There is more information in here
Announcement
Collapse
No announcement yet.
BUS1 Documentation Published As The New Alternative To KDBUS
Collapse
X
-
Originally posted by SystemCrasher View PostKernel is good at enforcing security and its code quality is somewhat above average. User mode usually worse at it. Since kernel knows nothing about names, wouldn't usermode be able to play load of dirty tricks, eventually trying to take over or fake various important/sensitive services here and there?
Basically I'm worried about the following scenario: it could be "container" with user namespace. Its admin gets "fake root" and could add new users into his container. As far as I understand, it happens via uid mappings, so container could potentially run with range of uids. Though I've mostly seen this from usermode side and syscalls mans (i.e. clone() and somesuch). I'm not expert in all areas of kernel, so I'm sorry if my question sounds stupid, but would these new users inherit same kuid? Containers always had plenty of issues with the fact users can occupy quite some extra memory on kernel side without accounting or limits, eventually screwing things up.
I understand it is incomplete and I have idea what WIP means, so do not take it as offence, etc. Another stupid question is: web site claims there is init, activator and administrator. Are these going to be separate processes? "Bootstrap" process looks somewhat complicated and I wonder why it looks like this. It also mentions bus's init bootstrapping bus is pid 1, but .. hmm, does it means it going to be systemd? Or it supposed to be something else? This makes me really puzzled. I guess I should go read some code instead of asking stupid questions, sorry
Leave a comment:
-
Originally posted by tomegun View PostAs is hopefully clear, this is very much work in progress (some of the pages are even stubs).
See aboveBut to answer your questions a bit: service discovery would be done purely in userspace, and so would mappings between names and handles. The kernel does not know anything about names.
All quotas are per kuid, so creating new namespaces won't let you circumvent the limits.
Happy to answer questions, but it probably will be a lot simpler to understand all of this once we have working code, completed the documentation and got some examples running. After all, this project has not even been announced yet...
Leave a comment:
-
Have any of you actually looked at "BUS1"
The usual suspects are peddling it as a new in-kernel IPC
KDBus was an in-kernel IPC as they attempted to shoehorn dbus into the kernel for marginal speed inprovements but glaring security holes and bad code...
BUS1 does have some kernel stuff BUT it is an init and device manager with a lot of userland parts.
those associated with Systemd need to stop misrepresenting stuff and blurring boundaries... Make bus1 kernel IPC... make a device and init system as something that uses DONT mix the two because kernel, init, device are separate things...
Leave a comment:
-
Originally posted by SystemCrasher View PostThis said, bus1 mans are funny.
Hey, are there services discovery at all? And how the hell these "something.org.bus1" names are getting mapped into handles, nodes and somesuch? Are there any sensible overwies of security model? Vague descriptions do not answer quite many questions like "what if ... ?".But to answer your questions a bit: service discovery would be done purely in userspace, and so would mappings between names and handles. The kernel does not know anything about names.
Say, memory is per-user. Okay, but when it comes to containers, container could run in separate users namespace, with "fake root". Such "fake root" could create shitload of users in their container. So it could try to waste quite some memory, according to such description. What would happen next? In perfect world, container would hit limits and error out locally. But I suspect it could rather be able to waste a plenty of "global" kernel memory instead, eventually fucking everything up, etc.
Happy to answer questions, but it probably will be a lot simpler to understand all of this once we have working code, completed the documentation and got some examples running. After all, this project has not even been announced yet...
Leave a comment:
-
Originally posted by xeekei View PostProbably the first bus that starts rolling everyday in Nicaragua, therefore "Bus 1".
This said, bus1 mans are funny. Hey, are there services discovery at all? And how the hell these "something.org.bus1" names are getting mapped into handles, nodes and somesuch? Are there any sensible overwies of security model? Vague descriptions do not answer quite many questions like "what if ... ?". Say, memory is per-user. Okay, but when it comes to containers, container could run in separate users namespace, with "fake root". Such "fake root" could create shitload of users in their container. So it could try to waste quite some memory, according to such description. What would happen next? In perfect world, container would hit limits and error out locally. But I suspect it could rather be able to waste a plenty of "global" kernel memory instead, eventually fucking everything up, etc.Last edited by SystemCrasher; 27 March 2016, 09:47 PM.
Leave a comment:
-
Originally posted by GreatEmerald View Post
Nope, you're just misinterpreting what you're seeingThere's even a video here: http://www.williebus.com/
Leave a comment:
-
Originally posted by duby229 View PostTh screwed up thing is that bus would never be able to turn, it's a fixed single with an axel directly in the center!There's even a video here: http://www.williebus.com/
- Likes 1
Leave a comment:
-
Originally posted by GreatEmerald View PostI guess by that image Michael wanted to post something like this, but didn't have anything quite as rad: http://cdn2.ubergizmo.com/wp-content.../12/willie.jpg
Last edited by duby229; 26 March 2016, 06:19 PM.
Leave a comment:
-
I guess by that image Michael wanted to post something like this, but didn't have anything quite as rad: http://cdn2.ubergizmo.com/wp-content.../12/willie.jpg
Leave a comment:
Leave a comment: