Message ID | 162163367115.8379.8459012634106035341.stgit@sifl (mailing list archive) |
---|---|
Headers | show |
Series | Add LSM access controls and auditing to io_uring | expand |
On 2021/05/22 6:49, Paul Moore wrote: > I've provided the SELinux > implementation, Casey has been nice enough to provide a Smack patch, > and John is working on an AppArmor patch as I write this. I've > mentioned this work to the other LSM maintainers that I believe might > be affected but I have not heard back from anyone else at this point. I don't think any change is required for TOMOYO, for TOMOYO does not use "struct cred"->security where [RFC PATCH 8/9] and [RFC PATCH 9/9] are addressing, and TOMOYO does not call kernel/audit*.c functions.
On Fri, May 21, 2021 at 8:53 PM Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp> wrote: > On 2021/05/22 6:49, Paul Moore wrote: > > I've provided the SELinux > > implementation, Casey has been nice enough to provide a Smack patch, > > and John is working on an AppArmor patch as I write this. I've > > mentioned this work to the other LSM maintainers that I believe might > > be affected but I have not heard back from anyone else at this point. > > I don't think any change is required for TOMOYO, for TOMOYO does not > use "struct cred"->security where [RFC PATCH 8/9] and [RFC PATCH 9/9] > are addressing, and TOMOYO does not call kernel/audit*.c functions. Good to know, thank you for checking.
Paul Moore <paul@paul-moore.com> writes: > Also, any pointers to easy-to-run io_uring tests would be helpful. I > am particularly interested in tests which make use of the personality > option, share urings across process boundaries, and make use of the > sqpoll functionality. liburing contains a test suite: https://git.kernel.dk/cgit/liburing/ You can run it via 'make runtests'. Cheers, Jeff
On Wed, May 26, 2021 at 10:59 AM Jeff Moyer <jmoyer@redhat.com> wrote: > Paul Moore <paul@paul-moore.com> writes: > > > Also, any pointers to easy-to-run io_uring tests would be helpful. I > > am particularly interested in tests which make use of the personality > > option, share urings across process boundaries, and make use of the > > sqpoll functionality. > > liburing contains a test suite: > https://git.kernel.dk/cgit/liburing/ > > You can run it via 'make runtests'. Thanks Jeff, I'll take a look. Quick question as I start sifting through the tests, are there any tests in here which share a single ring across process boundaries?
Paul Moore <paul@paul-moore.com> writes: > On Wed, May 26, 2021 at 10:59 AM Jeff Moyer <jmoyer@redhat.com> wrote: >> Paul Moore <paul@paul-moore.com> writes: >> >> > Also, any pointers to easy-to-run io_uring tests would be helpful. I >> > am particularly interested in tests which make use of the personality >> > option, share urings across process boundaries, and make use of the >> > sqpoll functionality. >> >> liburing contains a test suite: >> https://git.kernel.dk/cgit/liburing/ >> >> You can run it via 'make runtests'. > > Thanks Jeff, I'll take a look. Quick question as I start sifting > through the tests, are there any tests in here which share a single > ring across process boundaries? Yes. At the very least, this one: test/across-fork.c -Jeff
On Wed, May 26, 2021 at 3:06 PM Jeff Moyer <jmoyer@redhat.com> wrote: > Paul Moore <paul@paul-moore.com> writes: > > > On Wed, May 26, 2021 at 10:59 AM Jeff Moyer <jmoyer@redhat.com> wrote: > >> Paul Moore <paul@paul-moore.com> writes: > >> > >> > Also, any pointers to easy-to-run io_uring tests would be helpful. I > >> > am particularly interested in tests which make use of the personality > >> > option, share urings across process boundaries, and make use of the > >> > sqpoll functionality. > >> > >> liburing contains a test suite: > >> https://git.kernel.dk/cgit/liburing/ > >> > >> You can run it via 'make runtests'. > > > > Thanks Jeff, I'll take a look. Quick question as I start sifting > > through the tests, are there any tests in here which share a single > > ring across process boundaries? > > Yes. At the very least, this one: > > test/across-fork.c Great, thanks!