LSM: shrink sizeof LSM specific portion of common_audit_data
Linus found that the gigantic size of the common audit data caused a big perf hit on something as simple as running stat() in a loop. This patch requires LSMs to declare the LSM specific portion separately rather than doing it in a union. Thus each LSM can be responsible for shrinking their portion and don't have to pay a penalty just because other LSMs have a bigger space requirement. Signed-off-by:Eric Paris <eparis@redhat.com> Signed-off-by:
Linus Torvalds <torvalds@linux-foundation.org>
Showing
- include/linux/lsm_audit.h 4 additions, 50 deletionsinclude/linux/lsm_audit.h
- security/apparmor/audit.c 19 additions, 19 deletionssecurity/apparmor/audit.c
- security/apparmor/capability.c 4 additions, 2 deletionssecurity/apparmor/capability.c
- security/apparmor/file.c 28 additions, 26 deletionssecurity/apparmor/file.c
- security/apparmor/include/audit.h 27 additions, 1 deletionsecurity/apparmor/include/audit.h
- security/apparmor/ipc.c 6 additions, 4 deletionssecurity/apparmor/ipc.c
- security/apparmor/lib.c 3 additions, 1 deletionsecurity/apparmor/lib.c
- security/apparmor/lsm.c 5 additions, 3 deletionssecurity/apparmor/lsm.c
- security/apparmor/policy.c 6 additions, 4 deletionssecurity/apparmor/policy.c
- security/apparmor/policy_unpack.c 11 additions, 9 deletionssecurity/apparmor/policy_unpack.c
- security/apparmor/resource.c 7 additions, 5 deletionssecurity/apparmor/resource.c
- security/selinux/avc.c 18 additions, 16 deletionssecurity/selinux/avc.c
- security/selinux/hooks.c 70 additions, 1 deletionsecurity/selinux/hooks.c
- security/selinux/include/avc.h 16 additions, 0 deletionssecurity/selinux/include/avc.h
- security/smack/smack.h 12 additions, 1 deletionsecurity/smack/smack.h
- security/smack/smack_access.c 6 additions, 5 deletionssecurity/smack/smack_access.c
Loading
Please register or sign in to comment