[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130526120251.GA32729@thunk.org>
Date: Sun, 26 May 2013 08:02:51 -0400
From: Theodore Ts'o <tytso@....edu>
To: Casey Schaufler <casey@...aufler-ca.com>
Cc: Al Viro <viro@...IV.linux.org.uk>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Eric Paris <eparis@...hat.com>,
James Morris <james.l.morris@...cle.com>
Subject: Re: Stupid VFS name lookup interface..
On Sat, May 25, 2013 at 11:33:46AM -0700, Casey Schaufler wrote:
> Now I'll put on my Smack maintainer hat. Performance improvement is
> always welcome, but I would rather see attention to performance of
> the LSM architecture than SELinux specific hacks. The LSM blob
> pointer scheme is there so that you (Linus) don't have to see the
> dreadful things that we security people are doing. Is it time to
> get past that level of disassociation? Or, and I really hate asking
> this, have you fallen into the SELinux camp?
What part of the LSM architecture are you proposing be optimized? The
LSM layer is pretty thin, partially because the various different
security approaches don't agree with each other on fairly fundamental
issues. What sort of optimization opportunities you are suggesting?
Are there changes that can be made that all of the major security LSM
maintainers would actually agree with?
I've been re-reading the thread on LKML which was spawned when SMACK
was proposed for upstream inclusion:
http://thread.gmane.org/gmane.linux.kernel/585903/focus=586412
Have any of the arguments over the proper security models changed over
or have gotten resolved over the past six years, while I haven't been
looking?
- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists