Re: [PATCH 00/30] C/R OpenVZ/Virtuozzo style
From: Dave Hansen
Date: Tue Apr 14 2009 - 17:11:45 EST
On Wed, 2009-04-15 at 00:49 +0400, Alexey Dobriyan wrote:
> > Going back to my example of a subtree above: what sort of security
> > issues you would have here, assuming all restart operations go via
> > the usual security checks just like syscalls, and we take special
> > care about values we allow as input, e.g. cpu debug registers etc ?
> This is like asking if everything goes through correct security checks
> how will you screw something up. Everything won't go via usual security
> Just for giggles, writing exploit for localhost hole becomes easier --
> you very effectively turn off all randomization kernel does because VMA
> boundaries comes from disk.
Alexey, I think there's a bit of a misunderstanding here. We're
proposing that whatever gets done during the restart would not be able
to elevate above the privilege level of the user doing the restart. For
instance, a user would not be able to restart a suid application -- that
would require privilege.
In the same way, at checkpoint time, we should deny users the ability to
checkpoint things that are privileged. We need to pay very close
attention to the kernel interfaces that we use to ensure that all the
normal security checks are observed, of course.
There's no new hole. A restore operation is just a pieced-together set
of operations that the user would have already been able to perform.
Again, I think this stems from some of us that think that c/r should be
used outside exclusively checkpointing whole containers. I think we'll
find some expanded use for c/r on things that aren't strict system
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/