lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Mar 2016 17:24:45 +0100 From: Andreas Gruenbacher <agruenba@...hat.com> To: Christoph Hellwig <hch@...radead.org> Cc: Alexander Viro <viro@...iv.linux.org.uk>, "J. Bruce Fields" <bfields@...ldses.org>, Linux NFS Mailing List <linux-nfs@...r.kernel.org>, "Theodore Ts'o" <tytso@....edu>, linux-cifs@...r.kernel.org, Linux API <linux-api@...r.kernel.org>, Trond Myklebust <trond.myklebust@...marydata.com>, LKML <linux-kernel@...r.kernel.org>, XFS Developers <xfs@....sgi.com>, Andreas Dilger <adilger.kernel@...ger.ca>, linux-fsdevel <linux-fsdevel@...r.kernel.org>, Jeff Layton <jlayton@...chiereds.net>, linux-ext4 <linux-ext4@...r.kernel.org>, Anna Schumaker <anna.schumaker@...app.com>, jaegeuk@...nel.org, chao2.yu@...sung.com Subject: Re: [PATCH v18 11/22] vfs: Cache base_acl objects in inodes On Fri, Mar 11, 2016 at 3:07 PM, Christoph Hellwig <hch@...radead.org> wrote: > On Mon, Feb 29, 2016 at 09:17:16AM +0100, Andreas Gruenbacher wrote: >> POSIX ACLs and richacls are both objects allocated by kmalloc() with a >> reference count which are freed by kfree_rcu(). An inode can either >> cache an access and a default POSIX ACL, or a richacl (richacls do not >> have default acls). To allow an inode to cache either of the two kinds >> of acls, introduce a new base_acl type and convert i_acl and >> i_default_acl to that type. In most cases, the vfs then doesn't care which >> kind of acl an inode caches (if any). > > This base_acl object is pointless. I've asked in the past to have > a proper container for the ACLs in common code, but a union > of a refcount and a rcu head doesn't really fit that category. POSIX ACLs and RichACLs are different objects, with different members and different algorithms operating on them. The only commonality is that they are both kmalloc()ed, reference counted objects, and when an inode is destroyed, both kinds of ACLs can be put in the same way, avoiding an unnecessary if. What kind of common-code container beyond that are you still dreaming about? Thanks, Andreas
Powered by blists - more mailing lists