept (change_hat and change_profile). This is the API for change_hat http://man-wiki.net/index.php/2:change_hat What does the corresponding API in SELinux look like? Crispin -- Crispin Cowan, Ph.D. http://crispincowan.com/~crispin CEO, Mercenary Linux http://mercenarylinux.com/ Itanium. Vista. GPLv3. Complexity at work -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- Follow-Ups:
- References:
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <[email protected]>
- [PATCH 00/28] Permit filesystem local caching [try #2]
- From: David Howells <[email protected]>
- [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: David Howells <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- From: Stephen Smalley <[email protected]>
- Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- Prev by Date: Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- Next by Date: Re: [PATCH 1/3] ps3: vuart: fix error path locking
- Previous by thread: Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- Next by thread: Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]
- Index(es):