lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 15 Sep 2007 08:51:39 -0700 From: "Ulrich Drepper" <drepper@...il.com> To: "David Howells" <dhowells@...hat.com> Cc: viro@....linux.org.uk, hch@...radead.org, torvalds@...l.org, linux-kernel@...r.kernel.org Subject: Re: Credentials test patch In sys_faccessat you temporarily allocate a cred object which is discarded in the end. With a few more macro definitions you could create a dup_cred variant which initialized an automatic variable of type struct cred. This way the kmalloc/kfree pair would fall away. access is actually used frequently. For instance, ld.so uses it on every startup as a quicker possibility to check for a file which usually doesn't exist. So, speeding up access has some small effect on performance. The resulting code might actually reduce the kernel size a bit due to all the checks and calls which go away. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists