On Thursday 24 March 2005 09:26 am, Stephen Smalley wrote:
 Rationale?  At least for me, the development process for this patch is
 too opaque. I see changes from version to version (particularly with
 respect to hooks and hook placement) with no explanation of the
 reasoning, which makes it hard to assess the real impact.  I think we
 need a clear stated justification as to what each hook is achieving for
 your higher level goals.  Note btw that it is looking like we actually
 need another security hook in the fs code to deal with the file creation
 issue, so d_instantiate/d_splice_alias might not be sufficient for you
 either.
 As I mentioned earlier, I think you need a very clearly stated
 description of your high level goals and requirements to include in your
 submission on linux-fsdevel and lkml, because they will need to
 understand those goals in order to assess whether your implementation is
 sound and to tell you the right way to implement that desired
 functionality if they think your implementation isn't sound.  You want
 to be careful about not confusing design/implementation with
 goals/requirements. 
This was sobering and reasonable.  Thank you.  I will definately work on this.
 >  Also, I've done quite a bit with the locking. Now,
[admittedly] I'm a
 > novice, so the reader-writer locking stradegy I've used is probably
 > not the best for performance -- especially since I've hooked
 > __d_lookup() and will hit a write_lock() when I enter
 > audit_attach_watch() (formly called audit_watch()).
 Did you test with a SMP kernel?  Locked up immediately for me on boot,
 right after displaying the Mount-cache hash table entries stats
 (mnt_init). 
No testing on SMP as of right now, I'll get right on this right now.  I have a 
couple of minor fix-ups too (changed the description in init/Kconfig and 
repositioned the exec_permission_lite() hook because if 
exec_permission_lite() returns -EAGAIN, we'll get a record there and in 
permission())
<snip>
Thanks again.
-tim