From: David Howells <dhowells@redhat.com>
To: Andrew Morton <akpm@osdl.org>
Cc: arjanv@redhat.com, Christoph Hellwig <hch@infradead.org>,
viro@parcelfarce.linux.theplanet.co.uk,
linux-kernel@vger.kernel.org
Subject: Re: Where's the key management patchset at?
Date: Tue, 07 Sep 2004 14:21:23 +0100 [thread overview]
Message-ID: <22970.1094563283@redhat.com> (raw)
In-Reply-To: <20040907033255.78128ebd.akpm@osdl.org>
> So
>
> a) Why should we merge keyfs?
A bunch of people out there (viro, hch, jamesm for example) think they want
it, and in fact think that there shouldn't be any other interface. I've also
had emails of random people saying there absolutely has to be a filesystem
interface so they can as administrators go and rummage around in the key
database, though I suspect they're going to be disappointed in keyfs as it'll
only let them see those keys they've a right to do something with.
I'd like to dispense with keyfs. The semantics of the key database don't map
to the VFS, hence the fact we have to present the key database as a flat
directory and why I have to make use of a bunch of undocumented esoteric fs
ops.
I'd also like keyfs to remain optional at best. It's a large chunk of code
that is completely unnecessary, and on an embedded system it's something you'd
probably want to do without. It could be made a module, I suppose, to be
loaded on demand.
> b) Are people likely to use the APIs frequently enough for its
> performance to matter?
Now that's harder to judge...
Performance is going to matter very much from the point of view of a
filesystem that wants a key. It's probably going to be checking for a key on
every open call. However, that's mostly taken care of by the internal kernel
API, and the userspace interface has little impact upon that, except where the
request-key callout is concerned.
Performance may also matter from the point of view of userspace service
programs (AFS requires a few of these), though in this case you should only
need to do one lookup per invocation of the program.
So, for most userspace operations wrt to keys, performance isn't a problem;
however, for certain systems, size _is_ a problem and in those cases keyfs is
a liability.
And, before anyone asks, yes, the problem of kernel size is something I've had
to contend with.
David
next parent reply other threads:[~2004-09-07 13:22 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20040907031856.58f33b99.akpm@osdl.org>
[not found] ` <20040904032913.441631e6.akpm@osdl.org>
[not found] ` <20040904022656.31447b51.akpm@osdl.org>
[not found] ` <20040903224513.0154c1d3.akpm@osdl.org>
[not found] ` <24752.1094234169@redhat.com>
[not found] ` <12766.1094289316@redhat.com>
[not found] ` <14279.1094293508@redhat.com>
[not found] ` <13781.1094551789@redhat.com>
[not found] ` <14622.1094552807@redhat.com>
[not found] ` <20040907033255.78128ebd.akpm@osdl.org>
2004-09-07 13:21 ` David Howells [this message]
[not found] ` <413DED11.5030700@myrealbox.com>
2004-09-07 18:30 ` Where's the key management patchset at? David Howells
2004-09-11 4:58 ` Andy Lutomirski
2004-09-07 20:56 ` Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=22970.1094563283@redhat.com \
--to=dhowells@redhat.com \
--cc=akpm@osdl.org \
--cc=arjanv@redhat.com \
--cc=hch@infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=viro@parcelfarce.linux.theplanet.co.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox