LKML Archive on lore.kernel.org help / color / mirror / Atom feed
From: Kentaro Takeda <takedakn@nttdata.co.jp> To: akpm@linux-foundation.org Cc: haradats@nttdata.co.jp, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, penguin-kernel@I-love.SAKURA.ne.jp Subject: Re: [TOMOYO #12 (2.6.28-rc2-mm1) 05/11] Memory and pathname management functions. Date: Tue, 11 Nov 2008 16:32:21 +0900 [thread overview] Message-ID: <49193505.20905@nttdata.co.jp> (raw) In-Reply-To: <20081110224609.4906d89f.akpm@linux-foundation.org> Andrew Morton wrote: >> Are you saying "make the callers of tmy_alloc() tolerable with >> uninitialized memory"? > > Well. That would be a desirable objective. I can understand the > reasons for taking the easy way out. Given that Tomoyo doesn't seem to > ever free memory again, one hopes that this function doesn't get called > a lot, so the performance impact of zeroing out all that memory should > be negligible. > > I think. Maybe I misinterpreted tmy_alloc(), and perhaps it _is_ > called frequently? It is called whenever open() / mkdir() / unlink() etc. are called, but not when read() / write() are called. Frequency of open() / mkdir() / unlink() etc. are much lower than frequency of read() / write(). Main cost of pathname based access control is strcmp()ing (or even regexp()ing) over the list of strings, therefore zeroing buffer for pathname is relatively negligible. >>>> Creating pseudo files for each variables is fine, though I don't see >>>> advantage by changing from >>>> "echo Shared: 16777216 > /sys/kernel/security/tomoyo/meminfo" to >>>> "echo 16777216 > /sys/kernel/security/tomoyo/quota/shared_memory". >>> Well for starters, the existing interface is ugly as sin and will make >>> kernel developers unhappy. >>> >>> There is a pretty strict one-value-per-file rule in sysfs files, and >>> "multiple tagged values in one file" violates that a lot. >> /sys/kernel/security/ is not sysfs but securityfs. >> Does "one-value-per-file rule" also apply to securityfs? > > It should apply. It's not so much a matter of rules and regulations. > One needs to look at the underlying _reasons_ why those rules came > about. We got ourselves into a sticky mess with procfs with all sorts > of ad-hoc data presentation and input formatting. It's inconsistent, > complex, makes tool writing harder, etc. > > So we recognised our mistakes and when sysfs (otherwise known as procfs > V2 :)) came about we decided that sysfs files should not make the same > mistakes. > > So, logically, that thinking should apply to all new pseudo-fs files. > Even, in fact, ones which are in /proc! Well, regarding memory usage, it is easy to follow "one-value-per-file rule". But regarding policy information (which is managed as lists), "one-value-per-file rule" is not suitable. I think none of SELinux, SMACK, AppArmor, TOMOYO create "one pseudo file for one value". This /sys/kernel/security/tomoyo/ interface is used by only TOMOYO's management programs, and not by generic programs. Regards,
next prev parent reply other threads:[~2008-11-11 7:32 UTC|newest] Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top 2008-11-04 6:08 [TOMOYO #12 (2.6.28-rc2-mm1) 00/11] TOMOYO Linux Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 01/11] Introduce security_path_clear() hook Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 02/11] Add in_execve flag into task_struct Kentaro Takeda 2008-11-05 23:12 ` Andrew Morton 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 03/11] Singly linked list implementation Kentaro Takeda 2008-11-05 23:12 ` Andrew Morton 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 04/11] Introduce d_realpath() Kentaro Takeda 2008-11-05 23:12 ` Andrew Morton 2008-11-17 6:52 ` Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 05/11] Memory and pathname management functions Kentaro Takeda 2008-11-05 23:12 ` Andrew Morton 2008-11-10 10:34 ` Kentaro Takeda 2008-11-11 5:04 ` Andrew Morton 2008-11-11 6:34 ` Kentaro Takeda 2008-11-11 6:46 ` Andrew Morton 2008-11-11 7:32 ` Kentaro Takeda [this message] 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 06/11] Common functions for TOMOYO Linux Kentaro Takeda 2008-11-05 23:12 ` Andrew Morton 2008-11-06 21:46 ` [TOMOYO #12 (2.6.28-rc2-mm1) 06/11] Common functions for TOMOYOLinux Tetsuo Handa 2008-11-08 16:38 ` Tetsuo Handa 2008-11-10 0:41 ` Serge E. Hallyn 2008-11-10 2:24 ` Tetsuo Handa 2008-11-10 2:52 ` Serge E. Hallyn 2008-11-10 3:30 ` Tetsuo Handa 2008-11-10 14:00 ` Serge E. Hallyn 2008-11-10 10:35 ` [TOMOYO #12 (2.6.28-rc2-mm1) 06/11] Common functions for TOMOYO Linux Kentaro Takeda 2008-11-14 9:22 ` Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 07/11] File operation restriction part Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 08/11] Domain transition handler Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 09/11] LSM adapter functions Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 10/11] Kconfig and Makefile Kentaro Takeda 2008-11-04 6:08 ` [TOMOYO #12 (2.6.28-rc2-mm1) 11/11] MAINTAINERS info Kentaro Takeda
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=49193505.20905@nttdata.co.jp \ --to=takedakn@nttdata.co.jp \ --cc=akpm@linux-foundation.org \ --cc=haradats@nttdata.co.jp \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=penguin-kernel@I-love.SAKURA.ne.jp \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).