[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080814132455.GE6469@mit.edu>
Date: Thu, 14 Aug 2008 09:24:55 -0400
From: Theodore Tso <tytso@....edu>
To: tvrtko.ursulin@...hos.com
Cc: alan@...rguk.ukuu.org.uk, andi@...stfloor.org,
Arjan van de Ven <arjan@...radead.org>,
Eric Paris <eparis@...hat.com>, hch@...radead.org,
linux-kernel@...r.kernel.org, malware-list@...ts.printk.net,
malware-list-bounces@...sg.printk.net, peterz@...radead.org,
viro@...IV.linux.org.uk
Subject: Re: [malware-list] TALPA - a threat model? well sorta.
On Thu, Aug 14, 2008 at 10:30:56AM +0100, tvrtko.ursulin@...hos.com wrote:
> The thing is the idea never was for clean-dirty "database" to be
> persistent but to have the same lifetime as the inode (in memory one). And
> once the cache/database gets invalidated re-scanning happens on-demand so
> the 5TB problem does not exist. Concerns about multiple clients where
> every has a different versioning scheme are also not relevant with the
> proposed versioning scheme (see my reply to Arjan).
So in essence, what I hear you saying is that all AV products want to
work in a mode where the moment the inode falls out of the inode
cache, and we lose the "clean" bit, when the inode is brought back
into the cache, it will be scanned again. That is, the "clean" bit is
never persistent, and never needs to be stored in memory.
That seems fair; if it turns out there is an AV product that wants to
optimize this a bit further, as long as we provide a persistent inode
version/generation number, they can always do their own persistent
database in userspace.
- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists