Quoting Andrew Morgan ([EMAIL PROTECTED]):
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Serge E. Hallyn wrote:
> >> Yes.  I'd thought about adding a security_ops->inode_change() or
> >> somesuch hook, but there were two reasons I didn't.  First, this
> >> should be done whether or not the capability module is loaded in
> >> this kernel.  If we're testing a kernel with only the dummy
> 
> I'm not sure I know what the right behavior is in this case. A system
> administration argument can be made for both behaviors.
> 
> >> module, we still want this to happen.  Second, only the capability
> >> module needs this so far.  If more modules end up needing this then
> 
> Yes, it appears that this is currently the case. However, there has to
> be a first user for everything! :-)
> 
> >> we can make it more generic.  But note that most security modules
> >> will likely label data the way selinux does, for classification for
> >> access control, rather than for granting privilege to unprivileged
> >> processes.
> 
> My main concern is that when this change is merged into the kernel, we
> are likely to receive more (negative) feedback for a change that cannot
> be compiled out... Since the security module infrastructure was created
> exactly to abstract this sort of detail, and you have been able to add
> support so far without adding code outside the security/ directory, it
> feels, to me, like the 'right thing' to fold this change into the LSM
> framework too.

Ok, it'll probably be a couple of days before I can look at this again,
so maybe a cleaner way to make it more generic will come to me in the
mean time.

Meanwhile, any chance you would get some time to implement the cap_bset
vs fcaps change you wanted?  I'd have to look at my checklist to be
sure, but I think that, a version of this patch, and then somehow
addressing James' request for config-able forward compability of
capabilities may finish off the feature request list (as it currently
stands at least).

thanks,
-serge
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to