cvs commit: src/sys/kern kern_proc.c

David Rhodus sdrhodus at gmail.com
Tue Feb 1 10:38:51 PST 2005


On Tue, 1 Feb 2005 10:32:24 -0800 (PST), Matthew Dillon
<dillon at xxxxxxxxxxxxxxxxxxxx> wrote:
> 
> :While Paul's suggestion was obviously in jest, I'd have to say that it's
> :probably *not* a good idea to implement it, regardless of the expense,
> :unless it can be demonstrated that this can somehow reveal privileged
> :information.  This would defeat programs (e.g., sendmail) which attempt
> :to back off when system load gets too high.
> :
> :Dave
> 
>     I think the idea has merit, it just isn't being taken far enough.  What
>     we really want here is a 'virtual machine'.  The current jail subsystem
>     is still sharing the same kernel resources, data space, and code,
>     and thus could still panic the entire system and could still create
>     cross-jail security issues.
> 
>     But when it comes right down to it it should be possible to run pretty
>     much the entire kernel, minus the device drivers, as a user level process.
>     All we really need is some way to manage the VM space for the 'user'
>     processes and route system call requests for those processes to the
>     simulated kernel rather then the real kernel.
> 
>     This would be a worthy goal.  I think also very doable... and a very, very
>     powerful tool.
> 
>                                         -Matt

I think I would rather just use Xen.

-- 
                                            -David
                                            Steven David Rhodus
                                            <drhodus at xxxxxxxxxxx>





More information about the Commits mailing list