Re: kernel stack challenge

From: John Stoffel
Date: Tue Apr 06 2004 - 13:30:02 EST


>>>>> "Sergiy" == Sergiy Lozovsky <serge_lozovsky@xxxxxxxxx> writes:

>> Policy has no place inside the kernel.

Sergiy> Root privileges (ability to send a signal to any process,
Sergiy> access any file and so on) are encoded in the kernel.

But that does not require a LISP interpreter in the kernel either.
And you are also mistaking policy with a capability. Who has root is
a policy, what root can do is a capability. They are seperate issues.

Sergiy> So all interaction with the kernel goes via VM. Investing
Sergiy> some time into carefull parameter check in VM allows to avoid
Sergiy> the same work for each new application.

You have not given us a simple example of how this VM would be used in
the kernel and what it provides. I think that would help people
understand why you think this is so needed.

So just start with a process, explain how it wants to do some
restricted action, and how your VM would be required to mediate that
access. Some simple flow charting and explaining of what steps would
happen and why would be a big help.

Personally, I think you're completely confusing policy with
capabilities. Since the setting of policy is completely a user-space
issue, while the checking of capabilities is handled in the kernel.
And if the capability check requires a VM to do some mediation, that
capability check gets pushed out to userspace, instead of kept in the
VM in the kernel like you seem to want.

John
John Stoffel - Senior Unix Systems Administrator - Lucent Technologies
stoffel@xxxxxxxxxx - http://www.lucent.com - 978-952-7548
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/