From: Casey Schaufler <casey@schaufler-ca.com>
To: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Cc: keescook@chromium.org, jmorris@namei.org,
linux-security-module@vger.kernel.org,
john.johansen@canonical.com, selinux@tycho.nsa.gov,
Casey Schaufler <casey@schaufler-ca.com>
Subject: Re: [PATCH v5.1] LSM: Multiple concurrent LSMs
Date: Fri, 26 Oct 2012 09:52:56 -0700 [thread overview]
Message-ID: <508ABFE8.7070708@schaufler-ca.com> (raw)
In-Reply-To: <201210270127.BJF52683.QtMFVOFOLJSFOH@I-love.SAKURA.ne.jp>
On 10/26/2012 9:27 AM, Tetsuo Handa wrote:
> This is what I think we can optimize.
I think that I have worked out a list based scheme
that will address the performance concerns. I hope to
have a version ready in the next few days. There is a
lot of typing involved.
> Only compile tested. This may not boot.
>
> Calls to common cap functions (e.g. cap_bprm_set_creds()) are not yet
> eliminated from each LSM modules. Common cap functions can be now eliminated from
> each LSM modules because these common cap functions are called from security/security.c
> (though I think I've made several mistakes while optimizing).
I don't know that we can do that in every case, but I'll look.
> Revived register_security() so that individual LSM modules can determine
> whether that module is listed on the activation list or not; and can take
> appropriate action (probably call panic()) if registration failed when that
> module is listed on the activation list.
>
> Updated register_security() to allow control of LSM hook call ordering.
> Revived CONFIG_DEFAULT_SECURITY so that Linux distributors can specify
> list of LSM modules which should be enabled by default (e.g. "selinux",
> "apparmor,yama") while compiling other LSM modules which are not enabled
> unless explicitly specified by security= kernel boot parameter.
I will definitely try to incorporate this.
> What do you think?
I am going to hold off on specific comments until I've decided
on the merits of my list based scheme, which will eliminate the
composer_ops array.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2012-10-26 16:53 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-10-19 20:07 [PATCH v5] LSM: Multiple concurrent LSMs Casey Schaufler
[not found] ` <CAGXu5jJKWZMJbX+kQZb1Qe64EjuZMEubCgtiV4COXWo9=hqPiQ@mail.gmail.com>
2012-10-19 21:39 ` Casey Schaufler
[not found] ` <201210242225.EFC43782.FLFQMHOOVFJOSt@I-love.SAKURA.ne.jp>
2012-10-24 18:32 ` Casey Schaufler
[not found] ` <201210250650.HAJ18213.FMtVQOFHJOLOFS@I-love.SAKURA.ne.jp>
[not found] ` <CAGXu5jKdLnDCpDzteY1v3aStAxAezdOykKUN1gDt69BZcBvwEA@mail.gmail.com>
[not found] ` <201210252116.DBJ56717.tVFFLJOOOSQHFM@I-love.SAKURA.ne.jp>
[not found] ` <201210252128.EGC12919.OFtFSMHQOOVLFJ@I-love.SAKURA.ne.jp>
[not found] ` <201210270127.BJF52683.QtMFVOFOLJSFOH@I-love.SAKURA.ne.jp>
2012-10-26 16:52 ` Casey Schaufler [this message]
[not found] ` <201210211206.DEI34330.FLFQMtFOOSJOHV@I-love.SAKURA.ne.jp>
2012-10-22 17:16 ` Casey Schaufler
[not found] ` <201210211337.DAF60411.FMHOVSJOQOFtFL@I-love.SAKURA.ne.jp>
2012-10-22 17:47 ` Casey Schaufler
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=508ABFE8.7070708@schaufler-ca.com \
--to=casey@schaufler-ca.com \
--cc=jmorris@namei.org \
--cc=john.johansen@canonical.com \
--cc=keescook@chromium.org \
--cc=linux-security-module@vger.kernel.org \
--cc=penguin-kernel@I-love.SAKURA.ne.jp \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.