Re: [PATCH] libselinux: disable refcounting in the userspace AVC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Remmolt G. Zwartsenberg wrote:
> Hi KaiGai,
> 
>>From a mediation and billing perspective, i agree with you.
> The Network Management part of the OSS system uses URL's that resolve to
> high-latency authentication, that need no encryption in the columns.
> 
> In VOIP tunnels this can lead to congestion, ie in 2-way Irridium
> conversations. Erroneous frame dragging?

Sorry, I'm not sure what do you want to discuss.

At the previous message, I introduced a workload inside of the PostgreSQL
which tend to lookup userspace avc with same subject context many times.
It is not a workload between the client application and RDBMS.

Thanks,

> Kind regards,
> 
> ~remmolt 
> 
> Philips NEC Business Commumication Systems NL
> 
> remmolt@xxxxxxxxxxxxxxx 
> 
> -----Original Message-----
> From: owner-selinux@xxxxxxxxxxxxx [mailto:owner-selinux@xxxxxxxxxxxxx] On
> Behalf Of KaiGai Kohei
> Sent: donderdag 3 september 2009 4:07
> To: Stephen Smalley
> Cc: Joshua Brindle; Eamon Walsh; SELinux List; KaiGai Kohei
> Subject: Re: [PATCH] libselinux: disable refcounting in the userspace AVC
> 
> Stephen Smalley wrote:
>>> IIRC sepostgres reimplemented its sidtab and avc because our current one
>>> wasn't very friendly to multithread/multiprocess object managers.
>> Looking back, I think KaiGai's reasons were:
>> - he didn't see benefit to the indirection of the AVC SID table since
>> PostgreSQL has to directly manage security contexts for persistent
>> labeling,
> 
> Yes, it uses object identifier which is associated with a certain
> text representation of security context as a key to lookup its
> userspace avc.
> 
>> - he wanted to enable sharing of the AVC (via shared memory) and the
>> netlink thread among all PostgreSQL instances (processes, not just
>> threads).
> 
> The pgsql-hackers didn't like an idea to deploy userspace avc on the
> shared memory segment, so I had to change its implementation.
> Now, it put only a flag to notice avc invalidation for all the server
> processes. A background netlink process updates the flag on the shared
> memory segment, then other server processed voluntarily invalidates its
> userspace avc deployed on the process local memory prior to looking up.
> 
> In addition, characteristic of database workload enables to apply more
> optimization in the performance perspective.
> The subject security context of the userspace avc deployed on the process
> local memory is unchanged (except for trusted procedure execution),
> so SE-PostgreSQL categorizes all the avc entries by subject context to
> omit comparison of subject context.
> (Note that subject context is not database object, so it does not have
> object identifer. It requires strcmp() to compare subject context.)
> 
> Because the database workload (with row level security) needs to lookup
> the avc entry massive times in a short time, this kind of optimization
> is very important. At the past, I tried to compare subject context to
> lookup avc entry, then it recorded 50% of transaction-per-second toward
> the vanilla PostgreSQL. :(
> 
> Thus, now, it is not necessary to consider use cases in SE-PostgreSQL
> to update userspace avc stuff in libselinux.
> 
> Thanks,


-- 
OSS Platform Development Division, NEC
KaiGai Kohei <kaigai@xxxxxxxxxxxxx>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux