[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EC4DA15.7090106@parallels.com>
Date: Thu, 17 Nov 2011 13:55:33 +0400
From: Pavel Emelyanov <xemul@...allels.com>
To: Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
CC: Cyrill Gorcunov <gorcunov@...nvz.org>,
Glauber Costa <glommer@...allels.com>,
Andi Kleen <andi@...stfloor.org>, Tejun Heo <tj@...nel.org>,
Matt Helsley <matthltc@...ibm.com>,
Pekka Enberg <penberg@...nel.org>,
Eric Dumazet <eric.dumazet@...il.com>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: [PATCH v2 0/4] Checkpoint/Restore: Show in proc IDs of objects that
can be shared between tasks
While doing the checkpoint-restore in the userspace one need to determine
whether various kernel objects (like mm_struct-s of file_struct-s) are shared
between tasks and restore this state.
The 2nd step can for now be solved by using respective CLONE_XXX flags and
the unshare syscall, while there's currently no ways for solving the 1st one.
One of the ways for checking whether two tasks share e.g. an mm_struct is to
provide some mm_struct ID of a task to its proc file. The best from the
performance point of view ID is the object address in the kernel, but showing
them to the userspace is not good for security reasons.
Thus the object address is XOR-ed with a "random" value of the same size and
then shown in proc. Providing this poison is not leaked into the userspace then
ID seem to be safe. The objects for which the IDs are shown are:
* all namespaces living in /proc/pid/ns/
* open files (shown in /proc/pid/fdinfo/)
* objects, that can be shared with CLONE_XXX flags (except for namespaces)
Changes since
v1: * Tejun worried about the single poison value was a weak side - leaking one
makes all the IDs vulnerable. To address this several poison values - one
per object type - are introduced. They are stored in a plain array. Tejun,
is this enough from your POV, or you'd like to see them widely scattered
over the memory?
* Pekka proposed to initialized poison values in the late_initcall callback
* ... and move the code to mm/util.c
Signed-off-by: Pavel Emelyanov <xemul@...allels.com>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists