Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752846AbYJ0LEM (ORCPT ); Mon, 27 Oct 2008 07:04:12 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752087AbYJ0LD5 (ORCPT ); Mon, 27 Oct 2008 07:03:57 -0400 Received: from jalapeno.cc.columbia.edu ([128.59.29.5]:52024 "EHLO jalapeno.cc.columbia.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752136AbYJ0LD4 (ORCPT ); Mon, 27 Oct 2008 07:03:56 -0400 Message-ID: <49059FED.4030202@cs.columbia.edu> Date: Mon, 27 Oct 2008 07:03:09 -0400 From: Oren Laadan Organization: Columbia University User-Agent: Thunderbird 2.0.0.17 (X11/20080925) MIME-Version: 1.0 To: Peter Chubb CC: "Serge E. Hallyn" , Andrew Morton , torvalds@linux-foundation.org, containers@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-api@vger.kernel.org, tglx@linutronix.de, dave@linux.vnet.ibm.com, mingo@elte.hu, hpa@zytor.com, viro@zeniv.linux.org.uk Subject: Re: [RFC v7][PATCH 2/9] General infrastructure for checkpoint restart References: <1224481237-4892-1-git-send-email-orenl@cs.columbia.edu> <1224481237-4892-3-git-send-email-orenl@cs.columbia.edu> <20081021124130.a002e838.akpm@linux-foundation.org> <20081021202410.GA10423@us.ibm.com> <48FE82DF.6030005@cs.columbia.edu> <20081022152804.GA23821@us.ibm.com> <48FF4EB2.5060206@cs.columbia.edu> <87tzayh27r.wl%peter@chubb.wattle.id.au> In-Reply-To: <87tzayh27r.wl%peter@chubb.wattle.id.au> Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-No-Spam-Score: Local Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1440 Lines: 38 Peter Chubb wrote: >>>>>> "Oren" == Oren Laadan writes: > > > Oren> Nope, since we will fail to restart in many cases. We will need > Oren> a way to move from caller's credentials to saved credentials, > Oren> and even from caller's credentials to privileged credentials > Oren> (e.g. to reopen a file that was created by a setuid program > Oren> prior to dropping privileges). > > You can't necessarily tell the difference between this and revocation > of privilege. For most security models, it must be possible to change > the permissions on the file, and then the restart should fail. > > In our implementation, we simply refused to checkpoint setid programs. True. And this works very well for HPC applications. However, it doesn't work so well for server applications, for instance. Also, you could use file system snapshotting to ensure that the file system view does not change, and still face the same issue. So I'm perfectly ok with deferring this discussion to a later time :) Oren. > -- > Dr Peter Chubb http://www.gelato.unsw.edu.au peterc AT gelato.unsw.edu.au > http://www.ertos.nicta.com.au ERTOS within National ICT Australia > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/