From owner-freebsd-current Sun Sep 6 22:32:55 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id WAA18607 for freebsd-current-outgoing; Sun, 6 Sep 1998 22:32:55 -0700 (PDT) (envelope-from owner-freebsd-current@FreeBSD.ORG) Received: from word.smith.net.au (castles157.castles.com [208.214.165.157]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id WAA18600 for ; Sun, 6 Sep 1998 22:32:51 -0700 (PDT) (envelope-from mike@word.smith.net.au) Received: from word.smith.net.au (LOCALHOST [127.0.0.1]) by word.smith.net.au (8.9.1/8.8.8) with ESMTP id WAA11569; Sun, 6 Sep 1998 22:39:07 -0700 (PDT) (envelope-from mike@word.smith.net.au) Message-Id: <199809070539.WAA11569@word.smith.net.au> X-Mailer: exmh version 2.0.2 2/24/98 To: Robert Watson cc: freebsd-current@FreeBSD.ORG Subject: Re: lkm hooks for passing (blah) via file descriptors In-reply-to: Your message of "Fri, 04 Sep 1998 13:18:45 EDT." Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Sun, 06 Sep 1998 22:39:06 -0700 From: Mike Smith Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > > As part of my research work on adding authentication/authorization tokens > to the FreeBSD kernel, I have two sets of patches that have been useful > for me under 3.0-CURRENT: > > 1. Patches to kern/uipc_socket.c (and others) to allow lkm's to hook three > spots in the arbitrary kernel-stuff passing code -- internalize(), > externalize() and gc(). This also involved cleaning up the file > descriptor passing code a little, etc. This code appears to run fine on > all the machines I have tested it on. Having this submitted as a PR would be very handy. If you could summarise the effects of "cleaning up a little" in the PR docco, that would help make a case for this. > 2. Adding a p_auth pointer in the proc structure (zero'd at fork for the > new process, although at_fork() lkm's can modify it immediately after the > fork, and based on the parent value) for hooking arbitrary authentication > or authorization information into the proc structure. Do you have a standard mechanism for chaining items off this pointer, or do you envisage only ever having one consumer at a time? How about a generalised interface that puts the current credentials there as well? > Would any of these patches be of interest for 3.0-CURRENT? The first > patch is something that I find useful, but that might not be so useful for > others. The second might be of more general use; especially if we stick > want to stick in posix capabilities via an optional lkm (a likely first > implementation -- I am ordering posix .6 this afternoon). I think that the lack of commentary here would tend to indicate that nobody violently objects, but perhaps that not enough people understand the ramifications of your changes. If you could paint them in the context of the kernel-wide authentication infrastructure you described earlier, in a fashion suitable for consumption by TV-age minds, you might raise some more noise. Basically, the suggestions both seem sound. The greatest concern which might be raised against the second patch would be that it's perhaps not being made in the context of a larger and more coherent vision for authentication management. -- \\ Sometimes you're ahead, \\ Mike Smith \\ sometimes you're behind. \\ mike@smith.net.au \\ The race is long, and in the \\ msmith@freebsd.org \\ end it's only with yourself. \\ msmith@cdrom.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message