From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 76AA6C4320A for ; Sun, 25 Jul 2021 22:52:34 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5B1B960249 for ; Sun, 25 Jul 2021 22:52:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229956AbhGYWLt (ORCPT ); Sun, 25 Jul 2021 18:11:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44052 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229531AbhGYWLs (ORCPT ); Sun, 25 Jul 2021 18:11:48 -0400 Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [IPv6:2a0a:51c0:0:12e:520::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB856C061757; Sun, 25 Jul 2021 15:52:17 -0700 (PDT) Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1m7myW-0004UM-SO; Mon, 26 Jul 2021 00:52:01 +0200 Date: Mon, 26 Jul 2021 00:52:00 +0200 From: Florian Westphal To: Casey Schaufler Cc: Florian Westphal , Paul Moore , Paolo Abeni , netdev@vger.kernel.org, "David S. Miller" , Jakub Kicinski , Eric Dumazet , linux-security-module@vger.kernel.org, selinux@vger.kernel.org Subject: Re: [PATCH RFC 0/9] sk_buff: optimize layout for GRO Message-ID: <20210725225200.GL9904@breakpoint.cc> References: <1252ad17-3460-5e6a-8f0d-05d91a1a7b96@schaufler-ca.com> <2e9e57f0-98f9-b64d-fd82-aecef84835c5@schaufler-ca.com> <20210724185141.GJ9904@breakpoint.cc> <20210725162528.GK9904@breakpoint.cc> <75982e4e-f6b1-ade2-311f-1532254e2764@schaufler-ca.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <75982e4e-f6b1-ade2-311f-1532254e2764@schaufler-ca.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Casey Schaufler wrote: > RedHat and android use SELinux and will want this. Ubuntu doesn't > yet, but netfilter in in the AppArmor task list. Tizen definitely > uses it with Smack. The notion that security modules are only used > in fringe cases is antiquated. I was not talking about LSM in general, I was referring to the extended info that Paul mentioned. If thats indeed going to be used on every distro then skb extensions are not suitable for this, it would result in extr akmalloc for every skb. > > It certainly makes more sense to me than doing lookups > > in a hashtable based on a ID > > Agreed. The data burden required to support a hash scheme > for the security module stacking case is staggering. It depends on the type of data (and its lifetime). I suspect you have something that is more like skb->dev/dst, i.e. reference to object that persists after the skb is free'd.