UNSUBSCRIBE

From: Gilad Golan (giladg@private)
Date: Tue Nov 23 2004 - 11:27:54 PST


-----Original Message-----
From: linux-security-module-bounces@private
[mailto:linux-security-module-bounces@private] On Behalf Of Serge
Hallyn
Sent: Tuesday, November 23, 2004 12:31 PM
To: James Morris; Stephen Smalley; Chris Wright
Cc: LSM Mailing List
Subject: [RFC] [PATCH] Stacking through chaining (v3)

Attached is the next set of patches to implement stacking through
chaining.  The kernel object security pointers are now always
hlist_heads.  However when stacker is not compiled in,
security_{set,get,del}_value become macros which do not search the hlist
at all.  This does make for better performance than simply always using
the functions in security/security.c. (I can send lmbench results for
that setup if anyone likes), but is just as fast as (within stdev,
faster than :) the last version which redefined the security field
depending on CONFIG_SECURITY_STACKER.

The attached chain3-2 shows the results for this patched kernel
(rc2-bk4) with stacker compiled out and selinux+capabilities compiled
in.  nostack is the old results from rc1-bk12 with no stacking patch.

The patches were applied in the following order:
lsm-chain.patch
seclvl-stack.patch
selinux-stack.patch
stacker.patch
stacker-selinux-procattr-hack.patch

thanks,
-serge
-- 
=======================================================
Serge Hallyn
Security Software Engineer, IBM Linux Technology Center
serue@private



This archive was generated by hypermail 2.1.3 : Tue Nov 23 2004 - 11:30:46 PST