Starting the kdbus discussions

Greg KH gregkh at linuxfoundation.org
Wed Jan 8 06:28:49 PST 2014


On Wed, Jan 08, 2014 at 08:12:43AM -0500, Marc Deslauriers wrote:
> On 14-01-08 03:51 AM, Lennart Poettering wrote:
> > On Tue, 07.01.14 15:24, Tyler Hicks (tyhicks at canonical.com) wrote:
> > 
> >> Hi Lennart! I've added Greg to cc since John Johansen and I spoke with
> >> him about this in a hallway at Plumbers last year.
> >>
> >> On 2014-01-02 18:08:42, Lennart Poettering wrote:
> >>> I am sorry, but to make this very clear: this is explicitly not an
> >>> option. There will not be a payload parser for kdbus in the kernel, as
> >>> long as the four developers who are working on it have any say. The
> >>> entire design is based on the concept that the payload is irrelevant to
> >>> the kernel, and routing is done only according to the metadata we
> >>> attach. This is a fundamental design decision of kdbus, and the four of
> >>> us (Kay, Daniel, Greg and I) will refuse this.
> >>
> >> I agree that parsing the payload in the kernel is not something that we
> >> should do. However, I do think that there are some important metadata
> >> fields hidden away in the opaque sd_bus_message that should be exposed
> >> to the kernel by way of moving them to the kdbus_msg.
> >>
> >> I'm proposing that the following fields be moved to the kdbus_msg:
> >>
> >>  - message type
> >>  - destination
> >>  - sender
> > 
> > These three you have anyway, in one way or another. (or can mostly
> > reconstruct from the data available to the kernel, since the kernel can
> > distuingish method calls from method replies and broadcast signals --
> > though you cannot distuingish methods replies from method errors).
> > 
> >>  - path
> >>  - interface
> >>  - member
> > 
> > Nope. This is really not how this is supposed to work. These concepts
> > are opaque to the kernel on purpose.
> 
> So you're not willing to change any of your design to cope with the community's
> requirements?
> 
> > And the kernel does not use them
> > for anything. We are certainly not adding arbitrary fields to the kernel
> > structures, which nobody needs,
> 
> We're arguing the point that the kernel does need to use them, so the LSMs can
> make appropriate security decisions.

Then in your LSM, parse things out.  There's nothing stopping that from
happening, but don't force all other users to have the overhead, and
complexity, that they do not need here.

That should solve your security model issue, right?

thanks,

greg k-h


More information about the dbus mailing list