On Thu, Oct 17, 2002 at 10:20:21PM +0200, Russell Coker wrote: > Now if every SE system call was to be a full Linux system call then LANANA > would be involved in the discussions every time that a new SE call was added, > which would not be desired by the SE Linux people or the LANANA people. So > this means having a switch statement for the different SE calls. Then stabilize your interface before going into production use. Why should selinux (or lsm) get special treatment? > Do we expect that SE Linux or other security system calls will be such a > performance bottleneck that an extra switch or two will hurt? It's not the performance issues, it's about getting a proper syscall table instead of deep nesting without knowing what it actually does. Look at e.g. the horrors of doing a proper 32->64bit translation of those syscalls. > Also it would mean that developmental projects would be more difficult. Yes. In general you should avoid adding syscalls anyway. If we wanted to make it easy we'd have created loadable syscalls from the very beginning. _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Thu Oct 17 2002 - 13:28:22 PDT